WorldWideScience

Sample records for internet civil defense

  1. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  2. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  3. Internet Civil Defense: Feasibility Study

    National Research Council Canada - National Science Library

    LaPorte, Ron

    2002-01-01

    ... (and ultimately, international) system of information sharing, education and analysis via the Internet to connect the general public, community networked cells, emergency responders, local and national investigative authorities...

  4. Survey on radon concentration of civil air defense shelter in Hengyang

    International Nuclear Information System (INIS)

    Tang Quan; Ma Xiao

    2011-01-01

    In this paper, the radon concentration of civil air defense shelter was surveyed in Hengyang area, where there is higher background of radon concentration. If civil air defense shelter is not pressure-tight, the average radon concentration is about 55.9 -167.3 Bq/m 3 , lower than the intervened quantity: 200 Bq/m 3 , which is given by the international commission on radiological protection (ICRP). Maybe radon protection is not needed with the ventilation of civil air defense shelter like that. The radon concentration of airtight civil air defense shelter change along with the season, which is lower in spring and higher in autumn. The results can be a reference for using civil air defense shelter during the time of peace or war. (authors)

  5. Soviet civil defense plans make nuclear war winnable

    International Nuclear Information System (INIS)

    Goure, L.

    1985-01-01

    In this paper, the author expresses his opinion that the U.S. is naive and suicidal in its lack of civil defense preparation for nuclear war. The Soviets' extensive civil defense planning is evidence that they plan to use their nuclear weapons and survive a counterattack by the U.S. The author compares the two systems and explains why the Soviets' system is superior

  6. Influence of IR sensor technology on the military and civil defense

    Science.gov (United States)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  7. Human biomonitoring in civil defense; Humanbiomonitoring im Bevoelkerungsschutz

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Michael; Schmiechen, Katharina [Universitaetsmedizin Goettingen (Germany). Arbeits-, Sozial- und Umweltmedizin

    2012-07-01

    The booklet on human biomonitoring (HBM) in civil defense covers the following issues within two sections: (1) general part: definition and importance of human biomonitoring; application in civil defense; practice in a CBRN (chemical, biological, radiation, nuclear) scenario; sampling following a CBRN assignment; HBM for antidote administration; peculiarities of sampling in case of biological agents; microbiological detection procedure; human biomonitoring of radioactive metal isotopes. (2) Special part: substance profiles; list of HBM laboratories; list of poison information centers; questionnaire for exposure assessment in case of dangerous substance accidents; agreement for human biomonitoring examination.

  8. Iraqi Civil Defense Headquarters Baghdad, Iraq

    National Research Council Canada - National Science Library

    Johnston, Angelina; O'Connor, Kevin; Rawal, Yogin

    2007-01-01

    .... The assessment team included two engineers/inspectors and three auditors/inspectors. The overall objective of the project was to fully renovate the Civil Defense Headquarters and other buildings on the site to become a fully operational and usable facility.

  9. 24 CFR 100.308 - Good faith defense against civil money damages.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Good faith defense against civil money damages. 100.308 Section 100.308 Housing and Urban Development Regulations Relating to Housing and... Good faith defense against civil money damages. (a) A person shall not be held personally liable for...

  10. Marco Civil: Liberdade e o Futuro da Internet

    Directory of Open Access Journals (Sweden)

    Rafael Trindade Pellegrini

    2014-09-01

    Full Text Available Este trabalho tem como objetivo expôr de forma simples e objetiva uma correlação entre a obra escrita por Julian Assange e o projeto de Lei 12.965/14, conhecida como Marco Civil da Internet. Trazendo um alerta a sociedade sobre o que está acontecendo no meio de comunicação/informação, a Internet.

  11. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 4. Warning, Emergency Operations, and Support Programs.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    The need for, and a description of, emergency functions required to save lives and protect property in nuclear or natural disasters are presented. Topics discussed include: (1) The Civil Defense Warning System, (2) Introduction to the Emergency Operations Program, (3) Five subprograms of the Emergency Operations Program, (4) Emergency Operations…

  12. Defense Support of Civil Authorities - Are We Organized Right?

    National Research Council Canada - National Science Library

    Austin, Joseph

    2007-01-01

    The Department of Defense (DoD) has a long history of supporting civil authorities in the wake of catastrophic events with specialized skills and assets that can rapidly stabilize and improve the situation...

  13. Governança na internet: um estudo sobre o Marco Civil brasileiro

    Directory of Open Access Journals (Sweden)

    Laura Vilela Rodrigues Rezende

    2016-01-01

    Full Text Available El trabajo tiene como propósito realizar un estudio sobre la legislación que rige el uso de Internet en Brasil, en el Marco Civil de Internet (Ley 12.965/2014. Se trata de una investigación descriptiva, de naturaleza cua litativa, basada en recopilación bibliográfica y estudio comparativo. Se ex pone inicialmente un breve histórico de Internet en Brasil y su panorama actual. Luego, se presenta el concepto de gobernanza en Internet y los su cesos que marcaron las discusiones acerca de esta temática. Se aborda el Marco Civil de Internet en Brasil, el histórico de su creación y los principios que lo rigen. Se concluye que es un importante instrumento oficial regla mentario para asegurar la libertad y los derechos del usuario. Su concep ción se fundamentó en la participación de la sociedad civil, lo que puede considerarse inédito en lo que se refiere a la creación de leyes reglamenta rias. Se considera que esta sea una ley sofisticada en cuanto a sus directri ces, lo que la vuelve una de las más progresistas del mundo. Pese a todo lo anterior, su trayectoria democrática de creación le otorga un carácter ge neralista y superficial.

  14. "Homeland Defense: At Risk as a Result of Civil Support?"

    National Research Council Canada - National Science Library

    Brickhouse, Tonja

    2003-01-01

    This research effort is an attempt by the author to examine the broad area of military support to civil authorities and the potential for a significant demand on Department of Defense (DoD) resources...

  15. Analysis of consolidating defense acquisition information on the Internet.

    OpenAIRE

    Trulock, Troy E.

    1997-01-01

    Approved for public release; distribution is unlimited The Internet began over 30 years ago as a method of providing vital military communications following a nuclear attack. Today, due to the introduction of the World Wide Web and recent commercial interests, the Internet has grown into a multimedia source of information, and has become overloaded with information. Acquisition professionals in both the government and civilian defense acquisition sectors are attempting to use the Internet ...

  16. Electronic Contracts and the Personal data Protection of the Consumer: Sources Dialogue Between the Consumer Protection Code and the Internet Civil Mark.

    Directory of Open Access Journals (Sweden)

    Rosane Leal Da Silva

    2016-10-01

    Full Text Available This paper analyzes the personal data protection of the consumer and your vulnerability in interactive electronic contracts, aiming to point means of defense. For this, uses the deductive approach and starts of the electronic contracting to discuss the legal protection of the consumer in light of the capturing and processing of personal data by the furnisher. Considering the absence of law about personal data, concludes that electronic contracting expands the consumer vulnerability, which requires the principles application of the Consumer Protection Code, adding the Internet Civil Mark in relation to the privacy protection.

  17. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  18. Structure of the Russian internet-community according to the motives and types of civil activity

    Directory of Open Access Journals (Sweden)

    Trotsuk Irina V.

    2017-01-01

    Full Text Available Today in the sociological discipline, there is an impressive collection of empirical data and conceptual approaches to the study of civil society as a complex and ambiguous phenomenon, including a set of empirical indicators for assessing its development, strength, and sustainability. However, the authors believe that this impressive collection of theoretical models and empirical findings still does not explain a specific phenomenon, which is very important for the Russian society - various formats of civil activism that are not always permanent or widespread, and, thus, ignored by the researchers. The article provides a model for conceptualization and empirical study of civil activism that aims to fill this gap and was tested in the online survey. The questionnaire of the online survey provides the criteria for structuring the Internet community according to the involvement in civil activity, and allows identifying its key motives and barriers. The results of the online survey, in particular, present seven types of Internet users according to different formats of civil activism: super-activists, volunteers, online activists, members of public organizations, passive observers, only voting in the elections, and outsiders.

  19. Desastres, ordem social e planejamento em defesa civil: o contexto brasileiro Disasters, social order and civil defense planning: the Brazilian context

    Directory of Open Access Journals (Sweden)

    Norma Valencio

    2010-12-01

    discourse and the civil defense practices in the Brazilian context. First of all, it describes the main approaches of the sociology of disasters: the minimal consensus, the polarity and dichotomy, and shows one approach about the relationship between unequal development, vulnerability and civil defense planning. The present situation in Brazilian cities is of restriction to land access and it results in an increase in disasters. If changes do not occur in State's planning, with the adoption of new strategies explicitly formulated to break up the ideological point of view that subjects the poor groups, the disasters will continue happening. In the present structural dimension of planning, the Brazilian civil defense system classifies the vulnerable groups without considering social complexity. Disasters do not completely destroy the existing social systems, but they are capable of maintaining continuous processes of social indifference. Thus, the paper concludes by emphasizing the development of a participatory agenda in civil defense planning and decision-making processes.

  20. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    The National Strategy for Homeland Security, The National Military Strategic Plan for the War of Terrorism, the Strategy for Homeland Defense and Civil Support, numerous CONPLANS and DOD instructions...

  1. The Evolving Role of the Army National Guard in Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Rooney, Joseph

    2004-01-01

    .... To further unify the military effort U.S. Northern Command (NORTHCOM) has been created as a North American combatant command charged with the dual missions of homeland defense and civil support...

  2. Defense nuclear energy systems selection methodology for civil nuclear power applications

    International Nuclear Information System (INIS)

    Scarborough, J.C.

    1986-01-01

    A methodology developed to select a preferred nuclear power system for a US Department of Defense (DOD) application has been used to evaluate preferred nuclear power systems for a remote island community in Southeast Asia. The plant would provide ∼10 MW of electric power, possibly low-temperature process heat for the local community, and would supplement existing island diesel electric capacity. The nuclear power system evaluation procedure was evolved from a disciplined methodology for ranking ten nuclear power designs under joint development by the US Department of Energy (DOE) and DOD. These included six designs proposed by industry for the Secure Military Power Plant Program (now termed Multimegawatt Terrestrial Reactor Program), the SP-100 Program, the North Warning System Program, and the Modular Advanced High-Temperature Gas-Cooled Reactor (HTGR) and Liquid-Metal Reactor (LMR) programs. The 15 evaluation criteria established for the civil application were generally similar to those developed and used for the defense energy systems evaluation, except that the weighting factor applied to each individual criterion differed. The criteria and their weighting (importance) functions for the civil application are described

  3. Neutralidade de Rede: o caso Comcast v. Netflix e o Marco Civil da Internet / Net Neutrality: Netflix vs. Comcast's Case and the Brazilian Internet Civil Mark

    Directory of Open Access Journals (Sweden)

    Maria Eduarda Cintra

    2015-10-01

    Full Text Available Purpose – The main goal of the article is to address how Brazil has progressed in favor of net neutrality. Comcast vs. Netflix case is used as an example to compare the actions took by the United States and Brazil concerning this theme. Methodology/approach/design – The text follows the problem-driven approach to infer some conclusions about the practices that has been adopted by the United States and Brazil. Findings – It has been verified that Brazil is on the vanguard of internet governance as far as net neutrality is concerned. Practical implications – The article can allow for a vast comprehension about net neutrality on par with the Brazilian Internet Civil Mark.

  4. 32 CFR 310.46 - Civil actions.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil actions. 310.46 Section 310.46 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Privacy Act Violations § 310.46 Civil actions. An individual may file a civil suit...

  5. 32 CFR 855.13 - Civil fly-ins.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Civil fly-ins. 855.13 Section 855.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.13 Civil fly-ins. (a) Civil...

  6. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  7. 32 CFR 310.47 - Civil remedies.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil remedies. 310.47 Section 310.47 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Privacy Act Violations § 310.47 Civil remedies. In addition to specific remedial...

  8. Marco Civil da Internet: Limits From the Express and Unequivocal Requirement Consent as a Legal Protection of Personal Data on the Internet

    Directory of Open Access Journals (Sweden)

    Marco Antonio Lima

    2016-10-01

    Full Text Available This article examines the limits of the legal determination of express and unequivocal consent for the collection, use, storage, processing and protection of personal data as provided for in the Marco Civil da Internet (Law 12.965/2014 provided for in the list of rights and guarantees of users of the World Wide Web. With the increasing use of personal data from the Internet, for purposes of market analysis, prospecting investment trends, consumption and guidance of advertising campaigns - possible through technological resources for treatment and analysis of information - it is urgent to effectiveness the legal protection of this intangible property.

  9. The relationship between personality, defense styles, internet addiction disorder, and psychopathology in college students.

    Science.gov (United States)

    Floros, Georgios; Siomos, Konstantinos; Stogiannidou, Ariadni; Giouzepas, Ioannis; Garyfallos, Georgios

    2014-10-01

    The purpose of this study is to assess any underlying links between personality, defense styles, Internet addiction disorder (IAD), and psychopathology in a college student sample. This is a cross-sectional study of fourth-year Greek Medical students who responded in a comprehensive test battery, which included validated questionnaires on IAD, personality traits, patterns of psychological defense styles, and psychopathology symptoms. A path model that was tested using Partial Least Squares (PLS) methodology showed that the defense styles employed by the students and certain personality traits (Impulsivity, Sensation Seeking, Neuroticism/Anxiety, and Aggression-Hostility) contributed to the prediction of variability in IAD, with IAD in turn predicting variability in overt psychopathology.

  10. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  11. 32 CFR 269.3 - Civil monetary penalty inflation adjustment.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil monetary penalty inflation adjustment. 269... DEFENSE (CONTINUED) MISCELLANEOUS CIVIL MONETARY PENALTY INFLATION ADJUSTMENT § 269.3 Civil monetary penalty inflation adjustment. The Department shall, not later than 180 days after the enactment of the...

  12. Trying to Learn Lessons for Response to Extreme Events: Paradigm Shifts Affecting Civil Defense in the Trinational Region of Southwestern Amazonia

    Science.gov (United States)

    Santos, G. L. P.

    2015-12-01

    The last ten years have seen several extreme climate events in southwestern Amazonia with historic impacts. The City of Rio Branco, Capital of Acre, Brazil´s westernmost State, suffered its seventh consecutive annual flooding and its worst in March 2015. The city of Tarauacá, also in Acre, registered 12 flooding events between November 2014 and April 2015. The most recent flood of the trinational Acre River in 2015 set historic records for flood stage and number of displaced persons in Cobija, the Capital of Pando, Bolivia. From February to April 2014, floods of the Madeira River disrupted the one highway between Acre and southern Brazil. Puerto Maldonado, the capital in Madre de Dios Region of Peru had its worst flood in 50 years during 2014. In 2005 and 2010, prolonged droughts combined with ignition sources resulted in tens to hundreds of thousands of hectares of fire-damaged rainforests in the Madre de Dios, Acre and Pando (MAP) Region. The Civil Defenses in these three contiguous political units faced several abrupt paradigm shifts that affected their responses: 1) The drought of 2005 showed dramatically that regional rainforests do burn; 2) The recent flooding history, particularly in 2012 and 2015, demolished the cultural icon of a nine-year recurrence interval; 3) What happens outside your territory can be devastating. The Madeira River flood impeded an estimated 200 million dollars from circulating in Acre; 4) The past can be a terrible guide. For Cobija and Rio Branco, the 2015 flood was on the order of a meter higher than any other. Many home dwellers did not evacuate in time because they used past floods as a guide; 5) A collapse in communication - cell phones, land lines, and Internet - can get worse. In 2012, such a collapse occurred in two border towns for 5 days, yet in 2015 it lasted more than 11 days. Research is needed to address how institutions linked to Civil Defense can shift paradigms in time to be more effective.

  13. 32 CFR 215.9 - Providing military resources to civil authorities.

    Science.gov (United States)

    2010-07-01

    ... requests for firefighting assistance to DSA. (4) Request from civil law enforcement agencies for training... 32 National Defense 2 2010-07-01 2010-07-01 false Providing military resources to civil... DEFENSE (CONTINUED) MISCELLANEOUS EMPLOYMENT OF MILITARY RESOURCES IN THE EVENT OF CIVIL DISTURBANCES...

  14. 32 CFR 806b.19 - Information compiled in anticipation of civil action.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information compiled in anticipation of civil action. 806b.19 Section 806b.19 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR... compiled in anticipation of civil action. Withhold records compiled in connection with a civil action or...

  15. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  16. A Review on Internet of Things for Defense and Public Safety

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M.; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-01-01

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS. PMID:27782052

  17. Neutralidade de Rede: O caso Comcast v. Netflix e o Marco Civil da Internet

    Directory of Open Access Journals (Sweden)

    Maria Eduarda Cintra

    2015-05-01

    Full Text Available Propósito – O artigo pretende fazer uma reflexão sobre como o Estado brasileiro avançou quanto à defesa do princípio da neutralidade de rede. Para essa análise, será utilizado o caso Comcast vs. Netflix como exemplo para comparar as ações do Estados Unidos e do Brasil sobre o tema. Metodologia/abordagem/design – O texto segue o método de abordagem de análise de problema para poder tirar conclusões sobre as práticas adotadas pelos Estados Unidos e pelo Brasil. Resultados – Foi constatado que o Brasil está na vanguarda sobre governança da internet, especialmente por zelar pela neutralidade de rede. Implicações práticas – O artigo serve para compreensão da discussão sobre neutralidade de rede e, especialmente, sobre o processo do Marco Civil da Internet no Brasil. Originalidade/relevância do texto – O artigo, ao fornecer uma perspectiva comparada entre o Estado americano e brasileiro, mostra como esse bem público, qual seja o da internet neutra e aberta, tem sido preservado.

  18. 32 CFR 269.4 - Cost of living adjustments of civil monetary penalties.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Cost of living adjustments of civil monetary... DEFENSE (CONTINUED) MISCELLANEOUS CIVIL MONETARY PENALTY INFLATION ADJUSTMENT § 269.4 Cost of living... increasing the maximum civil monetary penalty for each civil monetary penalty by the cost-of-living...

  19. Disputa política, neutralidade de rede e direitos dos usuários: A cobertura sobre a votação do Marco Civil da Internet

    Directory of Open Access Journals (Sweden)

    Camila Mont'Alverne

    2017-01-01

    the Marco Civil da Internet (a bill regulating Internet services. The goal is to study not only the newspapers’ opinions about the bill, but also their positions on issues beyond the Marco Civil involving conflicts between the government and the deputies of the coalition government. Adopting Robert Entman’s approach, the study proposes a content analysis of the framing of the debates. In all, seven frames were identified in the coverage of the debates: disagreements between the government and its allies; defense of Net neutrality; opposition to the bill; shortcomings of the bill; mobilization in favor of the bill; questions about the quality of service provided by telecom companies; and criticism of the existence of Brazilian data centers. In order to examine the editorials’ content, the frames were analyzed qualitatively, along with the actors and institutions referred to in the editorials. Analysis shows on the one hand that the coverage prioritized the conflicts between the president and the coalition, and on the other, that the arguments focused on the gaps in the bill and the defense of Net neutrality. The newspapers hold ambiguous positions on the Marco Civil—they both support the bill, and highlight the problems and interests which undermine the bill. With these editorials on the Marco Civil, the newspapers offer an interpretation to their readership, all the while trying to maintain the appearance of protectors of public interest and still defending their own interests as businesses producing online content. Ce travail essaie de comprendre comment les journaux O Estado de S. Paulo et Folha de S. Paulo ont dépeint, dans leurs éditoriaux, la controverse autour du vote sur le Marco Civil da Internet (une loi réglementant les services Internet à la Chambre des députés brésiliens. L’idée est de comprendre non seulement l’opinion des périodiques au sujet du projet de loi, mais aussi leurs positionnements dans un débat qui dépassait le cadre

  20. A Review on Internet of Things for Defense and Public Safety

    Directory of Open Access Journals (Sweden)

    Paula Fraga-Lamas

    2016-10-01

    Full Text Available The Internet of Things (IoT is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  1. A Review on Internet of Things for Defense and Public Safety.

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-10-05

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  2. The effects of workforce-shaping tools on retirement: the case of the Department of Defense civil service.

    Science.gov (United States)

    Asch, Beth J; Haider, Steven J; Zissimopoulos, Julie M

    2009-11-01

    Apriority area for the public health workforce research agenda is the study of the public health labor market and how wages and benefits affect workforce outcomes, including recruiting, retention, and retirement. This study provides an example of such a study for the Department of Defense civil service workforce. We analyze the financial incentives to retire that are specifically embedded in the retirement system and how different workforce-shaping policies would affect these incentives. The study then uses a recently estimated model of the effects of financial incentives on retirement behavior among defense civilians to predict how these workforce-shaping tools would affect retirement behavior. We find that buyouts, retention incentives, and other workforce-shaping tools have a sizable effect on predicted retirement behavior and therefore, could be useful policies to help manage retirement outflows.

  3. 32 CFR 537.17 - Scope for civil works claims of maritime nature.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Scope for civil works claims of maritime nature. 537.17 Section 537.17 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND ACCOUNTS CLAIMS ON BEHALF OF THE UNITED STATES § 537.17 Scope for civil works claims of maritime...

  4. 32 CFR 935.21 - Civil rights, powers, and duties.

    Science.gov (United States)

    2010-07-01

    ... INSULAR REGULATIONS WAKE ISLAND CODE Civil Law § 935.21 Civil rights, powers, and duties. In any case in... the laws of the United States or this part, the civil rights, powers, and duties as they obtain under... 32 National Defense 6 2010-07-01 2010-07-01 false Civil rights, powers, and duties. 935.21 Section...

  5. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  6. Regional Civil Support Forces for Homeland Defense and Civil Support Missions

    National Research Council Canada - National Science Library

    Nuismer, Barbara A

    2007-01-01

    To protect the homeland, a plan to form ten regional Civil Support Forces (CSF) made up of National Guard forces has been proposed by senior fellow Christine Wormuth of the Center for Strategic and International Studies (CSIS...

  7. To Fight Against the Defensive Jurisprudence with the New Civil Procedure Code: Yes, We Can! Or Can We?

    Directory of Open Access Journals (Sweden)

    Rafael Ambrósio Gava

    2016-10-01

    Full Text Available In order to reduce their workloads, Brazilian Courts have been landing many precedents that lead to unwarranted restrictions to the right to appeal, thereby belittling the fundamental constitutional right to access to justice. Despite the existence of studies on this "defensive jurisprudence", there are still few who analyze it in the light of the new Civil Procedure Code (Law 13.105/2015, which is about to enter into force. This article aims to evaluate the suitability of the new CPC to remedy this adjudicative problem or at least minimize it. We demonstrated, based on literature and through a deductive argumentative reasoning, that the new procedural law contains a number of specific and general legal clauses which may be used as instruments able to curb the adjudicate "defensiveness. Nonetheless, the achievement of this goal will depend largely on how this legal clauses are to be interpreted and applied.

  8. Coding and encoding rights in internet infrastructure

    Directory of Open Access Journals (Sweden)

    Stefania Milan

    2017-01-01

    Full Text Available This article explores bottom-up grassroots ordering in internet governance, investigating the efforts by a group of civil society actors to inscribe human rights in internet infrastructure, lobbying the Internet Corporation for Assigned Names and Numbers. Adopting a Science and Technology Studies (STS perspective, we approach this struggle as a site of contestation, and expose the sociotechnical imaginaries animating policy advocacy. Combining quantitative mailing-list analysis, participant observation and qualitative discourse analysis, the article observes civil society in action as it contributes to shape policy in the realm of institutional and infrastructure design.

  9. Activities of the Civil Defense Commission of the Federal Ministry of the Interior. Annual report 1979. Vol. 1

    International Nuclear Information System (INIS)

    1979-01-01

    The various working groups of the Committees I-III of the Commission report on the protective efficiency of buildings (shelters, crack formation, fire hazards), on the basic decisions to be taken in cases emergency, i.e. on the selection of appropriate provisions to be made for the protection of the population against hazards resulting from radioactive pollution of waters and air (civil defense) or from radiation exposure due to radioactive airborne particles and radioactive iodine, on radiation effects and the reduction of radiation impacts by specific substances, as well as on biological dosimetry in disaster relief. (DG) [de

  10. E-Commerce Adoption among Civil Servants of Selected States in ...

    African Journals Online (AJOL)

    Scholars have compared the way the Internet has changed the rules of ... doing things themselves with the ease, speed and convenience that internet ... Keywords: Civil Servants, Challenges, E-commerce, Socio-demographics, Nigeria ...

  11. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  12. Defense AT&L. Volume 40, Number 4, July-August 2011

    Science.gov (United States)

    2011-08-01

    program monitored by DCMA, KRCC, SAO-A, and ANA representatives. ANA and the new Afghanistan National Civil Order Police (ANCOP) personnel field-tested...or can’t meet a commitment, be up front about it. When you point out and explain your own lapses or potential roadblocks, it engen - ders trust in...senior military personnel, civil - ians, defense contractors, and defense industry professionals in pro- gram management and the acquisition

  13. The fallacy of "equal treatment" in Brazil's bill of rights for internet users A falácia da "igualdade de tratamento" na carta brasileira de direitos dos usuários da internet

    Directory of Open Access Journals (Sweden)

    J. Gregory Sidak

    2012-12-01

    Full Text Available The "Brazilian bill of rights for internet users," or "marco civil," has been under consideration at the brazilian congress since 2011. Marco civil's provisions for network neutrality have been particularly controversial. Proponents of network neutrality in Brazil advocate for the "equal treatment" of all data packets, including banning internet service providers from offering to content providers the option to purchase enhanced quality of service in the delivery of data packets. These network neutrality rules conflict with the other goals and principles of marco civil-particularly goals to promote internet access, to foster innovation, and to protect the constitutional right of freedom of speech and the free flow of information.A "carta Brasileira de direitos dos usuários da internet," ou "marco civil," tramita no congresso Brasileiro desde 2011. As disposições do marco civil relativas à neutralidade de rede são particularmente controversas. Os defensores da neutralidade de rede no Brasil advogam pela "igualdade de tratamento" de todos os pacotes de dados, inclusive proibindo que provedores de serviço de acesso à internet ofereçam aos provedores de conteúdo a opção de adquirir uma melhor qualidade de serviço na entrega de pacotes de dados. Essas disposições relativas à neutralidade de rede conflitam com outros objetivos e princípios do marco civil - especialmente os objetivos de promover o acesso à internet, promover a inovação, e garantir o direito constitucional de liberdade de expressão e informação.

  14. Internet Ethics Issues and Actions in Japan

    OpenAIRE

    江澤, 義典

    2013-01-01

    The International Symposium on Internet Ethics 2012 was planned and organized by the Korea Internet Security Agency and was held in September 2012 at the Lotte Hotel World in Seoul. This note relates to the presentation in Japan, it outlines current Internet ethics issues and actions in Japan. Moreover, four aspects of Japanese civilization were introduced as the bases of these ethics issues.

  15. 32 CFR 516.12 - Service of civil process outside the United States.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Service of civil process outside the United... AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Service of Process § 516.12 Service of civil process outside the United States. (a) Process of foreign courts. In foreign countries service of process...

  16. 32 CFR 516.10 - Service of civil process within the United States.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Service of civil process within the United States... CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Service of Process § 516.10 Service of civil process within the United States. (a) Policy. DA officials will not prevent or evade the service or process in...

  17. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. Brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling

    International Nuclear Information System (INIS)

    Bachmann, Udo; Biederbick, Walter; Derakshani, Nahid

    2010-01-01

    The recommendation for sampling for prevention of hazards in civil defense is describing the analytics of chemical, biological and radioactive contaminations and includes detail information on the sampling, protocol preparation and documentation procedures. The volume includes a separate brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling.

  18. 32 CFR 245.17 - U.S. civil and military air traffic control facilities.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false U.S. civil and military air traffic control facilities. 245.17 Section 245.17 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Procedures for Implementation of ESCAT §...

  19. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 2. Nuclear Weapons Effects and Shelter.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    Basic information about nuclear weapons is presented so that their effects can be meaningfully related to the defensive countermeasures which will be most effective against them. Major topics include: (1) Explosive power of nuclear weapons, (2) Major effects of nuclear explosions, (3) Two basic types of nuclear explosions, (4) Contrast between air…

  20. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  1. [Disaster Control and Civil Protection in Germany].

    Science.gov (United States)

    Kippnich, Maximilian; Kowalzik, Barbara; Cermak, Rudolf; Kippnich, Uwe; Kranke, Peter; Wurmb, Thomas

    2017-09-01

    The train crash of Bad Aibling/Germany in February 2016 and the terrorist attacks of the recent years in Europe have demonstrated the urgent need to be prepared for such disastrous events. Disaster preparedness and disaster control are very important governmental duties, as are civil protection and civil defense. In Germany the responsibility for those tasks are divided between the 16 "Länder" and the Federation. While the Federation takes care of the civil protection and disaster assistance, the Länder are responsible for disaster control. The presented article focuses on these issues and gives valuable insights into the German system of disaster control and civil protection with a focus on health protection. Georg Thieme Verlag KG Stuttgart · New York.

  2. Should bioengineering graduates seek employment in the defense industry?

    Science.gov (United States)

    Johnson, Arthur T

    2014-01-01

    They say that the difference between a mechanical engineer and a civil engineer is that the mechanical engineer develops weapons whereas a civil engineer designs targets. The implication is that some engineers are involved with building peaceful infrastructure whereas others contribute to destruction. This brings to mind the question: what is the proper role for engineers in the creation of weapons and defenses against them? In particular, should engineers specializing in biology or medicine be involved in the defense industry? After all, bioengineers are supposed to be builders or healers rather than warriors or destroyers.

  3. Nuclear war and other catastrophes. Civil and catastrophe protection in the Federal republic of Germany and the United Kingdom after 1945

    International Nuclear Information System (INIS)

    Diebel, Martin

    2017-01-01

    The book civil and catastrophe protection in the Federal republic of Germany and the United Kingdom after 1945 discusses the following issues: aerial defense and the atomic bomb (1945 - 1968), crises and catastrophes in the shadow of the bomb (1962 - 1978), civil defense and the comeback of the (nuclear) war (1976 - 1979), civil defense and the second ''Cold War'' (1979 - 1986), Chernobyl and the end of the Cold War (1979 - 1990), war, catastrophe and safety in the 20th century - a conclusion.

  4. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  5. Analysis of Air Force Civil Engineering Strategic Planning

    National Research Council Canada - National Science Library

    Mondo, Francis

    2003-01-01

    Several organizations within the Department of Defense, including the Air Force Civil Engineer, are actively engaged in strategic planning in an effort to create a roadmap for future capabilities and performance...

  6. 32 CFR 537.15 - Statutory authority for maritime claims and claims involving civil works of a maritime nature.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Statutory authority for maritime claims and claims involving civil works of a maritime nature. 537.15 Section 537.15 National Defense Department of....15 Statutory authority for maritime claims and claims involving civil works of a maritime nature. (a...

  7. A Rights-Based Approach to Internet Policy and Governance for the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The debate on Internet freedom has intensified over the last few years as governments and civil society organizations explore policies to safeguard online civil liberties and online security. Civil society organizations and academics have noted the growth of online censorship and surveillance. Many have argued for a more ...

  8. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  9. The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism

    Directory of Open Access Journals (Sweden)

    Murdoch Watney

    2007-06-01

    Full Text Available Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which results in an unjustifiable infringement of civil rights. Since countries worldwide are focusing attention on the control of information on the Internet, the debate in respect of state control and the consequences of state control is relevant on a global level as it impacts on all Internet-connected countries.

  10. 28 CFR 97.24 - No civil defense created.

    Science.gov (United States)

    2010-07-01

    ... intended to and does not establish a defense against an allegation of negligence or breach of contract..., statutory, and common law upon their activities (or other activities of a similarly hazardous nature). ...

  11. Law No.13.192 workers that execute radiological services it state included in the advantage of the laws 9.940 and 9744 to civil or militaries employers belonging to Ministry of National Defense

    International Nuclear Information System (INIS)

    1962-01-01

    The civil and military officials that lend services in dependences of the Ministry of National Defense in the tasks of radiological services were applied in the compute to be carried out the legal norms referred to effects of their retirement [es

  12. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  13. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  14. Internet - a resource for nuclear utilities

    International Nuclear Information System (INIS)

    Slone, B.J. III; Richardson, C.E.

    1993-01-01

    Internet is the name of the largest computer network in the world. It is actually a collection of many networks all running the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, connected through gateways and sharing common names and address spaces. Its purpose is to facilitate sharing of resources at participating organizations, which include government agencies, educational institutions, and private corporations. The Internet roots begin with the creation of the Advanced Research Projects Agency (ARPA) within the U.S. Department of Defense (DOD) in 1958. In 1969, the DOD formed a computer network for ARPA and gave it the name ARPANET. It was designed to help government scientists communicate and share information by allowing remote computer log-in and program execution, but it quickly became a tool for sharing information through file transfer, electronic mail, and interest-group mailing lists. In 1970, ARPA became the Defense Advanced Research Projects Agency (DARPA) and ARPANET became DARPANET. By 1980, the DARPANET had grown in size, and other connecting networks were being developed. To support system growth and performance, it was recognized that a new communication protocol was required. In 1983, DARPANET split into DARPANET and MILNET (Military Network), and the Internet was formed when the Defense Communications Agency, which managed both networks, mandated the use of TCP/IP for connected hosts. In 1986, the National Science Foundation (NSF) joined Internet. The NSF created NSFNET to link several national supercomputer centers to support scholarly research. It now comprises 17 networks, connecting to 23 midlevel wide-area networks across the continent. In turn, the midlevel networks link computers in more than 1000 university, government, and commercial research organizations throughout the world

  15. Twenty Years of Evolutionary Change in the Department of Defense’s Civil Support Mission

    Science.gov (United States)

    2013-05-23

    Joint Task Force – National Capitol Region MACA Military Assistance to Civil Authorities MSCA Military Support to Civil Authorities NCR National...Assistance to Civil Authorities ( MACA ). MSCA was defined as civil support consisting of support for natural or manmade disasters, chemical, biological...consequence management, and other support as required.16 MACA was defined as

  16. Processo de participação coletiva na internet: uma ética para o ciberespaço = The process of collective participation on the internet: ethics to the cyberspace

    Directory of Open Access Journals (Sweden)

    Parode, Fábio Pezzi

    2015-01-01

    Full Text Available Este ensaio tem como objetivo problematizar o papel da internet como agente de difusão de informação, ferramenta produtora de conhecimento e cultura. Os processos participativos em rede, as comunidades virtuais, colocam em evidência as tensões entre um antigo modelo calcado em estruturas de poderes centralizados, e a emergência de uma ordem dispersiva e fragmentária na dinâmica social. É nesse contexto que surgem as polêmicas em torno do Marco Civil da Internet, nosso objeto de estudo. A instauração do Marco Civil, deu lugar à concepção e busca de regulação da internet como patrimônio coletivo. Nosso objetivo é analisar o Marco Civil, no quadro das politicas de promoção do acesso à internet, através de um diálogo entre comunicação, ética e filosofia, questionando seus princípios fundamentais quanto ao pluralismo e a diversidade cultural, a fim de produzir uma reflexão fundamentada sobre os eixos reguladores deste projeto de Lei

  17. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. 2. ed.; Empfehlungen fuer die Probenahme zur Gefahrenabwehr im Bevoelkerungsschutz. Zur Analytik von chemischen, biologischen und radioaktiven Kontaminationen

    Energy Technology Data Exchange (ETDEWEB)

    Bachmann, Udo; Derakshani, Nahid; Drobig, Matthias; Koenig, Mario; Mentfewitz, Joachim; Prast, Hartmut; Uelpenich, Gerhard; Vidmayer, Marc; Wilbert, Stefan; Wolf, Manfred

    2016-07-01

    The recommendations for sampling for prevention of hazards in civil defense (analytics of chemical, biological and radioactive contaminations) cover the following topics: Requirements for sampling, description of the materials (chemical, biological and radioactive contaminated materials), decontamination, sample transport and protocol documents.

  18. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  19. Duties of care on the Internet

    NARCIS (Netherlands)

    van Eijk, N.; van Engers, T.; Wiersma, C.; Jasserand, C.; Abel, W.

    2011-01-01

    Internet Service Providers currently find themselves in the spotlight, both in a national and international context, with regard to their relationship both with governments and other private parties, on for example questions of (civil) liability. The paper focuses on duties of care as concerns the

  20. Offense-Defense Theory Analysis of Russian Cyber Capability

    Science.gov (United States)

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  1. Defense Support of Civil Authorities. Handbook No. 1.04

    National Research Council Canada - National Science Library

    2005-01-01

    This supplemental handbook presents an appreciation of U.S. military forces and their roles as part of Department of Defense support to Federal emergency response in a terrorist Weapons of Mass Destruction or Effect (WMD/E) incident...

  2. Commission for Civil Defense of the Federal Ministry of the Interior

    International Nuclear Information System (INIS)

    1985-01-01

    A survey is presented of the current organisation and status of civil defence in Denmark, Norway, Sweden, and Finland. Two lectures deal with social and psychological aspects. The activities and measures undertaken within the framework of civil defence have to take into account the physical effects of various nuclear weapons, and appropriate radiation protection, and protection from biological effects of neutron weapons. Limiting values for all nuclides have to be defined in order to be able to assess the hazards of contaminated food or drinking water after a nuclear disaster. For five of the lectures separate subject analyses have been prepared for the database. (DG) [de

  3. Brazilian Foreign Policy Towards Internet Governance

    Directory of Open Access Journals (Sweden)

    Maurício Santoro

    Full Text Available Abstract Snowden´s whistleblowing on the NSA program had a powerful impact in Brazil, prompting Dilma Rousseff´s administration to promote, at the United Nations, resolutions on Internet privacy, freedom of expression, as well as to host important multistakeholder conferences and, domestically, to approve the innovative legislation known as Marco Civil. These answers were only possible due to a network of officials and activists. However, Brazil´s global leadership in Internet governance is fragile, with many internal contradictions.

  4. Decline of Civilian power in Japan's Defense Policy

    OpenAIRE

    SEBATA, TAKAO; 瀬端, 孝夫

    2006-01-01

    Over the last thirty years, military official of Japan's Self-Defense Forces (SDF) have begun voicing their opinions more aggressively, exerting influence and power in such areas as: the right of personnel management, budget formulation, organization, and defense policy decision-making. Due to the enhanced status of military officials, change of power balance between civilians and military is taking place. This paper examines civil-military relations in the above areas and discusses how this ...

  5. Unleashed Potential: The Potential of Civil Military Support Elements in Theater Security Cooperation

    Science.gov (United States)

    2012-05-16

    MEC Ministerio de Educacion y Cultura (Minister of Education and Culture) METT-TC Mission, Enemy, Time, Troops Available, & Civil Considerations...interests. Moreover, the QDR calls for an expansion of civil affairs capacity especially in the face of Counterinsurgency and Counterterrorism operations...07, Department of Defense Joint Publication 3-57, and annual US Special Operations Command (USSOCOM) Posture Statements ( especially 2008) before

  6. 32 CFR Appendix A to Part 37 - What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment Agreements? A Appendix A to Part 37 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY...

  7. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper.

  8. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Science.gov (United States)

    Ma, Hing Keung; Chu, Miranda K. Y.; Chan, Winnie W. Y.

    2011-01-01

    In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper. PMID:22125462

  9. 41 CFR 101-30.504 - Cataloging data from Defense Logistics Services Center (DLSC).

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Cataloging data from Defense Logistics Services Center (DLSC). 101-30.504 Section 101-30.504 Public Contracts and Property... data from Defense Logistics Services Center (DLSC). Upon receipt of cataloging data from civil agencies...

  10. STUDENT VOLUNTEER ORGANIZATIONS IN THE MINISTRY OF THE RUSSIAN FEDERATION FOR CIVIL DEFENSE, EMERGENCIES AND ELIMINATION OF CONSEQUENCES OF NATURAL DISASTERS SYSTEM

    Directory of Open Access Journals (Sweden)

    Pravdov Mikhail Aleksandrovich

    2013-01-01

    Full Text Available The aim: the studing of the motivation of youth to volunteer activity. During the investigation were used methods of discussion, interviewing, interrogation and mathematical processing of data. In the article the experience of forming of youth voluntary social associations in Ivanovo region are regarded and the forming of a volunteers student group–“Sova” on the base of Ivanovo institute of the public fire service of the Ministry of the Russian Federation for Civil Defense, Emergencies and Elimination of Consequences of Natural Disasters. Was the level of Knowledge of Students about volunteer activity revealed, as well as the role student youth’s participation in volunteer organizations and the influence of the student volunteer associations on the development of pupils’ personalities in boarding school.

  11. Emergency Support Function 15: Communication Synchronization during Defense Support of Civil Authorities Operations

    Science.gov (United States)

    2015-06-12

    for the future. I would like to thank my parents Juan and Helen for their love, support, and guidance; your hard work and sacrifices have given me...required support to civil authortities during emergency relief operations.9 Once civil authorites are capable of resuming responsibility for the...Freeman posit the researcher has an understanding of the cognitive styles of the program stakeholders which will increase access and comprehension of

  12. 76 FR 2246 - Defense Support of Civil Authorities (DSCA)

    Science.gov (United States)

    2011-01-13

    ... Presidential nominating conventions, such as the United Nations General Assembly, Super Bowls, and the Group of..., direction, and control of the USD(P) shall: (1) Serve as the principal civilian advisor to the Secretary of... principal advisor to the Secretary of Defense for all DoD health policy shall: (1) Provide guidance and...

  13. Actual Problems of Civil Law Deals Signing in Internet

    Directory of Open Access Journals (Sweden)

    Makhinya E. A.

    2013-10-01

    Full Text Available The article deals with the problems connected with making deals in Internet. Here is analyzed the legal regulation of electronic transactions. The special attention is paid to the most characteristic peculiarities of making elec- tronic transactions such as identification of participants, transactional character of making electronic deals.

  14. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  15. The Civil War in cyberspace today

    Directory of Open Access Journals (Sweden)

    Matilde EIROA

    2015-03-01

    Full Text Available The appeal of the Spanish Civil War in the online world is a phenomenon deserving of attention, as an event that took place more than 75 years ago which still arouses debate and the curiosity of many. It is surprising that the media world considers it “newsworthy” and that it has an important presence on the Internet — on blogs, websites, You Tube, and even social media platforms such as Facebook and Twitter. This article examines all mention of the Civil War in online media. We start from the idea that the features of the online world allow for an extensive and multifaceted production of media of content which is more cultural, more social, and more attuned to the passing of time.

  16. 32 CFR 700.822 - Delivery of personnel to civil authorities and service of subpoena or other process.

    Science.gov (United States)

    2010-07-01

    ... service of subpoena or other process. 700.822 Section 700.822 National Defense Department of Defense... personnel to civil authorities and service of subpoena or other process. (a) Commanding officers or other... service of subpoenas or other process as provided by the Manual of the Judge Advocate General. ...

  17. Nuclear war and other catastrophes. Civil and catastrophe protection in the Federal republic of Germany and the United Kingdom after 1945; Atomkrieg und andere Katastrophen. Zivil- und Katastrophenschutz in der Bundesrepublik und Grossbritannien nach 1945

    Energy Technology Data Exchange (ETDEWEB)

    Diebel, Martin [Zentrum fuer Zeithistorische Forschung, Potsdam (Germany)

    2017-07-01

    The book civil and catastrophe protection in the Federal republic of Germany and the United Kingdom after 1945 discusses the following issues: aerial defense and the atomic bomb (1945 - 1968), crises and catastrophes in the shadow of the bomb (1962 - 1978), civil defense and the comeback of the (nuclear) war (1976 - 1979), civil defense and the second ''Cold War'' (1979 - 1986), Chernobyl and the end of the Cold War (1979 - 1990), war, catastrophe and safety in the 20th century - a conclusion.

  18. Civil-Military Relations and Gen. Maxwell Taylor: Getting It Right and Getting It Wrong

    National Research Council Canada - National Science Library

    Tart, Randal

    1997-01-01

    ... are paid. In the first situation, Taylor got his civil-military relations right, even though he fought a losing battle with President Eisenhower over Ike's dangerous defense strategy of 'massive retaliation...

  19. Boundaries - US Army Corps of Engineers - St. Paul District (MVP) Civil Works

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — The US Army Corps of Engineers - St. Paul District Civil Works boundary. Boundary is based on 1:24k watershed data and coordination with MVR to determine shared...

  20. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  1. The Civil-Military Gap in the United States. Does It Exist, Why, and Does It Matter?

    National Research Council Canada - National Science Library

    Szayna, Thomas S; McCarthy, Kevin F; Sollinger, Jerry m; Demaine, Linda J; Marquis, Jefferson P; Steele, Brett

    2007-01-01

    .... Specifically, there is a potential for a civil-military gap to undermine military effectiveness by reducing support for defense budgets, increasing the difficulties of recruiting quality people...

  2. Internet and Electronic Information Management

    Science.gov (United States)

    2003-04-01

    technologies ) and information markets (buying and selling information ), and the competitors’ success or failures. Such factors are beyond the control of... technology , and 1-19 market pressures. They have to cooperate with other entities within their organizations to develop more innovative information ...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP014048 TITLE: Internet and Electronic Information Management

  3. STUDENT VOLUNTEER ORGANIZATIONS IN THE MINISTRY OF THE RUSSIAN FEDERATION FOR CIVIL DEFENSE, EMERGENCIES AND ELIMINATION OF CONSEQUENCES OF NATURAL DISASTERS SYSTEM

    Directory of Open Access Journals (Sweden)

    Михаил Александрович Правдов

    2013-04-01

    Full Text Available The aim: the studing of the motivation of youth to volunteer activity. During the investigation were used methods of discussion, interviewing, interrogation and mathematical processing of data. In the article the experience of forming of youth voluntary social associations in Ivanovo region are regarded and the forming of a volunteers student group–“Sova” on the base of Ivanovo institute of the public fire service of the Ministry of the Russian Federation for Civil Defense, Emergencies and Elimination of Consequences of Natural Disasters. Was the level of Knowledge of Students about volunteer activity revealed, as well as the role student youth’s participation in volunteer organizations and the influence of the student volunteer associations on the development of pupils’ personalities in boarding school.DOI: http://dx.doi.org/10.12731/2218-7405-2013-1-41

  4. A PROMISING MECHANISM FOR FINANCING THE NATIONAL ECONOMY, SECURITY AND DEFENSE OF UKRAINE

    OpenAIRE

    Dmitry Klinovoi, Peter Rogov

    2017-01-01

    The principles of the permanent financing of necessities of state development, national safety and defensive due to forming of legal institute of civil property on natural resources and mechanisms of the sovereign financing by receivabless from natural rent are grounded here. The description of sovereign fund and fund of civil dividends as institutes of accumulation of state facilities and management of assets is given here.

  5. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective

  6. Developing Civil-Military Competencies Among Senior National Security Practitioners in Democratizing Latin America

    Science.gov (United States)

    2008-01-01

    President Raul Alfonsin did not retaliate against the military. Nor did President Carlos Menem in the 1990s. There was no question in either of these...1 Herbert C. Huser, Argentine Civil-Military Relations: From Alfonsin to Menem (Washington, DC: National Defense University Press, 2002

  7. Internet censorship in Turkey

    Directory of Open Access Journals (Sweden)

    Mustafa Akgül

    2015-06-01

    Full Text Available Turkey passed an internet censorship law in 2007 with the declared objective of protecting families and minors (Akdeniz, 2010. It established a unit within the regulator BTK (Information and Communication Technologies Authority responsible for imposing bans and blocks on websites based on nine catalogue crimes defined by other national laws (Akgül 2008, 2009a, 2009b. As of May 2015, 80,000 websites were banned based on civil code related complaints and intellectual property rights violations, reports the independent website Engelliweb. Blocking decisions rendered by penal courts are enforced even when they are based on grounds other that the nine catalogue crimes - such as terrorism, organised crime and crime against the state. Passed in parliament while ignoring the pleas of NGOs and of the internet sector, the Internet Law No. 5651 has since been used to temporarily ban popular platforms such as Blogger, Last.fm, Vimeo, Wordpress and YouTube. At the same time, some blocking decisions by the courts (e.g., Google and Facebook were not enforced by the authorities. Since its introduction, the European Court of Human Rights has ruled that Law No. 5651 (Council of Europe, 2011 is against the European Convention on Human Rights (ECHR, 2013. This article provides an overview of internet censorship and its social background in Turkey.

  8. [Regulating the internet: a comparative analysis of Brazil, Chile, Spain, the US, and France].

    Science.gov (United States)

    Segurado, Rosemary; Lima, Carolina Silva Mandú de; Ameni, Cauê S

    2015-12-01

    Global governance is of key concern in the current debate over the workings of the world's computer network, and Brazil has played a notable role in this process, especially after approval of the Marco Civil da Internet (law 12.965, april 23, 2014), which defines Brazil's regulatory framework for the internet. Dubbed the internet bill of rights, this law sets out the principles, guarantees, rights, and duties of internet users and providers in Brazil. Based on the fundamental categories of net neutrality, internet users' right to privacy, and copyright discussions from the perspective of intellectual property, the article offers a comparative analysis of regulations in five countries: Brazil, Chile, Spain, the US, and France.

  9. Eliminating mental disability as a legal criterion in deprivation of liberty cases: The impact of the Convention on the Rights of Persons With Disabilities on the insanity defense, civil commitment, and competency law.

    Science.gov (United States)

    Slobogin, Christopher

    2015-01-01

    A number of laws that are associated with deprivations of liberty, including the insanity defense, civil commitment, guardianship of the person and numerous competency doctrines in the criminal context, require proof of mental disability as a predicate. The Convention on the Rights of Persons With Disabilities commands signatory states to eliminate that predicate. Summarizing principles set out in my book Minding Justice: Laws That Deprive People With Mental Disability of Life and Liberty, I explain how this seemingly radical stance can be implemented. Specifically, this article proposes adoption of an "integrationist defense" in the criminal context, an "undeterrability requirement" when the state seeks preventive detention outside of the criminal process, and a "basic rationality and self-regard test" for incompetency determinations. None of these proposals requires proof of a mental disorder as a predicate condition. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Cyber Defense Exercises and their Role in Cyber Warfare

    OpenAIRE

    Bogdan Alexandru Bratosin

    2014-01-01

    The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exer...

  11. Missile Defense: LBJ's Bid To Curb Arms Race Gains Support.

    Science.gov (United States)

    Carter, L J

    1967-04-14

    In the article of 31 March on antiballistic missile defense, the last sentence of paragraph 2, p. 1654, should read: "Manpower for producing . . . but the outer limit would be about 200,000, or half the number of contractor employees and civil servants working for NASA at the peak of the Apollo program."

  12. Civil Defense Commission of the Federal Minister of the Interior

    International Nuclear Information System (INIS)

    1986-01-01

    The proceedings volume presents the inaugural address to the 35th Meeting of the Civil Defence Commission, the welcome addresses, a survey of the 35 years of existence and work done by the Commission, and the reports on the activities of the Technical Committees I and III-VI. The twelve scientific papers read at the meeting are given in full-text. They deal with radiation injuries caused by nuclear weapon explosions or reactor accidents, and with thermal and mechanical lesions due to nuclear weapons, with the diagnosis and therapy of the injuries, and with preventive measures, particularly through application of radioprotective substances. (MG) [de

  13. The Pseudonym on the Internet: Identity Creation and Space of Freedom

    Directory of Open Access Journals (Sweden)

    Marcienne Martin

    2016-02-01

    Full Text Available New Technologies of Information and Communication (TIC are located out of time and out of space. Indeed, the permanent connectivity of people through digital interfaces (binary type is at the origin of the implementation of completely new paradigms. Anonymity and privacy are two phenomena that oppose one another with respect to both the social practices and their concepts involved; they have a huge impact on the organizational structure of the various civil societies in the world. In addition, if the digital society is rooted in civil society, it does not duplicate. Moreover, on Internet users identify themselves by creating their pseudonymous and by the use of pseudonyms in a relationship without any hierarchy, while in civil society nomination is subject to the law.

  14. The International Criticality Safety Benchmark Evaluation Project on the Internet

    International Nuclear Information System (INIS)

    Briggs, J.B.; Brennan, S.A.; Scott, L.

    2000-01-01

    The International Criticality Safety Benchmark Evaluation Project (ICSBEP) was initiated in October 1992 by the US Department of Energy's (DOE's) defense programs and is documented in the Transactions of numerous American Nuclear Society and International Criticality Safety Conferences. The work of the ICSBEP is documented as an Organization for Economic Cooperation and Development (OECD) handbook, International Handbook of Evaluated Criticality Safety Benchmark Experiments. The ICSBEP Internet site was established in 1996 and its address is http://icsbep.inel.gov/icsbep. A copy of the ICSBEP home page is shown in Fig. 1. The ICSBEP Internet site contains the five primary links. Internal sublinks to other relevant sites are also provided within the ICSBEP Internet site. A brief description of each of the five primary ICSBEP Internet site links is given

  15. Global Internet Video Classroom: A Technology Supported Learner-Centered Classroom

    Science.gov (United States)

    Lawrence, Oliver

    2010-01-01

    The Global Internet Video Classroom (GIVC) Project connected Chicago Civil Rights activists of the 1960s with Cape Town Anti-Apartheid activists of the 1960s in a classroom setting where learners from Cape Town and Chicago engaged activists in conversations about their motivation, principles, and strategies. The project was launched in order to…

  16. ¿Qué seguridad? Riesgos y Amenazas de Internet en la Seguridad Humana

    Directory of Open Access Journals (Sweden)

    Rafael Rodríguez Prieto

    2016-01-01

    Full Text Available El auge de Internet ha puesto en cuestión muchas normas y aproximaciones sociopolíticas, incluyendo la forma de pensar la privacidad, la seguridad o los riesgos. Estos temas están muy presentes en nuestra sociedad. Este artículo aborda la ciberseguridad sin perder de vista los grandes temas de Internet. Todo ello implica que haya modos distintos de pensar la guerra, la privacidad, los riesgos, los conflictos o las libertades civiles y cómo podemos ajustarlas para garantizar los derechos civiles y la paz en la arena internacional. Son cuestiones serias e importantes pero es precisamente porque importan a todos, es necesario evaluar el impacto de Internet en los mismos. Lo que se pretende en este trabajo es evaluar el papel de la ciberseguridad en la sociedad internacional. Cuando lo que está en juego es el futuro de la paz o nuestras libertades digitales, no se pueden dejar las soluciones solo en manos de gobiernos o expertos. Precisamos comprender qué sucede y calibrar su importancia. Los ciudadanos debemos ser parte de la solución.

  17. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. Brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling; Empfehlungen fuer die Probenahme zur Gefahrenabwehr im Bevoelkerungsschutz. Zur Analytik von chemischen, biologischen und radioaktiven Kontaminationen. Kurzanleitung fuer die CBRN-Probenahme

    Energy Technology Data Exchange (ETDEWEB)

    Bachmann, Udo; Biederbick, Walter; Derakshani, Nahid (and others)

    2010-07-01

    The recommendation for sampling for prevention of hazards in civil defense is describing the analytics of chemical, biological and radioactive contaminations and includes detail information on the sampling, protocol preparation and documentation procedures. The volume includes a separate brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling.

  18. Governos, Empresas, Wikileaks e Governança da Internet

    Directory of Open Access Journals (Sweden)

    SELAIMEN, Graciela B.

    2011-08-01

    Full Text Available The WikiLeaks case is a concrete example of how close are the relationships between governments and private companies - a process that undermines democracy and questions the willingness of governments to act primarily on behalf of public interest. In this work we offer, analyzing the WikiLeaks episode in the end of 2010 from a regulatory a political perspective, a brief summary of the responses that emerged in one of the main spaces of discussion on the global governance of the Internet - the IGC, the Civil Society Caucus for Internet governance - in its attempt to respond to the complexity of the dispute over surveillance, control, freedom and autonomy in cyberspace.

  19. Defense Civil Support: DOD Needs to Identify National Guards Cyber Capabilities and Address Challenges in Its Exercises

    Science.gov (United States)

    2016-09-01

    participated in exercises to support civil authorities in a cyber incident or to test the responses to simulated attacks on cyber infrastructure owned by...authorities or to test the response to simulated attacks on cyber infrastructure owned by civil authorities. Of these 9 exercises, DOD conducted 7...and a response to simulated cyber attacks on electric grid networks. According to a North American Electric Reliability Corporation official, DOD

  20. Towards a Humanistic Conception of Cyberspace. A Twofold Challenge for Netizens Mobilizing for a Democratic Internet Governance

    Directory of Open Access Journals (Sweden)

    Elena PAVAN

    2009-01-01

    Full Text Available Our paper critically addresses the involvement and the role of civilsociety entities in new participatory forms of governance, using the Internetgovernance (IG debate as a case study. The Internet is first and foremost aglobal public space potentially available to everyone for the pursuit of the mostheterogeneous interests. As this global space becomes crucial in everyday lifeand consequences of interests pursuit within it capillary innerve the offlinedimension, new forms of governance are required to ensure that all stakeholdersare represented and actively involved in the management and development ofwhat can be conceptualized as a common pool resource (CPR. The commonsof the Internet space and its service as a CPR necessitate the involvement ofvarious competencies that are dispersed in intelligence networks to whichprivate sector and civil society necessary belong. In particular, we examine themeaning and the potential for the inclusion of civil society entities in this debatein relation to the achievement of a universal (and not only global Internet andthe consolidation of a humanized conception of IG. To this end, we propose ananalytical division of IG space in four sub-sectors (social commons;information and service commons; price commons; infrastructure commonsand we argue that civil society groups participation should be contextualizedand actions modulated following this dissection of competence and eligibilityspheres. Furthermore, the effort to achieve a democratic internet governancetranslates into a double challenge for civil society groups: on the one hand,occasions of direct influence must be fully exploited modulating actions in away that overcomes the inherent heterogeneity characterizing public interestsentities; on the other, a humanized vision has to be built up and consolidated inthe IG field in order to provide a set of benchmarks dynamically interactingwith market and traditional policy making logics. Finally, we will also

  1. NETWORK CULTURE - INTEGRAL PART OF NEW VALUES OF CIVIL SOCIETY

    Directory of Open Access Journals (Sweden)

    Vyacheslav Vladimirovich Sukhanov

    2014-06-01

    Full Text Available New technologies not only improve working conditions or communication, they are also bringing new values to  the society. This article discusses the concept of «network culture», which is now perceived by society as an integral part of values that can only exist in a civil society. We can research ( find   this kind of society in modern time period in Russia. The article analyzes the meaning of communication, how to use it, development processes in network media.  Nowadays network culture and its influence on society are almost in all spheres of state and society, as well as changes in perception of information and content generation process. Development of the Internet and Internet technologies largely set the tone for  the development of popular culture and allows you to store or to influence the national culture. Internet press today is and example which shows us, how this kind of tool can be used to influence on citizens.DOI: http://dx.doi.org/10.12731/2218-7405-2014-3-6

  2. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  3. United States Air Force Civil Engineering Additive Manufacturing Applications: Tools and Jigs

    Science.gov (United States)

    2016-03-24

    Its Potential Impact on Biotechnology and the Chemical Sciences. Analytical Chemistry, Vol. 86, 3240-3253. Halterman, T. (2014, August 28). 3D...2015). 3D Printing Makes Explosive Headway at AFIT. Civil Engineer Magazine , 23(1), 34-35. Smiths Detection. (2015). LCD 3.2E Handheld CWA & TIC...the Fleet’ Program. National Defense Magazine . Tan, A. (2014, Summer). Advanced Ordnance Teaching Materials. The Journal of ERW and Mine Action, 39

  4. Evaluating Options for Civil Space Situational Awareness (SSA)

    Science.gov (United States)

    Lal, B.; Carioscia, S. A.

    In recent years, the number of active satellites and human-made orbital space debris has increased dramatically. An expansion of activities in space, as is currently being proposed by many commercial and international entities, is expected to further exacerbate this challenge. The 18th Space Control Squadron under the Department of Defense (DOD) United States Strategic Command provides space situational awareness (SSA) services to users outside the national security community at no cost. International and commercial users demand better SSA service than is currently feasible, and the demand comes at a time when DOD is under pressure to better prepare for and respond to growing space-based threats to national security. Concerned about the possibility of overextending across conflicting missions in a fiscally constrained environment, some DOD officials have publicly noted a desire to move SSA services not related to national security out of DOD purview. Responding to a request from the Federal Aviation Administration (FAA) Office of Commercial Space Transportation (AST), researchers at the Science and Technology Policy Institute (STPI) identified and evaluated potential approaches for providing SSA services for civil and commercial operations in space. In this paper, we summarize the report [1] and present the pros and cons of four approaches to the provision of civil SSA services in the United States: (1) maintaining status quo through continued provision by DOD; (2) provision by a civil government entity; (3) industry self-provision; and (4) provision by an international organization. Within the second approach, assuming the provision of SSA by a civil agency, STPI further identified and discussed four options: (1) civil agency service capability embedded within DOD; (2) independent civil service capability, using DOD software and systems; (3) independent civil service capability, using commercial software and systems; and (4) the government certifies non

  5. Internet como marco de comunicación e interacción social The Internet as a framework for communication and social interaction

    Directory of Open Access Journals (Sweden)

    Félix Moral Toranzo

    2009-03-01

    Full Text Available En este trabajo se estudian las interacciones sociales en Internet, a partir de las respuestas de un cuestionario on-line. Se analizan las características sociodemográficas, los hábitos y las relaciones de estos usuarios en la Red. Internet se manifiesta como un espacio de interacción social, en el que las relaciones personales han tenido lugar en una gran mayoría de usuarios. Estas relaciones se muestran, en algunos aspectos, de forma diferente a las que tienen lugar cara a cara. Asimismo, las motivaciones y las consecuencias de mantener relaciones personales reflejan resultados diferentes con relación al sexo y al estado civil de los internautas. This article addresses social interaction on the Internet using an online questionnaire. The sociodemographic characteristics are analysed as well as the web users habits and relationships. The Internet is a social interactive place where personal relationships among users develop into important aspects of their lives. These relationships develop in different ways to relationships where people meet face to face. Also, motivation and the consequences of maintaining a personal relationships reflect, different results when comparing the web users gender and marital status.

  6. Policy to Foster Civility and Support a Healthy Academic Work Environment.

    Science.gov (United States)

    Clark, Cynthia M; Ritter, Katy

    2018-06-01

    Incivility in academic workplaces can have detrimental effects on individuals, teams, departments, and the campus community at large. Alternately, healthy academic workplaces generate heightened levels of employee satisfaction, engagement, and morale. This article describes the development and implementation of a comprehensive, legally defensible policy related to workplace civility and the establishment of a healthy academic work environment. A detailed policy exemplar is included to provide a structure for fostering a healthy academic work environment, a fair, consistent, confidential procedure for defining and addressing workplace incivility, a mechanism for reporting and subsequent investigation of uncivil acts if indicated, and ways to foster civility and respectful workplace behavior. The authors detail a step-by-step procedure and an incremental approach to address workplace incivility and reward policy adherence. [J Nurs Educ. 2018;57(6):325-331.]. Copyright 2018, SLACK Incorporated.

  7. Arguments completed in suit over Internet censorship.

    Science.gov (United States)

    1996-05-31

    Closing remarks on the Communications Decency Act, requiring Internet providers to censor materials that may be unsuitable for minors, were heard on May 10, 1996. The American Civil Liberties Union (ACLU) is leading the challenge to the law. Because information about HIV necessarily must deal with sexual practices, HIV/AIDS service providers would be forced to either avoid talking about the subject or find ways to prevent minors from accessing the information. During the oral arguments, U.S. Justice Department attorney Anthony Coppolino tried to show that the Internet is more like a broadcast medium such as television or radio and is different from newspapers, which enjoy a constitutional protection against government censorship. ACLU attorney Christopher Hansen disagreed, saying the reverse is true. The ACLU said parental control mechanisms such as SurfWatch, Net Nanny, and Cyberpatrol are commercially available to parents who wish to restrict their children's Internet access and are more effective than the government's proposal. The court is expected to rule on the lawsuit in several weeks. An appeal to the U.S. Supreme Court is expected, regardless of the outcome.

  8. Civil Liability And Indemnity For Moral Damage In Labour Law: Application Of The Doctrine Of Punitive Damages

    Directory of Open Access Journals (Sweden)

    Elizabete Geremias

    2016-12-01

    Full Text Available This paper aims to explain and analyze the importance of the civil liability under labour law with particular emphasis on the application of the doctrine of "punitive damages" as a breakthrough for the development of Brazilian law in the field of solutions to real problems to the fundamental rights at work. The problem of the research is to identify the application of the doctrine of "punitive damages", its justification under the system of civil liability and, in particular, its applicability as a defense mechanism for fundamental rights at work. The research is descriptive and explanatory, documentary-bibliographical.

  9. AV-8B Remanufacture Program as Part of the Audit of the Defense Acquisition Board Review Process - FY 1994

    Science.gov (United States)

    1994-06-03

    wft*:¥A:ft:i:ft& OFFICE OF THE INSPECTOR GENERAL AV-8B REMANUFACTURE PROGRAM AS PART OF THE AUDIT OF THE DEFENSE ACQUISITION BOARD...Part of the Audit of the Defense Acquisition Board Review Process - FY 1994 B. DATE Report Downloaded From the Internet: 03/23/99 C. Report’s Point...NAVY FOR RESEARCH DEVELOPMENT AND ACQUISITION SUBJECT: Audit Report on the AV-8B Remanufacture Program as Part of the Audit of the Defense

  10. Aviation Research and the Internet

    Science.gov (United States)

    Scott, Antoinette M.

    1995-01-01

    The Internet is a network of networks. It was originally funded by the Defense Advanced Research Projects Agency or DOD/DARPA and evolved in part from the connection of supercomputer sites across the United States. The National Science Foundation (NSF) made the most of their supercomputers by connecting the sites to each other. This made the supercomputers more efficient and now allows scientists, engineers and researchers to access the supercomputers from their own labs and offices. The high speed networks that connect the NSF supercomputers form the backbone of the Internet. The World Wide Web (WWW) is a menu system. It gathers Internet resources from all over the world into a series of screens that appear on your computer. The WWW is also a distributed. The distributed system stores data information on many computers (servers). These servers can go out and get data when you ask for it. Hypermedia is the base of the WWW. One can 'click' on a section and visit other hypermedia (pages). Our approach to demonstrating the importance of aviation research through the Internet began with learning how to put pages on the Internet (on-line) ourselves. We were assigned two aviation companies; Vision Micro Systems Inc. and Innovative Aerodynamic Technologies (IAT). We developed home pages for these SBIR companies. The equipment used to create the pages were the UNIX and Macintosh machines. HTML Supertext software was used to write the pages and the Sharp JX600S scanner to scan the images. As a result, with the use of the UNIX, Macintosh, Sun, PC, and AXIL machines, we were able to present our home pages to over 800,000 visitors.

  11. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    Science.gov (United States)

    2010-08-01

    SUBJECT TERMS Internet Protocol, Computer Networking, Network Security, Computer Security, Technology Deployment 16. SECURITY CLASSIFICATION OF...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and...Science and Technology committee and the Internet Architecture Board. Dr. Sincoskie was Executive Director of the Computer Networking Research

  12. Rezension: World Wide War: Angriff aus dem Internet/Cyber War: The Next Threat to National Security and What to Do About It von Richard A. Clarke und Robert K. Knake/by Richard A. Clarke and Robert K. Knake

    Directory of Open Access Journals (Sweden)

    Karl H. Stingeder

    2015-03-01

    Full Text Available Je breiter der Infrastruktur-Anschluss eines Landes an das World Wide Web, desto größer die Angriffsfläche im Fall eines Netzkriegs. Die Messung der virtuellen Kampfkraft erfolgt auf Basis von drei Faktoren: Offensivkraft, Defensivfähigkeit und die Abhängigkeit vom Internet. Die USA verfügen als "Supermacht" zwar über die größte virtuelle Offensivkraft, gleichzeitig steht die Nation Cyberangriffen sehr verwundbar gegenüber. Dagegen sind in Nordkorea kaum Systeme vom Internet abhängig. Obwohl die offensiven Netzkriegskapazitäten Nordkoreas verhältnismäßig gering sind, präsentiert sich die virtuelle Kampfkraft des nordkoreanischen Regimes in Bestform. Die Verwundbarkeit ziviler Systeme, insbesondere der Energieversorgung, muss in direkter Korrelation mit deren Anknüpfung an das Internet betrachtet werden. The more broadly connected a country’s infrastructure and energy distribution, the greater its vulnerability in the event of a cyber war. Measuring this virtual fighting power is based on three factors: offensive and defensive strength, as well as dependency on the Internet. As a superpower, the USA has the greatest virtual offensive strength available. At the same time, the nation is most susceptible to cyber attacks and therefore most vulnerable. By contrast, North Korea’s offensive cyber fighting power is relatively small, but its overall cyber war capabilities are cutting-edge. The vulnerability of civil systems, especially power supply, must be viewed in direct correlation to their connection to the Internet.

  13. An Internet-Based Course And The Application Of Employment-Based Methods In Civil Engineering Projects

    NARCIS (Netherlands)

    de Boer, S.J.; van de Vis, Dimitri; van de Vis, Dimitri; Mosch, Lars P.J.; Taylor Perkins, F.

    2001-01-01

    The paper addresses the question of how educational activities in civil engineering in the Netherlands can contribute to the application of employment-based programs in developing countries. National policy makers and international donor representatives acknowledge the various advantages of

  14. Cluster as a Tool to Increase the Competitiveness and Innovative Activity of Enterprises of the Defense Industry Complex

    Directory of Open Access Journals (Sweden)

    Katrina B. Dobrova

    2017-01-01

    Full Text Available Purpose: the main goal of the publication is to make a comprehensive study of the possible application of the cluster approach to improve the competitiveness and innovation activity of enterprises of the defense industry complex.Methods: the methodology of the research is based on the collection and analysis of initial data and information, the article uses a systematic approach to the study of socio-economic processes and phenomena. The research is based on modern theory of competition, innovation, as well as the modern paradigm of cluster development of the economy. In preparing the study, practical materials from Corporation “Rostec”.Results: the article gives the notion of cluster, the prospects for the use of the cluster approach to enhance competitiveness and innovation enterprises of the military-industrial complex. It is noted that the activation of interaction with the “civil sector” is particularly relevant in the context of the reduction of the state defense order, and the theory and practice of cluster management offers a number of forms of cluster interaction between the enterprises of the defense industry and the civil sector. It is emphasized that the development of cluster mechanisms can solve a number of problems related to the insufficient financial stability of defense industry enterprises in the context of a reduction in the state defense order, low innovation activity and the lack of developed models of interaction with small innovative enterprises. Ultimately, the use of cluster mechanisms in the development of defense enterprises is intended to enhance the competitiveness of the complex, both nationally and globally. It is stated that the existing clusters are not able to fully solve a number of specific tasks related to the diversification of integrated defense industry structures. Attention is drawn to the fact that existing clusters are not able to fully solve a number of specific tasks related to the

  15. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    .... During a crisis, the President and Secretary of Defense could authorize use of Title 10 forces. However, this "just in time" approach does not allow for the units assigned the opportunity to be fully trained to respond...

  16. Internet Technology on Spacecraft

    Science.gov (United States)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current

  17. Department of Defense, Atlas/Data Abstract for the United States and Selected Areas, Fiscal Year 1997

    Science.gov (United States)

    1997-01-01

    Defense Reform Initiative to move to paper-free business operations, future editions of this publication will only be available through the Internet . All...applicable maps when all of their facilities are returned to the host nation. INTERNET AVAILABILITY Information presented in the Atlas is available through...Description Amount 1. IDEMITSU KOSAN CO. LTD. $78,597 Fuel Oils $70,854 2. KIT PAR COMERCIO DE PARAFUSOS 77,080 Electric Services 77,080 3. TOKYO

  18. Militias: Exploring Alternative Force Structures for National Defense

    Science.gov (United States)

    2014-06-01

    development in the art of warfare and 15 Mario A. Fumerton, “Rondas Campesinas in the Peruvian Civil War: Peasant Self-defense Organizations in...tr ai ni ng N at io na l l ev el su pp or t N at io na l d riv en id eo lo gy Pr e- ex is tin g ci vi lia n sk ill s Primary category...national framework providing guidance for the militia groups to act. This variable varies within and across cases, and will be discussed further

  19. [Expertise test in the new Civil Prosecution Law (Law 1/2000)].

    Science.gov (United States)

    Laborda Calvo, E

    2004-12-01

    Expertise test was the object of many controversies in the previous Civil Prosecution Law (CPL) from the way of naming the experts to the difficulties in the receiving payment. The new CPL uses the social process as model and provides civil justice with an agile and guaranteeing procedure. The CPL provides the expert test with a greater amplitude and new range, and should be used at the time of the lawsuit and openly seen. The experts should assume the defense of their arguments and be subjected to the objections of the contrary party. The expert's test becomes a mixed documental and personal test. It also modifies the way of naming the experts and the acceptance that may condition the allocation of funds in the amount considered necessary. The objection is limited to the experts named judicially, it being possible to eliminate them, however, the reason for it should be justified.

  20. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  1. Internet map of the Hungarian nuclear field

    International Nuclear Information System (INIS)

    Besenyei, Elisabeth

    2001-01-01

    The increasing role of Internet in the dissemination of information cannot be questioned. The organisations dealing with public information have to face with this challenge. New methods and ways are needed in order to effectively use this opportunity. An effective communication requires certain knowledge on the characteristics of the target group. The present situation on the Internet use in Hungary has been studied by a number of public opinion polls. In Europe Hungary is the eleventh in the row concerning the population percentage of Internet users. At the same time it is hard to define the exact number as it is continuously increasing. From the public opinion polls it can be seen that about 49 % of active Internet users, about 37 percent seek for information on the Internet. The organisations playing role in nuclear field includes nuclear facilities, research institutes, regulatory bodies as well as civil associations. Almost all of them realised the importance of the appearance on the Internet and have their web site. Among the web-sites of the Hungarian nuclear facilities the new home page of the Paks NPP (www.npp.hu) is especially well designed and worth to visit. The Atomic Energy Research Institute operates the 10 MW Budapest Research Reactor. The main features of the reactor can be found on the web site of the institute (www.kfki.hu/~aekihp/). Information about the research possibilities of the training reactor of the Institute of Nuclear Techniques of the Technical University of Budapest is provided on the web site (www.reak.bme.hu). The web site of the Hungarian Atomic Energy Authority (www.haea.gov.hu) has been renewed recently. Certainly, the list of the web sites of the Hungarian organisations active in nuclear field cannot be complete as it is a continuously evolving area. Nevertheless one can see that the players realised the importance of the challenge given by the Internet. While considerable effort is needed to maintain and refresh the web site

  2. Art and Civil Action : Cultural Organizations in the European Civil Domain

    NARCIS (Netherlands)

    Gielen, Pascal; Lijster, Thijs

    2017-01-01

    In this article, the place of new cultural organizationsin the civil domain is analysed. The authors describe a theoretical model that they call the ‘civil chain’, describing the different phases in which civil organizations develop themselves. The civil chain delivers analytic insights into the

  3. Campaigning on the Internet: 2008 Presidential General Election Candidate Webpage

    Directory of Open Access Journals (Sweden)

    William L. Benoit

    2016-12-01

    Full Text Available The Internet is becoming an increasingly important component of political campaigns. This study employed content analysis to apply Functional Theory and Issue Ownership Theory to Obama’s and McCain’s presidential candidate webpages in the 2008 campaign. Acclaims (92% were more common than attacks (98%; defenses did not occur in this sample. Policy (82% was addressed more than character (18%. When discussing policy, these candidates addressed future plans most frequently, followed by general goals and then past deeds; on character, candidates discussed ideals, then personal qualities, and then leadership ability. This study shows that as candidates use the Internet to reach voters, their webpages conform to theoretical expectations.

  4. Internet use and addiction among medical students of Universiti Sultan Zainal Abidin, Malaysia

    Directory of Open Access Journals (Sweden)

    Haque M

    2016-11-01

    Full Text Available Mainul Haque,1 Nor Azlina A Rahman,2 Md Anwarul Azim Majumder,3 Seraj Zohurul Haque,4 Zubair M Kamal,5 Zakirul Islam,6 ATM Emdadul Haque,7 Nor Iza A Rahman,8 Ahmed Ghazi Alattraqchi8 1Unit of Pharmacology, Faculty of Medicine and Defense Health, National Defense University of Malaysia, Kuala Lumpur, 2Department of Biomedical Science, Kulliyyah of Allied Health Sciences, Kuantan, Malaysia; 3Department of Clinical Sciences, School of Medical Sciences, Faculty of Life Sciences, University of Bradford, Bradford, 4School of Medicine, University of Dundee, Ninewells Hospital & Medical School, Dundee, UK; 5Sleep Research Unit, Toronto Western Hospital, University Health Network, Toronto, ON, Canada; 6Department of Pharmacology and Therapeutics, Eastern Medical College, Comilla, Bangladesh; 7Department of Medical Education, Universiti Kuala Lumpur Royal College of Medicine Perak (UniKL RCMP, Ipoh, 8Faculty of Medicine, Universiti Sultan Zainal Abidin, Kuala Terengganu, Malaysia Background: The use of Internet has now become indispensable, and the technology has revolutionized the medical education and practice worldwide. Currently, medical students and professionals have an enormous opportunity to keep them always updated with the exponential growth of knowledge because of potential progression of Internet throughout the world that enables them to become a lifelong learner. Internet addiction is a widespread phenomenon among students and academicians at universities in Malaysia. Students use the Internet for recreational purpose and personal and professional development. The Internet has become an integral part of day-to-day life of the university students, including medical students. The aim of the present study was to examine the Internet use and addiction among students of Universiti Sultan Zainal Abidin, Malaysia.Methods: This was a cross-sectional study in which a questionnaire, Internet Addiction Diagnostic Questionnaire, developed by the Center

  5. Lineage of global civil engineering. Global civil engineering no keifu

    Energy Technology Data Exchange (ETDEWEB)

    Hashimoto, M

    1994-04-15

    This paper considers which way the global civil engineering should go in the future. Civil engineering has now a paradigm with a new dimension debuted as the global environmental problems are taken up specifically. Achieving the target of civil engineering requires a critical review that how the cost effect and efficiency discussions in only the dimensions of the conventional technologies and economies can be incorporated into the dimensions and measures of new fields to create the new horizons. Conceiving the relationship between civil engineered structures and environmental climate encounters the indispensable judgment criterion on how such social scientific conditions as weather, culture, religion, economy, and politics are combined to reach a judgment. The global civil engineering is desired to have the ideas and directional role to work on the ultimate assignment of environment and development called a global environmental problem analytically, comprehensively, innovatively and creatively as the civil engineering science, rather than as a mere existence of one area of the advanced civil engineering science. 5 refs., 1 tab.

  6. Remote monitoring of instrumented structures using the Internet information superhighway

    Science.gov (United States)

    Fuhr, Peter L.; Huston, Dryver R.; Ambrose, Timothy P.

    1994-09-01

    The requirements of sensor monitoring associated with instrumented civil structures poses potential logistical constraints on manpower, training, and costs. The need for frequent or even continuous data monitoring places potentially severe constraints on overall system performance given real-world factors such as available manpower, geographic separation of the instrumented structures, and data archiving as well as the training and cost issues. While the pool of available low wage, moderate skill workers available to the authors is sizable (undergraduate engineering students), the level of performance of such workers is quite variable leading to data acquisition integrity and continuity issues - matters that are not acceptable in the practical field implementation of such developed systems. In the case of acquiring data from the numerous sensors within the civil structures which the authors have instrumented (e.g., a multistory building, roadway/railway bridges, and a hydroelectric dam), we have found that many of these concerns may be alleviated through the use of an automated data acquisition system which archives the acquired information in an electronic location remotely accessible through the Internet global computer network. It is therefore a possible for the data monitoring to be performed at a remote location with the only requirements for data acquisition being Internet accessibility. A description of the developed scheme is presented as well as guiding philosophies.

  7. Defense and Regional Integration: Brazil’s Weapons Industry Case

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2009-06-01

    Full Text Available This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the possibility of the defense industry works as mechanism of regional integration.

  8. The Strategic Defense Initiative. Issues and Implications for the Atlantic Alliance.

    Science.gov (United States)

    1988-05-01

    Schwartz (Washington, D.C.: The Brookings Institution, 1984), p. 41. 10 Ibid., pp. 41-42. 11 Ibid., pp. 332-333. 12 Barash, p. 142. 13 Brian Green , "The...Initiative. New York: John Wiley and Sons, 1986. Freedman, Lawrence. Arms Control-Management or Reform? Chatham House Papers 31. London: Routledge and Kegan ...Delusions." Policy Review. (Summer 1986) : pp. 48-53. Green , Brian. "The New Case For Civil Defense." The Heritage Foundation Backgrounder. No. 377, August 29

  9. Stasis and Bellum Civile

    DEFF Research Database (Denmark)

    Lange, Carsten Hjort

    2017-01-01

    David Armitage’s new monograph Civil Wars: A History in Ideas (2017) will undoubtedly long remain a standard reference work. It presents readers with a vision of civil war as part of the longue durée. The argument might be further strengthened, however, if a more inclusive Greco-Roman approach...... to ancient civil war is accepted. This essay focuses on stasis vs. bellum civile, the origins of the concept of civil war, the approach of later Roman writers (such as Appian and Cassius Dio) to the concepts of stasis and bellum civile, and, finally, the question of what makes a civil war a civil war....... Whatever concepts were used, the Romans were not the first to experience internal war as a civil war—that is, a war between the citizens of a polity....

  10. Tendencies of development of defensive-industrial complex of lead nations of the world

    Directory of Open Access Journals (Sweden)

    O. F. Salnikova

    2014-11-01

    Full Text Available In the article the analysis of development of defensive-industrial complex of lead nations of the world is conducted , namely the United States of America and countries-participants of European Union and NATO. Also in the the article control system of the defensive-industrial policy of the USA is schematically represented. The analysed materials gave an opportunity to draw conclusion, that guidance of military industrial concerns of the USA managed clearly to define acceptable strategies of restructuring and successfully to realize them, integrating new enterprises with the use of front-rank methods of organizational management that became the basic engine of development of defensive industry of the USA. To the number of basic progress of defensive-industrial complex of lead nations-participants of NATO and EU trends it is possible to take the following: creation of the large defensive-industrial integrated structures on development and production of modern armament and military technique on national, transnational and transatlantic levels; rapprochement of military and civil sectors of economy; large corporations go across from mass to the «flexible» production, due to what it is possible to arrive at high efficiency of production of weapons and military equipment even at small series; through diminishing of volumes of assignations on the purchase of defensive products and considerable complication of the modern systems of armament, some leading defensive firms-contractors began to work from the production of armament and military technique to scientific research-and-developments.

  11. Defense AT&L (Volume 37, Number 3, May-June 2008)

    Science.gov (United States)

    2008-06-01

    software in countless critical applications like the Berke - ley Internet Name Domain software that provides name resolution on DoD networks and the global...needs, that expense represents an inefficiency that is either paid for by the taxpayers or by the stockholders of the corporation . The defense...security is the drug trade and narco-terrorism. Drug revenues finance and equip terrorists and insurgents, so if the movement of drugs can be interdicted

  12. PROSES PENYELESAIAN SENGKETA PERDATA DI PENGADILAN NEGERI DALAM KAITANNYA DENGAN TRANSAKSI YANG MENGGUNAKAN INTERNET

    Directory of Open Access Journals (Sweden)

    Sanyoto Sanyoto

    2013-10-01

    Full Text Available The growth of technological Progress make the change of pattern in  the socialize human life, and it can conduct the economic activity in the local scale, regional and also global. In the individual assocciation by using internet technology will take the relation pattern between individual which it is unlike what that happened in the real world. By the existence of internet, contractual terms between subject of law and each other without meeting (face to face, even it is enabled for subject of law not to recognizing each other. During the people conducting activity in the illusory world, especially in the private law, like commerce, agreement and also banking activity, it is enabled to take a problems such as performed in the conventional private relationship. If the consumer internet in the private activity feel their private rights are impinged and they are wish to claim their rights, so there is civil conflict.  The relationship between the individual in the transaction using internet not yet arrange peculiarly in law and regulation. But judge have to find the law and also create the law if he confronted with a dispute in the transaction using internet.   Kata kunci : hakim, hukum, internet, perdagangan elektronik, tanda tangan digital

  13. Gender, internet experience, Internet identification, and internet anxiety: a ten-year followup.

    Science.gov (United States)

    Joiner, Richard; Gavin, Jeff; Brosnan, Mark; Cromby, John; Gregory, Helen; Guiller, Jane; Maras, Pam; Moon, Amy

    2012-07-01

    In 2002, we found gender differences in the use of the Internet. Since then, however, the Internet has changed considerably. We therefore conducted a follow-up study in 2012. The study involved 501 students (389 females and 100 males, 12 participants unspecified gender) and we measured Internet use, Internet anxiety, and Internet identification. We found that males had a greater breadth of Internet use; they used the Internet more for games and entertainment than females. The differentiation between males and females in terms of Internet use is evident, and in some ways is even more distinct than 10 years ago. In our previous research we had found no gender differences in the use of the Internet for communication, whereas in the current study we have found that females use the Internet for communication than males and were using social network sites more than males. We also found, consistent with our previous study, that Internet identification and Internet anxiety were related to Internet use.

  14. PROSES PENYELESAIAN SENGKETA PERDATA DI PENGADILAN NEGERI DALAM KAITANNYA DENGAN TRANSAKSI YANG MENGGUNAKAN INTERNET

    Directory of Open Access Journals (Sweden)

    Sanyoto Sanyoto

    2008-05-01

    Full Text Available The growth of technological Progress make the change of pattern in the socialize human life, and it can conduct the economic activity in the local scale, regional and also global. In the individual assocciation by using internet technology will take the relation pattern between individual which it is unlike what that happened in the real world. By the existence of internet, contractual terms between subject of law and each other without meeting (face to face, even it is enabled for subject of law not to recognizing each other. During the people conducting activity in the illusory world, especially in the private law, like commerce, agreement and also banking activity, it is enabled to take a problems such as performed in the conventional private relationship. If the consumer internet in the private activity feel their private rights are impinged and they are wish to claim their rights, so there is civil conflict. The relationship between the individual in the transaction using internet not yet arrange peculiarly in law and regulation. But judge have to find the law and also create the law if he confronted with a dispute in the transaction using internet.

  15. Burden of proof of the exclusions of unlawfulness in the criminal process and the necessity to break with its civil origin

    Directory of Open Access Journals (Sweden)

    Rafael Fecury Nogueira

    2018-03-01

    Full Text Available The present work proposes a critical analysis about the burden of proof of the exclusion of unlawfulness in criminal procedure, researching about the responsible for it, whether prosecution or defense. Traditionally, in Brazil, the jurisprudential orientation links the burden of proof of the exclusion of unlawfulness to the defendant. This link happens because the exclusion of liability’s cases is equated to the civil theory about impeding, modifying or extinguishing rights facts. The following study is focused in the origin of the theses that allowed the construction of the current conception. This method enables to compare the civil and the criminal rules concerning to the burden of proof. For a detailed understanding of the subject, it is necessary to carry out a historical course of dogmatic aspects specific to civil procedural law and criminal law that converge to the current theme, such as the rule of distribution of the burden of proof in the civil procedure and the evolution of crime’s theory.

  16. The Internet Addiction Test: assessing its psychometric properties in Bangladeshi culture.

    Science.gov (United States)

    Rezaul Karim, A K M; Nigar, Naima

    2014-08-01

    There is growing importance of the Internet Addiction Test (IAT) in Internet addiction research around the world. Since the development of the IAT (Young, 1996, 1998), a number of validation studies have been done in various cultures. The aim of this study was to translate the instrument into Bangla and validate in Bangladeshi culture, a culture vulnerable to Internet addiction. A total of 177 Internet users (77 females and 100 males) participated in the study. Exploratory factor analysis (EFA) of the data from 172 participants (who provided complete responses) identified a four factor structure of the IAT with 18 items. The four factors namely 'Neglect of duty', 'Online dependence', 'Virtual fantasies', and 'Privacy and self-defense' together explained 55.68% of the total variance. Problematic (moderate/excessive) users on the IAT scored, on average, higher on each of the four IAT factors as compared to average or non-problematic (minimal) users consistently across genders. The IAT and its factors showed good internal consistency (Cronbach's α=.89 for the IAT, and .60-.84 for the factors), strong convergent and discriminant validity. Thus, the Bangla version IAT appears to be valid and reliable and therefore may be used in further research on Internet addiction in the country. Copyright © 2013 Elsevier B.V. All rights reserved.

  17. Campaigning on the Internet: 2008 Presidential General Election Candidate Webpage

    OpenAIRE

    William L. Benoit; Mark Glant; Leslie Rill

    2016-01-01

    The Internet is becoming an increasingly important component of political campaigns. This study employed content analysis to apply Functional Theory and Issue Ownership Theory to Obama’s and McCain’s presidential candidate webpages in the 2008 campaign. Acclaims (92%) were more common than attacks (98%); defenses did not occur in this sample. Policy (82%) was addressed more than character (18%). When discussing policy, these candidates addressed future plans most frequently, followed by gener...

  18. Re-thinking civil disobedience

    Directory of Open Access Journals (Sweden)

    Theresa Züger

    2013-11-01

    Full Text Available This article points out a struggle of today’s societies with the traditional concepts of civil disobedience and stresses the need for reevaluation of the concept of civil disobedience for policy making and public discourse. Starting with a minimal definition of civil disobedience, the article introduces Hannah Arendt’s approach for a legitimisation of civil disobedience and discusses her ideas for digital actions, which are increasingly framed as digital forms of civil disobedience. Addressing WikiLeaks as an example of digital civil disobedience, the author problematises the internal secrecy of WikiLeaks and the focus on Julian Assange as a single decision-maker. Both aspects challenge Arendt’s understanding of legitimate civil disobedience. Even though traditional criteria of civil disobedience need to be revisited in the digital age, organisations or disobedience actors might themselves in their actions be well-advised to comply with the principles they fight for.

  19. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  20. PERAN INTERNATIONAL CIVIL AVIATION ORGANIZATION ATAS PENERBANGAN SIPIL KOMERSIAL INTERNASIONAL DIATAS WILAYAH KONFLIK (STUDI KASUS ATAS PENEMBAKAN PESAWAT MALAYSIA AIRLANES MH17 DI RUANG UDARA UKRAINA 2014)

    OpenAIRE

    Nopansyah, Jaka

    2015-01-01

    This research entitled"The role of the international civil aviation organization on international commercial civil aviation over the area of conflict" (A case study on Malaysia Airlines MH17 flight shooting in the air space of Eastern Ukraine in 2014) The research method used is Normative Research, Library Research at Atmajaya University Yogyakarta, And Internet Media. MH17 Malaysian plane crash in Ukraine 2014, All 298 people on board a Malaysia Airlines plane died after th...

  1. A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy

    Science.gov (United States)

    Viecco, Camilo H.; Camp, L. Jean

    Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization that participates in a sensor network risks providing a covert channel to attackers if that organization’s sensor can be identified. While there is benefit for every party when any individual participates in such sensor deployments, there are perverse incentives against individual participation. As a result, Internet sensor networks currently provide limited data. Ensuring anonymity of individual sensors can decrease the risk of participating in a sensor network without limiting data provision.

  2. REKONSTRUKSI PEMBENTUKAN NATIONAL CYBER DEFENSE SEBAGAI UPAYA MEMPERTAHANKAN KEDAULATAN NEGARA

    Directory of Open Access Journals (Sweden)

    Nur Khalimatus Sa'diyah

    2016-09-01

    Full Text Available Anxiety against cybercrime has become the world’s attention, but not all countries in the world is giving greater attention to the problem of cybercrime by having the rule and unless the developed countries and some developing countries. The purpose of this research is in order to find, examine and analyze the efforts of the Indonesia Government in the protection of State secrets information and data, also to research the forms of Indonesia Government resistance against cyber war. Find a reconstruction of national cyber defense formation or cyber army in an attempt to defend the sovereignty of the country. In Act No. 3 of 2002 on State Defense, it has been established that the threat in the country’s defense system consists of a military threat and non-military threat, which is including cyber threats. One of the negative effects of the cyber world development via the internet among other things is a crime in violation of the law cybercrime, where when the escalation widely spread, it could have threatened the country’s sovereignty, territorial integrity or the safety of the nation. In an effort to combat against the attacks in this virtual world, will require an agency that is in charge of being the world’s bulwark cyber or cyber defense.

  3. Instrumentation requirements for radiological defense of the U.S. population in community shelters. Final report

    International Nuclear Information System (INIS)

    Haaland, C.M.; Gant, K.S.

    1978-08-01

    Estimates are made of requirements for instruments for radiological defense of the U.S. population in the event of a nuclear attack. A detailed Community Shelter Plan posture is developed for each of 42,000 Standard Location Areas. Travel distance from residence to shelter in urban areas is limited to approximately 1 mile. Sixty percent of the U.S. population is sheltered in home basements, thirty-one percent in National Shelter Survey shelters, and nine percent is in neither. Three minimum allocations of instruments are developed. Allocation A, one radiological defense set per shelter, is essentially the same as the current civil defense allocations but is found to be inadequate for about 100,000 shelters having more than 100 occupants. Allocation B requires 3.4 million new dosimeters based on estimated shelter occupancy and provides a minimum instrumentation for radiological defense but not enough instruments to maintain individual dose records. Allocation C would require 18.1 million new dosimeters and would provide adequate instrumentation to maintain dose records for all shelter occupants

  4. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  5. The Ethics of DeCSS Posting: Towards Assessing the Morality of the Internet Posting of DVD Copyright Circumvention Software

    Science.gov (United States)

    Eschenfelder, Kristin R.; Howard, Robert Glenn; Desai, Anuj C.

    2006-01-01

    Introduction: We investigate the conditions under which posting software known as "DeCSS" on the Internet is ethical. DeCSS circumvents the access and copy control protection measures on commercial DVDs. Through our investigation, we point to limitations in current frameworks used to assess ethical computer based civil disobedience.…

  6. Food Defense Best Practices Reported by Public School Food Authorities in Seven Northern U.S. States

    Science.gov (United States)

    Klitzke, Carol J.; Strohbehn, Catherine H.

    2015-01-01

    Purpose/Objectives: This study reported food defense planning, training and best practices implemented in public schools in Montana, Wyoming, South Dakota, North Dakota, Iowa, Minnesota, and Wisconsin. Methods: An internet-administered survey was sent to 1,501 school food authorities or food service directors (FSDs) in public schools. Survey items…

  7. Defense Science Board (DSB) Summer Study Report on Strategic Surprise

    Science.gov (United States)

    2015-07-01

    modeling  and  simulation capabilities and test facilities.  Recommendation 15  Leveraging the Internet of Things  Department of Defense should create a...Manferdelli      Intel  Dr. Joseph  Markowitz       Private Consultant  Dr. Mark Maybury      MITRE  Hon. James Miller      Private Consultant  Hon. Judith

  8. Annual Report of the Secretary of Defense to the President and the Congress, January 1994

    Science.gov (United States)

    1994-01-01

    Navy has assumed the lead on the ATARS program. The 1U-2 program was transferred back to DoD from the National Foreign Intelligence Program (NFIP...Activities - Civil Affairs ,Speciai Activities Psychological Operations -Coalition Suppor SOF’s Role in Support of D~efense Strategy SOF will...operations that misled the enemy about the coalition’s operational plan. According to information obtained from prisoners of war, psychological

  9. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  10. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  11. Civil law

    NARCIS (Netherlands)

    Hesselink, M.W.; Gibbons, M.T.

    2014-01-01

    The concept of civil law has two distinct meanings. that is, disputes between private parties (individuals, corporations), as opposed to other branches of the law, such as administrative law or criminal law, which relate to disputes between individuals and the state. Second, the term civil law is

  12. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  13. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  14. Reconceptualizing Civil Regulation

    DEFF Research Database (Denmark)

    Galang, Roberto Martin; Castello, Itziar

    2011-01-01

    This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility litera....... Finally, we argue that, in Asia, governments act as a structuration mechanism which challenges the current understanding of CSR.......This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility...... and environmental standards; but also that local, small and medium companies play a key role in the development of Asian civil regulation. We call this second finding the “CSR importation trap”. Our findings are supported by evidence on the limitations in the interchangeable properties of business and governments...

  15. Civil partnerships five years on.

    Science.gov (United States)

    Ross, Helen; Gask, Karen; Berrington, Ann

    2011-01-01

    The Civil Partnership Act 2004, which came into force in December 2005 allowing same-sex couples in the UK to register their relationship for the first time, celebrated its fifth anniversary in December 2010. This article examines civil partnership in England and Wales, five years on from its introduction. The characteristics of those forming civil partnerships between 2005 and 2010 including age, sex and previous marital/civil partnership status are examined. These are then compared with the characteristics of those marrying over the same period. Further comparisons are also made between civil partnership dissolutions and divorce. The article presents estimates of the number of people currently in civil partnerships and children of civil partners. Finally the article examines attitudes towards same-sex and civil partner couples both in the UK and in other countries across Europe.

  16. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  17. Citizenship in civil society?

    NARCIS (Netherlands)

    Ossewaarde, Marinus R.R.

    2007-01-01

    This article seeks to provide a conceptual framework to complement and guide the empirical analysis of civil society. The core argument is that civil society must be understood, not as a category of (post)industrialized society, but as one of individualized society. Civil society is characterized by

  18. [Responsibilities of physicians in legal practice with emphasis on civil law].

    Science.gov (United States)

    Veselić, Ivica

    2007-01-01

    Medical doctors and lawyers respectively are very often directed to cooperate in many different ways. It is worth informing the medical doctors in a simple and understandable way of a newer and more recent practice of the term of responsibility and its usage in legal practice. Placing subjective or objective medical doctors' responsibility arises a considerable doubt in practice. Author's opinion is that the legal practice should keep the subjective responsibility because it is precisely the subjective responsibility that has a supremacy over the objective one. He is, of course, taking into consideration the honorable medical profession which shouldn't professionally constraint the doctors in doing their honorable work by confronting them with ethical and professional dilemma about whether they would be burdened with criminal or civil responsibility, and all that on the assumption of lege artis. The author has himself searched and checked the archive and Internet records of 200 court rulings of the Municipal Court in Zagreb and the District Court in Zagreb. He also searched Internet records of the Supreme Court of the Republic of Croatia both for the civil law responsibility as for the criminal law one. The figures shown in this work are appriximate and they are to be used as guidelines and support for indentifying and solving problems both in medical as in legal practice. After checking the court rulings of the Municipal Court in Zagreb the author has noted that the mistakes most frequently occur in the field of diagnostics and additional health care (42%), in performing a surgery and post-operative complications (43%) and in the field of ginecology (15%). With the developpement of medicine and technology the risks and medical mistakes are ever growing. However, maybe one simple conversation between a doctor and a patient before and after providing medical services would solve many of the dilemmas and reduce the unreasonable expectations.

  19. THE DEFENSE IN CHILE FROM 1960 TO 2010: AN ISSUE OF THE MILITARY OR AN ISSUE OF EVERY CHILEAN CITIZEN?

    Directory of Open Access Journals (Sweden)

    JULIO SOTO SILVA

    2018-01-01

    Full Text Available This essay presents a general vision of the national defense trough the last 50 years as well as a study of the National Defense System of Chile. The Decree 181 of 1960 that stated the organization of the system and structure of the National Defense is the starting point, a brief analysis of how it worked until 2010 when it was replaced by the new law of the MOD. The way it worked during the international crisis Chile faced during the 70s and 80s is also discussed. But this study does not stop there, it also tackles the way by which the defense policy evolved from an issue related only to the military, to become an issue of every Chilean citizen, through the widening of the knowledge of defense issues to the civilian and political elites, being the formulation of an explicit Defense Policy the cornerstone of the whole process, by means of the publishing of the three books of the national defense, along with other key public policies in defense issues whereas the contribution of the Defense Community, recognized as such in the Second Book of the Defense, was capital. This community has a representation of all the sectors of the civil society interested in defense issues as well as from the armed forces. This period ends with the law 20.424 “Organic Statute of the Ministry of Defense”, the most important change in defense issues, besides de DFL 181, since the creation of the Ministry of Defense back in 1932.

  20. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  1. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  2. Cloud computing technologies applied in the virtual education of civil servants

    Directory of Open Access Journals (Sweden)

    Teodora GHERMAN

    2016-03-01

    Full Text Available From the perspective of education, e-learning through the use of Cloud Computing technologies represent one of the most important directions of educational software development, because Cloud Computing are in a rapid development and applies to all areas of the Information Society, including education. Systems require resources for virtual education on web platform (e-learning numerous hardware and software. The convenience of Internet learning, creating a learning environment based on web has become one of the strengths in virtual education research, including applied Cloud Computing technologies in virtual education of civil servants. The article presents Cloud Computing technologies as a platform for virtual education on web platforms, their advantages and disadvantages towards other technologies.

  3. Civil Law Glossary.

    Science.gov (United States)

    Update on Law-Related Education, 1997

    1997-01-01

    Presents a glossary of civil law terms originally compiled for journalists by the American Bar Association. Defines many essential civil law concepts and practices including compensatory damages, jurisdiction, motion to dismiss, discovery, and remedy. (MJP)

  4. World tendences of civil aviation development and the enlargement of the Lithuanian civil aviation

    Directory of Open Access Journals (Sweden)

    J. Butkevičius

    2006-06-01

    Full Text Available The article deals with global trends in civil aviation, such as: liberalisation of aviation market, globalisation of airlines, privatisation of airlines and invasion of low cost airlines into the market. Also the influence of these trends on the Lithuanian civil aviation activities has been defined. The Lithuanian civil aviation activities have been analysed: activities of international airports, passenger and cargo carriers, passenger routes and passenger flows, transportation market and airplane fleet. The problems of the Lithuanian civil aviation activities have been identified and suggestions for the development of the Lithuanian civil aviation activities have been proposed.

  5. Health domains for sale: the need for global health Internet governance.

    Science.gov (United States)

    Mackey, Tim Ken; Liang, Bryan A; Kohler, Jillian C; Attaran, Amir

    2014-03-05

    A debate on Internet governance for health, or "eHealth governance", is emerging with the impending award of a new dot-health (.health) generic top-level domain name (gTLD) along with a host of other health-related domains. This development is critical as it will shape the future of the health Internet, allowing largely unrestricted use of .health second-level domain names by future registrants, raising concerns about the potential for privacy, use and marketing of health-related information, credibility of online health content, and potential for Internet fraud and abuse. Yet, prospective .health gTLD applicants do not provide adequate safeguards for use of .health or related domains and have few or no ties to the global health community. If approved, one of these for-profit corporate applicants would effectively control the future of the .health address on the Internet with arguably no active oversight from important international public health stakeholders. This would represent a lost opportunity for the public health, medical, and broader health community in establishing a trusted, transparent and reliable source for health on the Internet. Countries, medical associations, civil society, and consumer advocates have objected to these applications on grounds that they do not meet the public interest. We argue that there is an immediate need for action to postpone awarding of the .health gTLD and other health-related gTLDs to address these concerns and ensure the appropriate development of sound eHealth governance rules, principles, and use. This would support the crucial need of ensuring access to quality and evidence-based sources of health information online, as well as establishing a safe and reliable space on the Internet for health. We believe, if properly governed, .health and other domains could represent such a promise in the future.

  6. 28 CFR 31.202 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Civil rights. 31.202 Section 31.202....202 Civil rights. (a) To carry out the State's Federal civil rights responsibilities the plan must: (1) Designate a civil rights contact person who has lead responsibility in insuring that all applicable civil...

  7. Civil War and Inoperativity

    DEFF Research Database (Denmark)

    Flohr, Mikkel

    2017-01-01

    This article analyses the penultimate publication in Giorgio Agambens Homo Sacer-series Stasis: Civil War as a Political Paradigm. It compares and contrasts the paradigm of civil war with the preceding paradigm of the exception, and identifies a significant displacement in the relationship between...... civil war and the sovereign state, in spite of Agamben’s insistence on their continuity. Agamben’s decoupling of civil war and the sovereign state facilitates novel political possibilities that unfortunately remain underdeveloped in the book. The article proceeds to develop Agamben’s brief intimations...... of inoperativity towards a concept of destituent power drawing on his other writings. It makes the argument for thinking civil war and inoperativity – stasis and stasis – together to derive a concept of destituent power as a form of revolution against the sovereign state, which does not constitute a new sovereign...

  8. 22 CFR 208.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Civil judgment. 208.920 Section 208.920 Foreign...) Definitions § 208.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  9. 34 CFR 85.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Civil judgment. 85.920 Section 85.920 Education Office...) Definitions § 85.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  10. 2 CFR 180.915 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Civil judgment. 180.915 Section 180.915... § 180.915 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  11. 22 CFR 1006.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1006.920 Section 1006.920...) Definitions § 1006.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  12. 22 CFR 1508.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1508.920 Section 1508.920...) Definitions § 1508.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  13. 21 CFR 1404.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Civil judgment. 1404.920 Section 1404.920 Food and...) Definitions § 1404.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  14. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  15. Legalisation of Civil Wars

    DEFF Research Database (Denmark)

    Buhl, Kenneth Øhlenschlæger

    2009-01-01

    This article is concerned with the legal challenges of regulating civil wars in international humanitarian law. Civil war is not a term used in international law; it falls however, withing the context of the legal term 'armed conflicts not of an international character', although the shorter 'non......-international armed conflict' is used here. Civil wars are usually limited to the territory of a state. Considering that international law is generally concerned with the legal relations between states – being a legal system based on the system of states with states as its subjects – the main question is how civil...... wars as internal conflicts have become subject to international humanitarian law....

  16. 32 CFR 185.2 - Applicability and scope.

    Science.gov (United States)

    2010-07-01

    ... military support to civil law enforcement. (See § 185.4(b).) ... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE CIVIL DEFENSE MILITARY SUPPORT TO CIVIL AUTHORITIES (MSCA) § 185.2 Applicability and scope. This part: (a) Applies to the Office of the...

  17. Developing an Internet Oriented Platform for Earthquake Engineering Application and Web-based Virtual Reality Simulation System for Seismic hazards: Towards Disaster Mitigation in Metropolises

    Directory of Open Access Journals (Sweden)

    Ali Alaghehbandian

    2003-04-01

    Full Text Available This paper reviews the state of the art on risk communication to the public, with an emphasis on simulation of seismic hazards using VRML. Rapid growth computer technologies, especially the Internet provide human beings new measures to deal with engineering and social problems which were hard to solve in traditional ways. This paper presents a prototype of an application platform based on the Internet using VR (Virtual Reality for civil engineering considering building an information system of risk communication for seismic hazards and at the moment in the case of bridge structure.

  18. Space civil engineering - A new discipline

    Science.gov (United States)

    Sadeh, Willy Z.; Criswell, Marvin E.

    1991-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding the Civil Engineering know-how and practice to the development and maintenance of infrastructure on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University under a recently established NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts of the curriculum in the Space Civil Engineering Option at both undergraduate and graduate levels are presented. The role of Space Civil Engineering in the Space Program is discussed.

  19. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...... theme in twentieth century architecture. Together, civil engineer Peter Rice and architect Ian Ritchie created a paradigm shift with their revolutionary ideas for glass facades supported by cables. Glued and bolted constructions made entirely of glass are now a reality in small-scale projects, yet...

  20. Carbon capture and storage (CCS) in a civil legal point of view; CO{sub 2}-Abscheidung und -Ablagerung (Carbon Capture and Storage - CCS) in zivilrechtlicher Sicht

    Energy Technology Data Exchange (ETDEWEB)

    Gast, Ina Carolin

    2012-11-01

    The author of the book under consideration reports on the possibilities of the German environmental private law in order to address the risks of carbon capture and storage. The focus of this book is concerned with the examination of defense claims, compensation claims and claims for damages of the persons concerned, if activities or plants for carbon capture and storage cause damages at the legal assets. In addition to the civil defense claims and compensation claims from paragraph 1004 sect. 1 of the German civil code (BGB) and paragraph 906 sect. 2 sentence 2 BGB also claims under public law concerning the respective interests of neighbours from paragraph 75 sect. 2 sentence 2 to 4 VwVfG (Law on Administrative Procedure) also shall be included. In addition to this, the author reports on the claims for compensation of tort law and various situations of the strict liability. In particular, the new paragraph 29 of the draft of the carbon dioxide storage law is considered which creates a special strict liability for this novel technology.

  1. Kingdom, church and civil society: A theological paradigm for civil ...

    African Journals Online (AJOL)

    This article deals with the role that churches can and should play in civil society to develop societal morally. The central-theoretical argument is that the biblical notion of the kingdom of God can, when it is systematically and theologically developed, offer an acceptable foundation for the civil action of churches. In light of this ...

  2. 5 CFR 919.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Civil judgment. 919.920 Section 919.920 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 919.920 Civil judgment. Civil judgment...

  3. Public and Private Institutions: Educating Civil Society about European Security Concerns

    Directory of Open Access Journals (Sweden)

    Rafael Bardají

    1997-12-01

    Full Text Available As an specialist in strategic studies and political adviser, the author developes three basic ideas in his speech: 1 the objective necessity of strategic thinking to increase defense awareness, with the goal of ameliorating the relations between civil society and the Armed Forces, and to create a strategic culture to help to make more permeable the Administration decision-making process; 2 public and private institutions have to understand each other, despite the fact that tradition and time pressures do negatively weigh on Administration decision-making; 3 both parts –Administration and specialists in security– have to make the effort of becoming more flexible, on the one hand, and more capable of producing relevant studies in political terms, on the other.

  4. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  5. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    specific climatic challenge or clean the air. With nanotechnology, the artificial and the natural move closer together; this is the perspective for civil engineer Chris McCarthy’s work all over the world. And what is new is not just the way the construction materials are put together; they also require......Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...

  6. Civil War

    OpenAIRE

    Christopher Blattman; Edward Miguel

    2010-01-01

    Most nations have experienced an internal armed conflict since 1960. The past decade has witnessed an explosion of research into the causes and consequences of civil wars, belatedly bringing the topic into the economics mainstream. This article critically reviews this interdisciplinary literature and charts productive paths forward. Formal theory has focused on a central puzzle: why do civil wars occur at all when, given the high costs of war, groups have every incentive to reach an agreement...

  7. Desobediencia civil: la autoridad de la reflexión vs la autoridad civil

    Directory of Open Access Journals (Sweden)

    Maria José Urteaga Rodríguez

    2016-06-01

    Full Text Available ¿Puede la desobediencia civil justificarse moralmente? Este trabajo intenta dar una respuesta afirmativa a esta pregunta. Para dar cuenta de por qué la desobediencia civil es moralmente justificable, primero se describen algunos rasgos esenciales de la desobediencia civil. Después se explica la manera en la que tensión entre el poder civil y el poder del individuo –tensión que se asume como la fuente de la desobediencia civil–, bajo la consideración de algunos pasajes de la Fundamentación metafísica de las costumbres, resulta sólo aparente. Una vez disuelta la tensión se defiende que las fuentes normativas individuales y sociales no sólo no se contraponen, sino que su complementariedad es necesaria para justificar la desobediencia civil. Aunque suene paradójico: sólo se puede abrir espacio a la desobediencia a partir de resaltar la importancia de la obediencia y de la ley.

  8. Civil engineering work

    International Nuclear Information System (INIS)

    Cousyn, Rene; Goubin, Jean.

    1977-01-01

    Although it does not require a specifically new technicality, the Civil Engineering site of a nuclear power plant is a complex work. Considering as an example the power plant currently in construction at Tricastin, the authors describe the main Civil Engineering work and task organization applied to carry it out [fr

  9. 7 CFR 3017.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil judgment. 3017.920 Section 3017.920 Agriculture... AGRICULTURE GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 3017.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether...

  10. 29 CFR 1471.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Civil judgment. 1471.920 Section 1471.920 Labor Regulations... SUSPENSION (NONPROCUREMENT) Definitions § 1471.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether by verdict, decision, settlement...

  11. 77 FR 55175 - Civil Penalties

    Science.gov (United States)

    2012-09-07

    ... [Docket No. NHTSA-2012-0131; Notice 1] RIN 2127-AL16 Civil Penalties AGENCY: National Highway Traffic... proposes to increase the maximum civil penalty amounts for violations of motor vehicle safety requirements... and consumer information provisions. Specifically, this proposes increases in maximum civil penalty...

  12. 75 FR 5244 - Civil Penalties

    Science.gov (United States)

    2010-02-02

    ... [Docket No. NHTSA-2009-0066; Notice 2] RIN 2127-AK40 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for violations of motor vehicle safety requirements involving school buses, bumper... theft protection requirements. This action is taken pursuant to the Federal Civil Monetary Penalty...

  13. Internet como herramienta de recuperación de la memoria de la Guerra Civil española

    Directory of Open Access Journals (Sweden)

    Laura Solanilla-Demestre

    2012-07-01

    Full Text Available The case of the movements of recovery of memory of the losers of the Spanish Civil War is atypical if compared with the dynamics generated in other situations. The delay between the moment of historical trauma and the establishment of a democratic state partly explains this singularity. In this article we analyze the agents involved and as the technological tools used to achieve the objectives.

  14. 31 CFR 19.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Civil judgment. 19.920 Section 19.920... SUSPENSION (NONPROCUREMENT) Definitions § 19.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether by verdict, decision, settlement...

  15. 77 FR 70710 - Civil Penalties

    Science.gov (United States)

    2012-11-27

    ... [Docket No. NHTSA-2012-0131; Notice 2] RIN 2127-AL16 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for violations of motor vehicle safety requirements for the National Traffic and... provisions. Specifically, this increases the maximum civil penalty amounts for single violations of motor...

  16. 29 CFR 98.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Civil judgment. 98.920 Section 98.920 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 98.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction...

  17. 30 CFR 947.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 947.845 Section 947.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE WASHINGTON § 947.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  18. 30 CFR 941.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 941.845 Section 941.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE SOUTH DAKOTA § 941.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  19. 30 CFR 912.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 912.845 Section 912.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE IDAHO § 912.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  20. 30 CFR 921.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 921.845 Section 921.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE MASSACHUSETTS § 921.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  1. 30 CFR 939.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 939.845 Section 939.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE RHODE ISLAND § 939.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  2. 30 CFR 937.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 937.845 Section 937.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE OREGON § 937.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  3. 30 CFR 942.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 942.845 Section 942.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE TENNESSEE § 942.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply to the assessment of civil penalties for...

  4. 30 CFR 903.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 903.845 Section 903.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE ARIZONA § 903.845 Civil penalties. Part 845 of this chapter, Civil Penalties, applies to the assessment of civil penalties for violations...

  5. 30 CFR 910.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 910.845 Section 910.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE GEORGIA § 910.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  6. 30 CFR 922.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 922.845 Section 922.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE MICHIGAN § 922.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  7. 30 CFR 933.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 933.845 Section 933.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE NORTH CAROLINA § 933.845 Civil penalties. Part 845 of this chaper, Civil Penalties, shall apply when civil penalties are assessed for...

  8. 30 CFR 905.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 905.845 Section 905.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE CALIFORNIA § 905.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply to the assessment of civil penalties for...

  9. 75 FR 79978 - Civil Penalties

    Science.gov (United States)

    2010-12-21

    ... [Docket No. NHTSA-2010-0114; Notice 2] RIN 2127-AK78 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for related series of violations of the National Traffic and Motor Vehicle Safety... Federal Civil Monetary Penalty Inflation Adjustment Act of 1990, as amended by the Debt Collection...

  10. 75 FR 49879 - Civil Penalties

    Science.gov (United States)

    2010-08-16

    ... [Docket No. NHTSA-2010-0114; Notice 1] RIN 2127-AK78 Civil Penalties AGENCY: National Highway Traffic... proposes to increase the maximum civil penalty amounts for violations covering a related series of... action would be taken pursuant to the Federal Civil Monetary Penalty Inflation Adjustment Act of 1990, as...

  11. Material civilization: things and society.

    Science.gov (United States)

    Dant, Tim

    2006-06-01

    This paper argues that although classical sociology has largely overlooked the importance of social relations with the material world in shaping the form of society, Braudel's concept of 'material civilization' is a useful way to begin to understand the sociological significance of this relationship. The limitations of Braudel's historical and general concept can be partially overcome with Elias's analysis of the connection between 'technization' and 'civilization' that allows for both a civilizing and a de-civilizing impact of emergent forms of material relation that both lengthen and shorten the chains of interdependence between the members of a society. It is suggested that the concept of the 'morality of things' employed by a number of commentators is useful in summarizing the civilizing effects of material objects and addressing their sociological significance. From the sociology of consumption the idea of materiality as a sign of social relationships can be drawn, and from the sociology of technology the idea of socio-technical systems and actor-networks can contribute to the understanding of material civilization. It is argued that the concept of 'material capital' can usefully summarize the variable social value of objects but to understand the complexity of material civilization as it unfolds in everyday life, an analysis of 'material interaction' is needed. Finally the paper suggests some initial themes and issues apparent in contemporary society that the sociological study of material civilization might address; the increased volume, functional complexity and material specificity of objects and the increased social complexity, autonomy and substitutability that is entailed. A theory of 'material civilization' is the first step in establishing a sociology of objects.

  12. Civil society sphericules

    DEFF Research Database (Denmark)

    Tufte, Thomas

    2014-01-01

    the organization strategizes about and seeks to articulate amongst Tanzanian youth. Situated in the ‘perverse confluence’ (Dagnino, 2011) between neoliberal and radical democratic agendas in the communicative practices of civil society-driven media platforms, Femina navigates between identities as an NGO, a social...... movement and a media initiative. In the context of the growing literature on social networking sites and their affordances, dynamics and structures, the case of Femina illustrates how a civil society sphericule emerges within the dynamic co-evolution of new and old media platforms. The study is furthermore...... an example of the difficult shift in civil society practice, from service provision to an agenda of public service monitoring, social accountability and community engagement....

  13. 14 CFR 1274.924 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Civil rights. 1274.924 Section 1274.924... FIRMS Other Provisions and Special Conditions § 1274.924 Civil rights. Civil Rights July 2002 Work on NASA cooperative agreements is subject to the provisions of Title VI of the Civil Rights Act of 1964...

  14. Untangling the Relationship between Internet Anxiety and Internet Identification in Students: The Role of Internet Self-Efficacy

    Science.gov (United States)

    Hsiao, Bo; Zhu, Yu-Qian; Chen, Li-Yueh

    2017-01-01

    Introduction: Previous research has identified Internet anxiety and Internet identification as two important factors that predict usage and experience on the Internet. However, little is known about the relationship between them. This research aimed to untangle the relationship between Internet anxiety and Internet identification, and to…

  15. Civil Society and Governance

    DEFF Research Database (Denmark)

    Hulgård, Lars

    An illustration of how important the relationship is between civil society anbd governance. A short historic journey with four snapshots of times and situations that have provided interesting evidence about the connection between civil society and governance. My goal for the short historic journey...... is to make clear and hopefully even verify that providing knowledge about the impact of civil society and citizens’ participation on governance is one of the most urgent research tasks in the current period of time....

  16. Civility in scientific publishing: The glyphosate paper.

    Science.gov (United States)

    Blaylock, Russell Lane

    2015-01-01

    In recent years, we have witnessed a decline in civility in the public arena when various socially sensitive issues are being presented. Those of us engaged in the publishing of scientific papers and in our comments on these papers, need to be cognizant of the social graces, courteous demeanor, and chivalry. Debates are essential to our learning and in being able to ferret out the essentials of various scientific issues that are of value. Because of the amount of time and effort connected with analyzing the complex problems and the years invested in such endeavors, we often resort to the behavior, that is, contentious and at times even quite insulting to our opponents during our defense. This is the part of human nature but as civilized human beings, we must strive to maintain the courtesy and a calm demeanor during such discussions and debates. I have yielded to such temptations myself but am striving to repent of my sins. The medical and scientific history should have taught us that in defending our ideas we learn and sometimes come to the realization that our paradigm or hypothesis is wrong, either in part or whole. Such debates allow us to fine tune our ideas and correct our errors in thinking, which are easily, consciously, or subconsciously sublimated by our enthusiasm. The glyphosate papers presented ideas that, while well supported by the scientific studies and logical conclusions, also contained some possible errors in its suppositions. Dr. Miguel Faria challenged some of these concepts and was met with some degree of derision by one of the authors. This editorial comment is in response to these issues.

  17. Civil liability on nuclear activities; Responsabilidade civil nas atividades nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Bittar, C A

    1983-12-31

    The civil liability theory in the actual context is shown in the first and second part of this thesis, including some considerations about concepts and types of liability in dangerous and not dangerous activities. In the third part, the legal aspects of civil liability for the nuclear activities are analyzed, with a brief description of the history evolution, standard systems, inspection corporation and juridical regulation. (C.G.C.). 239 refs.

  18. Internet gambling is a predictive factor of Internet addictive behavior.

    Science.gov (United States)

    Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis

    2013-12-01

    Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus. Anonymous self-completed questionnaires were used including the Internet Addiction Test and the Strengths and Difficulties Questionnaire. Among the study population (n = 805), approximately one third (n = 28; 34.9%) reported Internet gambling. Internet gamblers were twice as likely to utilize Internet café portals (adjusted odds ratio for gender and age, AOR: 2.13; 95% confidence interval, 95% CI: 1.56-2.91) for interactive game-playing (AOR: 6.84; 95% CI: 4.23-11.07), chat-rooms (AOR: 2.57; 95% CI: 1.31-4.85), and retrieval of sexual information (AOR: 1.99; 95% CI: 1.42-2.81). Among Internet gamblers 26.0% (n = 73) reported borderline addictive Internet use and 4.3% (n = 12) addictive behavior. Internet gamblers more often had comprehensive psychosocial and emotional maladjustment (AOR: 4.00; 95% CI: 1.97-8.13), including Abnormal Conduct Problems (AOR: 3.26; 95% CI: 2.00-5.32), Emotional Symptoms (AOR: 1.78; 95% CI: 1.02-3.11), and Peer Problems (AOR: 2.44; 95% CI: 1.08-5.48) scores. The multivariate regression analyses indicated that the single independent predictor associated with Internet addictive behavior was Internet gambling (AOR: 5.66; 95% CI: 1.45-22.15). Internet gambling is associated with addictive Internet use, as well as emotional maladjustment and behavioral problems, among Cypriot adolescents. Longitudinal studies are needed to elucidate whether Internet gambling constitutes a risk factor for the development of Internet addictive behavior among adolescents.

  19. RISK DEFINITION IN CIVIL UNMANNED AVIATION

    Directory of Open Access Journals (Sweden)

    Volodymyr Kharchenko

    2016-12-01

    Full Text Available Objective: The risks in unmanned civil aviation are considered as one of the most important. In the article is proved applicability of ensuring the flight safety of aircraft and considered the basic risks of manned civil aviation. Methods: Analyzed statistical data on aviation accidents, organized probabilities distribution of aviation accidents for manned and unmanned civil aviation to identify factors that influence the occurrence of emergency situations in manned and unmanned aviation. Results: We proposed typology of risk components in civil aviation and systematized methods and techniques to reduce risks. Over the analogies defined possible risks, their causes and remedies in civil unmanned aircraft. Weight coefficients distribution was justified between risk types for development of recommendations on risk management in unmanned civil aviation. Discussion: We found that the most probable risk in manned civil aviation is the human factor, organization of air traffic control, design flaws of unmanned aviation system as a whole, as well as maintenance of unmanned aviation system.

  20. Can patriotism justify killing in defense of one’s country?

    Directory of Open Access Journals (Sweden)

    Pavković Aleksandar

    2007-01-01

    Full Text Available Cosmopolitan liberals would be ready to fight - and to kill and be killed for the sake of restoring international justice or for the abolition of profoundly unjust political institutions. Patriots are ready to do the same for their own country. Sometimes the cosmopolitan liberals and patriots would fight on the same side and sometimes on the opposite sides of the conflict. Thus the former would join the latter in the defense of Serbia against Austria-Hungary (in 1914 but would oppose the white Southerner patriots in the American Civil War (in 1861. In this paper I argue that fighting and killing for one’s country is, in both of those cases, different from the defense of one’s own life and the lives of those who cannot defend themselves. Killing for one’s country is killing in order to fulfill a particular political preference. The same is the case with fighting for the abolition of a profoundly unjust political institution. It is not amoral or immoral to refuse to kill for any one of these two political preferences because there is no reason to believe that either political preference trumps our moral constraints against killing.

  1. Nuclear energy and civilization

    International Nuclear Information System (INIS)

    Soentono, S.

    1996-01-01

    The role of energy is indeed very important since without it there will be no living-things in this world. A country's ability to cultivate energy determines the levels of her civilization and wealth. Sufficient energy supply is needed for economic growth, industrialization, and modernization. In a modern civilization, the prosperity and security of a country depends more on the capability of her people rather than the wealth of her natural resources. Energy supplies the wealth, prosperity and security, and sufficient reliable continuous supply of energy secures the sustainable development. The energy supply to sustain the development has to improve the quality of life covering also the quality of environment to support the ever increasing demand of human race civilization. Energy has a closer relationship with civilization in a modern society and will have to become even closer in the future more civilized and more modern society. The utilization of nuclear energy has, however, some problems and challenges, e.g. misleading information and understanding which need serious efforts for public information, public relation, and public acceptance, and possible deviation of nuclear materials for non-peaceful uses which needs serious efforts for technological and administrative barriers, precaution, prevention, safety, physical protection, safeguard, and transparency. These require cooperation among nuclear community. The cooperation should be more pronounced by heterogeneous growing Asian countries to reach harmony for mutual benefits toward better civilization. (J.P.N.)

  2. On civil engineering disasters and their mitigation

    Science.gov (United States)

    Xie, Lili; Qu, Zhe

    2018-01-01

    Civil engineering works such as buildings and infrastructure are the carriers of human civilization. They are, however, also the origins of various types of disasters, which are referred to in this paper as civil engineering disasters. This paper presents the concept of civil engineering disasters, their characteristics, classification, causes, and mitigation technologies. Civil engineering disasters are caused primarily by civil engineering defects, which are usually attributed to improper selection of construction site, hazard assessment, design and construction, occupancy, and maintenance. From this viewpoint, many so-called natural disasters such as earthquakes, strong winds, floods, landslides, and debris flows are substantially due to civil engineering defects rather than the actual natural hazards. Civil engineering disasters occur frequently and globally and are the most closely related to human beings among all disasters. This paper emphasizes that such disasters can be mitigated mainly through civil engineering measures, and outlines the related objectives and scientific and technological challenges.

  3. Civil Procedure In Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    scientific activities conducted by the author, partly based on the author's experience as a member, through a number of years, of the Danish Standing Committee on Procedural Law (Retsplejeraadet), which on a continuous basis evaluates the need for civil procedural reforms in Denmark, and finally also based......The book contains an up-to-date survey of Danish civil procedure after the profound Danish procedural reforms in 2007. It deals with questions concerning competence and function of Danish courts, commencement and preparation of civil cases, questions of evidence and burden of proof, international...... procedural questions, including relations to the Brussels I Regulation and Denmark's participation in this Regulation via a parallel convention with the EU countries, impact on Danish civil procedure of the convention on human rights, preparation and pronouncement of judgment and verdict, questions of appeal...

  4. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  5. NSI customer service representatives and user support office: NASA Science Internet

    Science.gov (United States)

    1991-01-01

    The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols.

  6. High technology and civil rights

    International Nuclear Information System (INIS)

    Lerche, P.

    1982-01-01

    Court decision reflect the widely felt lack of clarity about the present legal situation in the field of high technology. This confusion is also due to the fact that this legal situation is surrounded by civil rights constellations, which have more and more eroded the contours of our legal system in recent years: Today, civil rights are no longer specific, well-definable bulwarks for the citizen, but are more and more frequently interpreted by the supreme courts as sources of procedural requirements with more or less certain often vague consequences. This shifting of the accent in civil rights towards procedural matters is due to an innate logical necessity, however: The same civil right considered in the same situation, e.g., in planning for high technology, may give rise to very different, even contradictory individual claims. Therefore, one of the main modern objectives of civil rights becoming more and more apparent is the need to reconcile conflicting positions, which makes civil rights a driving force in balancing interests in the easiest possible way. Yet, one of the main deficiencies in this rapidly growing procedural approach is the one-sidedness often to be found as a result of isolated, punctual actions. This misses the objective of achieving adequate harmonization. As examples of such one-sided, isolated civil rights approaches, legal opinions are cited on the so-called public participation (possibility to object for those concerned) in the licensing procedures under the German Atomic Energy Act and for protection against environmental impacts. Quity rightly, this participation of the public is interpreted as an advance protection of civil rights. However, its consequences quite often are exaggerated. (orig.) [de

  7. The oral trial and the effective judicial protection: Mismatches of the model established in the Law of Civil Procedure

    Directory of Open Access Journals (Sweden)

    Antonio José Vélez Toro

    2017-01-01

    Full Text Available Conciliation, mediation and arbitration are traditional means for the resolution of legal conflicts, which are shaped and promoted as alternatives to the judicial process. Nevertheless, the judicial process, which is the only mean for the resolution of legal conflicts expressly recognized in the Spanish Constitution to exercise the right to an effective judicial protection, is not only the last option to solve the conflict but also the ultimate guarantee of defense against possible breaches occurred within the alternative process chosen. The Spanish juicio verbal (mainly oral and simplified civil procedure in court is the most frequently used procedure in the Spanish Civil and Commercial areas. This is why we intend to approach it from the perspective of the Spanish Constitutional Jurisprudence in order to establish the cases where there is or there has been an impossibility or rejection to exercise the right to an effective judicial protection.

  8. Sustainability issues in civil engineering

    CERN Document Server

    Saride, Sireesh; Basha, B

    2017-01-01

    This compilation on sustainability issues in civil engineering comprises contributions from international experts who have been working in the area of sustainability in civil engineering. Many of the contributions have been presented as keynote lectures at the International Conference on Sustainable Civil Infrastructure (ICSCI) held in Hyderabad, India. The book has been divided into core themes of Sustainable Transportation Systems, Sustainable Geosystems, Sustainable Environmental and Water Resources and Sustainable Structural Systems. Use of sustainability principles in engineering has become an important component of the process of design and in this context, design and analysis approaches in civil engineering are being reexamined to incorporate the principles of sustainable designs and construction in practice. Developing economies are on the threshold of rapid infrastructure growth and there is a need to compile the developments in various branches of civil engineering and highlight the issues. It is th...

  9. Adicción a internet en estudiantes de un instituto tecnológico

    OpenAIRE

    León Lescano, Wendy

    2014-01-01

    La presente investigación tuvo como objetivo determinar el nivel de adicción a Internet en estudiantes de un instituto tecnológico en el distrito de Chosica, según su edad, estado civil y género. La población estuvo integrada por 407 estudiantes de ambos sexos; en edades comprendidas entre los 15 y 39 años. Se trabajó con una muestra censal. Se aplicó la prueba de Kimberly Young “Test  Adicción a Internet”, instrumento que permite valorar las dimensiones de obsesión, dependencia y deterioro. ...

  10. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  11. Civil liberties and nuclear terrorism

    International Nuclear Information System (INIS)

    Goldberg, S.

    1987-01-01

    The importance of preventing nuclear terrorism is so great that it is easy to believe that the usual concern with civil liberties must take a back seat. But it is precisely when emergencies are invoked that the authors must not forget the importance of freedoms. Emergency powers are easily abused, and, even in the absence of abuse, mistakes can be made. It is hard to understand why they care about civil liberties if every suspect is guilty, every wiretap is necessary, and every search is justified. But sometimes suspects are innocent, wiretaps are used for political ends, and searches disrupt lives to no end. Civil liberties do not exist in a vacuum. If society is destroyed, civil liberties are likely to be destroyed as well. Virtually every legal doctrine this study addresses involves a recognition that individual rights must be balanced against valid social needs. The civil liberties focus on here fall under the general headings of freedom of speech and association, privacy, due process rights for suspects, and freedom from unreasonable searches and seizures. One essential point applied to all these areas: although a counterterrorist activity is legal, that does not mean the activity has no impact on civil liberties. It may be legal, for example, to have a massive federal police force that provides hundreds of guards for every shipment of plutonium. Even so, that procedure still raises civil liberties concerns, since many Americans would feel less free in a society of that type

  12. Refractions of Civil Society

    DEFF Research Database (Denmark)

    Kuzmanovic, Daniella

    The thesis investigates various perceptions of civil society among civic activists in Turkey, and how these perceptions are produced and shaped. The thesis is an anthropological contribution to studies of civil society in general, as well as to studies on political culture in Turkey....

  13. Information systems for civil engineering; Sistemas de informacion para ingenieria civil

    Energy Technology Data Exchange (ETDEWEB)

    De Buen R, Pablo R; Alvarado G, Alonso; Alaniz Q, Felipe de J; Guerrero F, Vicente A. [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico)

    2004-07-01

    Since its beginnings, in the Gerencia de Ingenieria Civil (GIC) of the Instituto de Investigaciones Electricas (IIE) the interest has existed to take advantage of and to promote the advantages that the appropriate use of the computerizing systems in the different tasks of civil engineering in the power sector represent. Either as a part of its infrastructure or at the request of their clients, at the GIC have been developed calculation systems for the analysis and design of special structures such as turbo-generators foundations, poles for transmission and distribution and transmission towers, in addition the information systems for the consultation and the analysis of diverse information, such as the related to the Manuals of Civil Works of the Comision Federal de Electricidad (CFE) or the relative to the existing instruments in the large dams of our country. In this article are briefly described some of the computer systems developed by the GIC in recent years. [Spanish] Desde sus inicios, en la Gerencia de Ingenieria Civil (GIC) del Instituto de Investigaciones Electricas (IIE) ha existido el interes por aprovechar y promover las ventajas que representa el uso adecuado de los sistemas de computo en las diferentes tareas de ingenieria civil en el sector energetico. Ya sea como parte de su infraestructura o a solicitud de sus clientes, en la GIC se han desarrollado sistemas de calculo para el analisis y diseno de estructuras especiales como lo son las cimentaciones de turbogeneradores, los postes para transmision y distribucion y las torres de transmision, ademas de sistemas de informacion para la consulta y el analisis de informacion diversa, como es la relacionada con los manuales de obras civiles de la Comision Federal de Electricidad (CFE) o a la relativa a los instrumentos existentes en las grandes presas de nuestro pais. En este articulo se describen brevemente algunos de los sistemas de computo desarrollos por la GIC en anos recientes.

  14. Space Civil Engineering option - A progress report

    Science.gov (United States)

    Criswell, Marvin E.; Sadeh, Willy Z.

    1992-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding Civil Engineering to the development, operation, and maintenance of infrastructures on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University and with support of the NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts and the current status of the curriculum in the Space Civil Engineering Option primarily at the undergraduate level are presented.

  15. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  16. 41 CFR 105-68.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Civil judgment. 105-68... Administration 68-GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 105-68.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction...

  17. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  18. [Risk management in health care systems: the new legislative orientations in medical civil responsibility].

    Science.gov (United States)

    Tomassini, A; Signorelli, C; Colzani, E

    2004-01-01

    The recent radical change in the relationships between physicians and patients has increased the frequency of malpractice. Consequently, on one hand, many physicians got used to avoiding any possible risk of denunciation by applying the so called "defensive medicine", while on the other hand, the insurance companies raised the prices of their premiums for policies concerning civil responsibility of health operators. In order to avoid this "vicious circle", some health structures created Units for the Risk Management related to malpractice, while others took advantage of the collaboration of Associations for Patients' Rights to create database about the most frequent medical mistakes. The need for a legislative change has been accepted by the Parliament which expects with the proposal n.108 (approved in spring 2002 by the Commission for Hygiene and Health of the Senate) to attribute the civil responsibility of the physicians to the hospitals (both private and public) for which they work, to constitute a Register of experts and to accelerate the legal disputes. The problem is complex and still to be solved, but it seems that time for a strong intervention in order to improve the situation has to come.

  19. The Brazilian approach to internet intermediary liability: blueprint for a global regime?

    Directory of Open Access Journals (Sweden)

    Nicolo Zingales

    2015-12-01

    Full Text Available While intermediary liability is becoming an issue of increasing importance in internet governance discussions, little is being made at the institutional level to minimise conflicts across jurisdictions and ensure the compliance of intermediary liability laws with fundamental rights and the freedom to innovate. The experience leading to the adoption of the Brazilian “Marco Civil da Internet” offers concrete insights for the definition of a baseline framework at the international level. This article also suggests the creation of a global forum of discussion on intermediary liability, allowing the interests of a variety of stakeholders to be taken into account in the definition and implementation of those baseline principles.

  20. Communication Needs of Thai Civil Engineering Students

    Science.gov (United States)

    Kaewpet, Chamnong

    2009-01-01

    This article reports on an examination of the communication needs of a group of Thai civil engineering students. Twenty-five stakeholders helped identify the communication needs of the students by participating in individual interviews. These included employers, civil engineers, civil engineering lecturers, ex-civil engineering students of the…

  1. History of Civil Engineering Modal Analysis

    DEFF Research Database (Denmark)

    Brincker, Rune

    2008-01-01

    techniques are available for civil engineering modal analysis. The testing of civil structures defers from the traditional modal testing in the sense, that very often it is difficult, or sometimes impossible, to artificially excite a large civil engineering structure. Also, many times, even though...

  2. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  3. Geophysics for deposits and civil engineering; Geophysique de gisement et de genie civil

    Energy Technology Data Exchange (ETDEWEB)

    Mari, J.L. [Institut Francais du Petrole (IFP), 92 - Rueil-Malmaison (France)]|[Ecole Nationale Superieure du Petrole et des Moteurs (ENSPM), 92 - Rueil-Malmaison (France); Arens, G. [ELF Aquitaine Production (France); Chapellier, D. [Lausanne Univ. (Switzerland). Faculte des Sciences; Gaudiani, P. [SEMM, Societe Etude Mesure Maintenance (France)

    1998-10-01

    This book is devoted to Earth science specialists who will have to use geophysical methods applied to oil and gas deposit studies and to civil engineering studies. It comprises 11 chapters dealing with: the geotechnical problems and the methodology of their study (basement depth, digging, dynamic modules, cavities, foundations, water inflows, refraction and high resolution reflexion shooting, well logging, drilled cores analysis and petrophysical measurements), deposits and civil engineering (heterogeneities, study of deposits, scale problems, train of deposit and geophysical studies), theoretical recalls of seismic surveys and acoustics (wave propagation, mechanical properties of rocks, in-situ conditions and laboratory simulations), reflexion shooting (acquisition, use of surface waves, data processing, civil engineering applications), refraction shooting (underground imaging, recommendations and interpretation of profiles, geological models, applications), well seismic surveys (vertical profile, imaging, well correlations), acoustic logging (tools, data representation, acquisition of acoustic parameters, sonic logging and time-depth relationship, synthetic seismograms, acoustic reflexion imaging, characterisation of formations using Stoneley waves), examples of civil engineering studies (deterministic, statistical and evolutive approaches, structural and stratigraphic interpretation of seismic data, hydrocarbon indicators, statistics and data analysis), radar (electromagnetic wave propagation, surface use, use in drilling), well logging in geotechnical studies (deposit studies, civil engineering studies), well logging and soil mechanics (preciseness, estimation of elastic modules). (J.S.) 231 refs.

  4. Considerations on Preventing Social Engineering over the Internet

    Directory of Open Access Journals (Sweden)

    Mironela Pîrnău

    2017-12-01

    Full Text Available The decrease of personal interactions, caused by the development of modern communication instruments (e-mail, Facebook, Twitter, Skype, Dropbox, LinkedIn, Lync etc. has allowed the evolution of new methods of social engineering attacks, which, under certain conditions, may become a very dangerous weapon. The aim of the present paper is to offer an overall presentation of possible attacks based on social engineering. The paper aims at identifying the specific methods of social engineering, as well as at displaying the defensive techniques in case of social engineering attacks. In the present-day society, based on Internet communication, it has been observed that the art of social engineering represents a phenomenon which continues to grow, because of the low costs of the attacks.

  5. The natural defense system and the normative self model [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Philippe Kourilsky

    2016-05-01

    Full Text Available Infectious agents are not the only agressors, and the immune system is not the sole defender of the organism. In an enlarged perspective, the ‘normative self model’ postulates that a ‘natural defense system’ protects man and other complex organisms against the environmental and internal hazards of life, including infections and cancers. It involves multiple error detection and correction mechanisms that confer robustness to the body at all levels of its organization. According to the model, the self relies on a set of physiological norms, and NONself (meaning : Non Obedient to the Norms of the self is anything ‘off-norms’. The natural defense system comprises a set of ‘civil defenses’ (to which all cells in organs and tissues contribute, and a ‘professional army ‘, made of a smaller set of mobile cells. Mobile and non mobile cells differ in their tuning abilities. Tuning extends the recognition capabilities of NONself by the mobile cells, which increase their defensive function. To prevent them to drift, which would compromise self/NONself discrimination, the more plastic mobile cells need to periodically refer to the more stable non mobile cells to keep within physiological standards.

  6. 28 CFR 522.11 - Civil contempt commitments.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Civil contempt commitments. 522.11..., CLASSIFICATION, AND TRANSFER ADMISSION TO INSTITUTION Civil Contempt of Court Commitments § 522.11 Civil contempt commitments. Inmates can come into Bureau custody for civil contempt commitments in two ways: (a) The U.S...

  7. On the history of codification of Hungarian civil law and the new Hungarian civil code

    Directory of Open Access Journals (Sweden)

    Salma Jožef

    2014-01-01

    Full Text Available The first part of the paper examines the basic tendencies in the development of the codification of Hungarian civil law in the period of representative and civil society. The second part deals with the new Hungarian Civil Code (2013/14 its content, methods of regulation and its relation to other civil legislation, temporal validity with the adherence to the idea of validity pro futuro, as well as its tendency to harmonize its norms with the guidelines of the European civil law. In accordance with the idea of completeness, the lawmakers incorporated all of the areas of civil law according to the pandecta system - personal law, corporate law with civil association law, family law, obligations and inheritance. The Code is based on the principle of equality of parties in civil relations, the principle of good faith, fraus legis prohibition. Family law is based on specific principles of protection of marriage, family and children. Contract law is based on the freedom of contract, limited by good customs and morality. Tort law is guided by the principle of prohibiting the harm to others, full compensation of material and imaterial damages. Contractual responsibility is regulated separately, so that the tort rules apply if the specific rules of contractual responsibility donot say otherwise. Other grounds for obligations are also regulated, as well as unjustified enrichment, doing business without order or authority, unilateral expression of intention and securities. The grounds for inheritance are contractual, statutory or based on the will. Freedom of disposition by will is limited by statutory rules regulating the forced share. The system of transfer of property ex lege after the death is adopted. The state is a successor if there are no testamentary, statutory or contractual inheritors.

  8. Development of a Distributed, Adaptive, Direction and Control (Civil Preparedness Communications) Network within the State of Rhode Island, Which May Serve as a Prototype Model for the Design of State Area Networks in Other States.

    Science.gov (United States)

    1981-03-01

    realize that a Civil Defense Communications capabil- ity existed, even in the best equipped communities. Notably, Town Council Presidents, Mayors ...5) B-; (6) AUDIO INPUT. Radios shall be furnished with mating conectors to accomplish , i.e.:(Molex male and female 10 PIN, or similar plugs.) All

  9. How persistent is civilization growth?

    OpenAIRE

    Garrett, Timothy J.

    2011-01-01

    In a recent study (Garrett, 2011), I described theoretical arguments and empirical evidence showing how civilization evolution might be considered from a purely physical basis. One implication is that civilization exhibits the property of persistence in its growth. Here, this argument is elaborated further, and specific near-term forecasts are provided for key economic variables and anthropogenic CO2 emission rates at global scales. Absent some external shock, civilization wealth, energy cons...

  10. Civil forensic psychiatry - Part 2: specific issues.

    Science.gov (United States)

    Samuels, Anthony H

    2018-06-01

    This paper describes the main areas of civil forensic psychiatry (FP) and the skills required by psychiatric experts. Some specific areas of civil FP are discussed, including tort law reform, reliability of psychiatric evidence, contentious psychiatric disorders, and the many domains of civil FP. Civil FP is an important sub-specialty component of forensic psychiatry that requires greater emphasis in the training and continuing education of psychiatrists. A process of accrediting psychiatrists as having competency in advanced civil FP may be of value.

  11. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  12. Apps for Ancient Civilizations

    Science.gov (United States)

    Thompson, Stephanie

    2011-01-01

    This project incorporates technology and a historical emphasis on science drawn from ancient civilizations to promote a greater understanding of conceptual science. In the Apps for Ancient Civilizations project, students investigate an ancient culture to discover how people might have used science and math smartphone apps to make their lives…

  13. 7 CFR 761.3 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Civil rights. 761.3 Section 761.3 Agriculture... SPECIAL PROGRAMS GENERAL PROGRAM ADMINISTRATION General Provisions § 761.3 Civil rights. Part 15d of this title contains applicable regulations pertaining to civil rights and filing of discrimination complaints...

  14. 12 CFR 622.61 - Adjustment of civil money penalties by the rate of inflation under the Federal Civil Penalties...

    Science.gov (United States)

    2010-01-01

    ... civil money penalties by the rate of inflation under the Federal Civil Penalties Inflation Adjustment... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Adjustment of civil money penalties by the rate of inflation under the Federal Civil Penalties Inflation Adjustment Act of 1990, as amended. 622.61...

  15. 25 CFR 11.503 - Applicable civil procedure.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Applicable civil procedure. 11.503 Section 11.503 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Civil Actions § 11.503 Applicable civil procedure. The procedure to be followed in civil...

  16. 24 CFR 81.83 - Civil money penalties.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Civil money penalties. 81.83... § 81.83 Civil money penalties. (a) Imposition. The Secretary may impose a civil money penalty on a GSE... writing of the Secretary's determination to impose a civil money penalty by issuing a Notice of Intent to...

  17. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  18. Handbook of cosmic hazards and planetary defense

    CERN Document Server

    Allahdadi, Firooz

    2015-01-01

    Covers in a comprehensive fashion all aspects of cosmic hazards and possible strategies for contending with these threats through a comprehensive planetary defense strategy. This handbook brings together in a single reference work a rich blend of information about the various types of cosmic threats that are posed to human civilization by asteroids, comets, bolides, meteors, solar flares and coronal mass ejections, cosmic radiation and other types of threats that are only recently beginning to be understood and studied, such as investigation of the “cracks” in the protective shield provided by the Van Allen belts and the geomagnetosphere, of matter-antimatter collisions, orbital debris and radiological or biological contamination. Some areas that are addressed involve areas about which there is a good deal of information that has been collected for many decades by multiple space missions run by many different space agencies, observatories and scientific researchers. Other areas involving research and ...

  19. 38 CFR 21.7310 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Civil rights. 21.7310... Bill-Active Duty) Administrative § 21.7310 Civil rights. (a) Delegation of authority concerning Federal... her jurisdiction. See part 18 of this chapter. These equal opportunity laws are: (1) Title VI, Civil...

  20. 7 CFR 250.21 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Civil rights. 250.21 Section 250.21 Agriculture... TERRITORIES AND POSSESSIONS AND AREAS UNDER ITS JURISDICTION General Operating Provisions § 250.21 Civil... Department's nondiscrimination regulations (7 CFR parts 15, 15a, and 15b) and the FNS civil rights...

  1. 7 CFR 1709.18 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Civil rights. 1709.18 Section 1709.18 Agriculture... ASSISTANCE TO HIGH ENERGY COST COMMUNITIES General Requirements § 1709.18 Civil rights. This program will be administered in accordance with applicable Federal Civil Rights Law. All grants made under this subpart are...

  2. 50 CFR 401.22 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Civil rights. 401.22 Section 401.22..., DEVELOPMENT AND ENHANCEMENT § 401.22 Civil rights. Each application for Federal assistance, grant-in-aid award... Assisted Programs of the Civil Rights Act of 1964 and with the Secretary's regulations promulgated...

  3. 49 CFR 233.11 - Civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalties. 233.11 Section 233.11..., DEPARTMENT OF TRANSPORTATION SIGNAL SYSTEMS REPORTING REQUIREMENTS § 233.11 Civil penalties. Any person (an... subject to a civil penalty of at least $650 and not more than $25,000 per violation, except that...

  4. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  5. Civil defense is futile

    International Nuclear Information System (INIS)

    Schell, J.

    1985-01-01

    In this paper, the author argues that the effects of a nuclear war would be so total and so horrible that plans to survive are a vain hope. The author says with overwhelming immediate local effects striking the vast majority of the population, and with one-week doses of radiation then rising into the tens of thousands of rems, evacuation and shelters are a vain hope. In these circumstances, evacuation before an attack would exercise in transporting people from one death to another. In a full-scale nuclear attack, there would be in all likelihood no surviving communities to help afflicted communities. in the second place, everyone who failed to seal himself off from the outside environment for as long as several months would soon die of radiation sickness. The natural environment would also be dying. If anyone survived the attack, the generations that would be trying to rebuild a human life would be sick and possibly deform generations. The human race as it is known would cease to be

  6. Beyond strong and weak: rethinking postdictatorship civil societies.

    Science.gov (United States)

    Riley, Dylan; Fernández, Juan J

    2014-09-01

    What is the impact of dictatorships on postdictatorial civil societies? Bottom-up theories suggest that totalitarian dictatorships destroy civil society while authoritarian ones allow for its development. Top-down theories of civil society suggest that totalitarianism can create civil societies while authoritarianism is unlikely to. This article argues that both these perspectives suffer from a one-dimensional understanding of civil society that conflates strength and autonomy. Accordingly we distinguish these two dimensions and argue that totalitarian dictatorships tend to create organizationally strong but heteronomous civil societies, while authoritarian ones tend to create relatively autonomous but organizationally weak civil societies. We then test this conceptualization by closely examining the historical connection between dictatorship and civil society development in Italy (a posttotalitarian case) and Spain (a postauthoritarian one). Our article concludes by reflecting on the implications of our argument for democratic theory, civil society theory, and theories of regime variation.

  7. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  8. 7 CFR 3550.3 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil rights. 3550.3 Section 3550.3 Agriculture... DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS General § 3550.3 Civil rights. RHS will administer its... amended by Executive Order 12259, as applicable. The civil rights compliance requirements for RHS are in 7...

  9. 34 CFR 303.424 - Civil action.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Civil action. 303.424 Section 303.424 Education... Civil action. Any party aggrieved by the findings and decision regarding an administrative complaint has the right to bring a civil action in State or Federal court under section 639(a)(1) of the Act...

  10. 49 CFR 228.21 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 228.21 Section 228.21..., DEPARTMENT OF TRANSPORTATION HOURS OF SERVICE OF RAILROAD EMPLOYEES Records and Reporting § 228.21 Civil... requirement is subject to a civil penalty of at least $650 and not more than $25,000 per violation, except...

  11. 78 FR 672 - Civil Monetary Penalties

    Science.gov (United States)

    2013-01-04

    ... Part 3560 RIN 0575AC93 Civil Monetary Penalties AGENCY: Rural Housing Service, USDA. ACTION: Proposed rule. SUMMARY: The Rural Housing Service (RHS or Agency) proposes to implement two civil monetary... civil monetary penalties under the authority of 42 U.S.C. 1490s (section 543 of the Housing Act of 1949...

  12. 12 CFR 229.21 - Civil liability.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Civil liability. 229.21 Section 229.21 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM... Availability Policies § 229.21 Civil liability. (a) Civil liability. A bank that fails to comply with any...

  13. O Judiciário como Ator Regulador da Internet: seu papel no esquema de forças do Estado moderno / The Judiciary as Regulatory Actor of the Internet: Its Role in the Framework of Forces of the Modern State

    Directory of Open Access Journals (Sweden)

    Amanda Nunes Lopes Espiñeira Lemos

    2018-05-01

    Full Text Available Purpose – To understand the role of Judiciary Power in regulating the Internet from the perspective of the WhatsApp blocking cases between 2015 and 2016 that led to the questioning of Judiciary's interpretation of the issue and the role of a Data Protection Authority in conflict resolution. Methodology/approach/design – Qualitative analysis from issues of internet regulation in relation to the theory that includes the positioning of Judiciary in scheme of forces of the modern State. It also presents a dialogue between the regulatory and argumentative theories pertinent to the arguments of the public decision to block WhatsApp. Finally, a brief analysis of the public audience discourse of the Bill of personal data and comparative international experience on DPAs. Findings – The Civil Internet Framework has been used as an isolated regulation to an entire legal system and the peculiarities of cyberspace that do not reproduce in the physical world, which requires the improvement of the interpretation of regulatory milestones in the network architecture. DPAs are facilitators in resolving conflicts that involve Internet and even to reduce prosecution of demands such as WhatsApp block. Resumo Propósito – Compreender o papel do Judiciário na regulação da Internet, a partir dos casos de bloqueio do WhatsApp entre 2015 e 2016, que levaram ao questionamento sobre a interpretação do Judiciário sobre o tema e o papel de uma Agência de Proteção de Dados Pessoais na resolução de conflitos. Metodologia/abordagem/design – Análise qualitativa das questões de regulação da internet frente à teoria que compreende o posicionamento do Judiciário no esquema de forças do Estado moderno. Apresenta-se também diálogo entre as teorias regulatórias e argumentativas pertinentes para os argumentos da decisão pública de bloqueio do WhatsApp. Por fim, uma breve análise do discurso da audiência pública do PL de dados pessoais e comparativa

  14. 49 CFR 221.7 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 221.7 Section 221.7 Transportation... TRANSPORTATION REAR END MARKING DEVICE-PASSENGER, COMMUTER AND FREIGHT TRAINS General § 221.7 Civil penalty. Any... requirement is subject to a civil penalty of at least $650 and not more than $25,000 per violation, except...

  15. 31 CFR 103.57 - Civil penalty.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Civil penalty. 103.57 Section 103.57... REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.57 Civil penalty. (a) For any... willfully participates in the violation, a civil penalty not to exceed $1,000. (b) For any willful violation...

  16. 30 CFR 881.12 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil rights. 881.12 Section 881.12 Mineral... LAND RECLAMATION SUBSIDENCE AND STRIP MINE REHABILITATION, APPALACHIA § 881.12 Civil rights. State or local authorities shall comply with Title VI of the Civil Rights Act of 1964 (Pub. L. 88-352) and all...

  17. 28 CFR 33.52 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Civil rights. 33.52 Section 33.52... Block Grants Additional Requirements § 33.52 Civil rights. The Justice Assistance Act provides that “no... the provisions of title VI of the Civil Rights Act of 1964; section 504 of the Rehabilitation Act of...

  18. 34 CFR 300.516 - Civil action.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Civil action. 300.516 Section 300.516 Education... DISABILITIES Procedural Safeguards Due Process Procedures for Parents and Children § 300.516 Civil action. (a... aggrieved by the findings and decision under § 300.514(b), has the right to bring a civil action with...

  19. 33 CFR 401.102 - Civil penalty.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Civil penalty. 401.102 Section... TRANSPORTATION SEAWAY REGULATIONS AND RULES Penalties-Violations of Seaway Regulations § 401.102 Civil penalty. (a) A person, as described in § 401.101(b), who violates a regulation is liable to a civil penalty of...

  20. 50 CFR 82.20 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Civil rights. 82.20 Section 82.20 Wildlife... (MARINE MAMMAL PROTECTION ACT OF 1972) Administration § 82.20 Civil rights. Each cooperative agreement... Civil Rights Act of 1964, 42 U.S.C. 2000d-2000d-4, and with the Secretary's regulations promulgated...

  1. 49 CFR 218.9 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 218.9 Section 218.9 Transportation... TRANSPORTATION RAILROAD OPERATING PRACTICES General § 218.9 Civil penalty. Any person (an entity of any type... requirement of this part or causes the violation of any such requirement is subject to a civil penalty of at...

  2. 50 CFR 300.40 - Civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Civil penalties. 300.40 Section 300.40... South Pacific Tuna Fisheries § 300.40 Civil penalties. The procedures of 15 CFR part 904 apply to the assessment of civil penalties, except as modified by the requirements of section 8 of the Act. ...

  3. 7 CFR 1435.201 - Civil penalties.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Civil penalties. 1435.201 Section 1435.201... Recordkeeping Requirements § 1435.201 Civil penalties. (a) Any processor, refiner, or importer of sugar, syrup... false data required under § 1435.200(a) through (e), is subject to a civil penalty of no more than $10...

  4. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  5. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  6. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    Directory of Open Access Journals (Sweden)

    Freyberger Michael

    2018-04-01

    Full Text Available An important line of privacy research is investigating the design of systems for secure input and output (I/O within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper will explore the limitations of ShadowCrypt in order to provide a foundation for the general principles that must be followed when designing a secure I/O system within Internet browsers. First, we developed a comprehensive UI attack that cannot be mitigated with popular UI defenses, and tested the efficacy of the attack through a user study administered on Amazon Mechanical Turk. Only 1 of the 59 participants who were under attack successfully noticed the UI attack, which validates the stealthiness of the attack. Second, we present multiple attack vectors against Shadow-Crypt that do not rely upon UI deception. These attack vectors expose the privacy weaknesses of Shadow DOM—the key browser primitive leveraged by ShadowCrypt. Finally, we present a sketch of potential countermeasures that can enable the design of future secure I/O systems within Internet browsers.

  7. GPS Civil Monitoring Performance Specification

    Science.gov (United States)

    2009-02-10

    This Civil Monitoring Performance Specification (CMPS) is published and maintained at : the direction of the Program Manager for Civil Applications, Global Positioning Systems : Wing (GPSW). The purpose of this document is to provide a comprehensive ...

  8. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  9. 14 CFR 1212.800 - Civil remedies.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Civil remedies. 1212.800 Section 1212.800... Comply With Requirements of This Part § 1212.800 Civil remedies. Failure to comply with the requirements of the Privacy Act and this part could subject NASA to civil suit under the provisions of 5 U.S.C...

  10. 13 CFR 302.20 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Civil rights. 302.20 Section 302... TERMS AND CONDITIONS FOR INVESTMENT ASSISTANCE § 302.20 Civil rights. (a) Discrimination is prohibited... 601 of Title VI of the Civil Rights Act of 1964, as amended (42 U.S.C. 2000d et seq.) (proscribing...

  11. 30 CFR 880.16 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil rights. 880.16 Section 880.16 Mineral... LAND RECLAMATION MINE FIRE CONTROL § 880.16 Civil rights. State and local authorities shall comply with Title VI of the Civil Rights Act of 1964 (Pub. L. 88-352) and all requirements imposed by or pursuant to...

  12. 49 CFR 235.9 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 235.9 Section 235.9 Transportation... SIGNAL SYSTEM OR RELIEF FROM THE REQUIREMENTS OF PART 236 § 235.9 Civil penalty. Any person (an entity of... violates any requirement of this part or causes the violation of any such requirement is subject to a civil...

  13. 7 CFR 3560.2 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil rights. 3560.2 Section 3560.2 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS General Provisions and Definitions § 3560.2 Civil rights. (a... prohibition under Title VI of the Civil Rights Act of 1964, 42 U.S.C. 2000d and Title VI regulations against...

  14. 22 CFR 127.10 - Civil penalty.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Civil penalty. 127.10 Section 127.10 Foreign... Civil penalty. (a) The Assistant Secretary of State for Political-Military Affairs is authorized to impose a civil penalty in an amount not to exceed that authorized by 22 U.S.C. 2778, 2779a and 2780 for...

  15. 28 CFR 65.52 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Civil rights. 65.52 Section 65.52... Additional Requirements § 65.52 Civil rights. The Act provides that “no person in any state shall on the... funds under the Act are also subject to the provisions of title VI of the Civil Rights Act of 1964...

  16. 10 CFR 110.64 - Civil penalty.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Civil penalty. 110.64 Section 110.64 Energy NUCLEAR... Enforcement § 110.64 Civil penalty. (a) In response to a violation, the Commission may institute a proceeding to impose a civil penalty under section 234 of the Atomic Energy Act by issuing a notice to the...

  17. 10 CFR 1017.29 - Civil penalty.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Civil penalty. 1017.29 Section 1017.29 Energy DEPARTMENT... INFORMATION Violations § 1017.29 Civil penalty. Link to an amendment published at 74 FR 66033, Dec. 14, 2009... subject to a civil penalty under this part: (1) 10 CFR Part 1017—Identification and Protection of...

  18. 12 CFR 215.11 - Civil penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Civil penalties. 215.11 Section 215.11 Banks... OFFICERS, DIRECTORS, AND PRINCIPAL SHAREHOLDERS OF MEMBER BANKS (REGULATION O) § 215.11 Civil penalties... subject to civil penalties as specified in section 29 of the Federal Reserve Act (12 U.S.C. 504). [Reg. O...

  19. 39 CFR 233.12 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Civil penalties. 233.12 Section 233.12 Postal... Civil penalties. False representation and lottery orders— (a) Issuance. Pursuant to 39 U.S.C. 3005, the... be liable to the United States for a civil penalty in an amount not to exceed $11,000 for each day...

  20. Miradas francesas sobre la Guerra Civil

    Directory of Open Access Journals (Sweden)

    Jean-Marc DELAUNAY

    2015-03-01

    Full Text Available Como muestra el asunto hoy vigente —pero relativamente discreto— de la venta del edificio que abrigó el antiguo taller parisino donde Picasso hizo su Guernica (1937, la Guerra Civil española sigue siendo en Francia una referencia mayor de la historia contempóranea. Al ritmo de las conmemoraciones decenales de su estallido (1996/2006, se ha desarrollado una verdadera marea memorial nutrida tanto por la apertura de archivos escritos y audiovisuales como por la desinhibición de los nietos de exiliados condicionados durante tanto tiempo por la historia de la derrota de sus padres y abuelos. Animan el debate las tribulaciones de la vida política española actual, entre neofranquismo, republicanismo y nacionalismos centralistas y/o regionales. Por haber sido la unica vía de salida, Francia —metropolis y África del norte— se vio más involucrada que cualquier otro país al recibir la aplastante mayoría de los exiliados. Aunque los verdaderos especialistas en dicha guerra son poco numerosos, todo un mundillo se ha otorgado el derecho y la capacidad de escribir sobre ella como descendientes de exiliados o activistas políticos, sobre todo en el sur de Francia. Todos los medios se ven afectados: desde la literatura estrictamente histórica al internet. De las obras eruditas, de vulgarización —también para la juventud— a las memorias arrancadas al olvido; de las actas de los coloquios a los tebeos; de los álbumes fotográficos a los documentales (siempre pro republicanos. Al tiempo toda la producción histórica generalista o militar junta a los partidarios de una visión anticomunista, neutralista o manifestamente pro franquista. La Guerra Civil española, que había encontrado una Francia dividida, la reencuentra de nuevo como tal a pesar de todos los intentos de mediación científica.

  1. Producing Civil Society

    DEFF Research Database (Denmark)

    Feldt, Liv Egholm; Hein Jessen, Mathias

    Since the beginning of the 1990’s, civil society has attracted both scholarly and political interest as the ‘third sphere’ outside the state and the market not only a normatively privileged site of communication and ‘the public sphere’, but also as a resource for democratization processes...... and social cohesion, as well as a provider of welfare services from a welfare state in dire straits. However, such a view upholds a sharp distinction between the three sectors and their distinct logic. This article claims that the separation of spheres is a fundamental part of our ‘social imaginary......’ and as such dominates our way of thinking about civil society. Yet, this view hinders the understanding of how civil society is not a pre-existing or given sphere, but a sphere which is constantly produced both discursively, conceptually and practically. Through two examples; 1,the case of philanthropy in the beginning...

  2. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  3. Julgamentos parciais no processo civil

    OpenAIRE

    Antonio Carlos Nachif Correia Filho

    2015-01-01

    Este trabalho trata fundamentalmente da admissibilidade dos julgamentos parciais do mérito e de questões de mérito no sistema processual civil brasileiro, considerando especialmente o modelo constitucional de processo civil, bem como no sistema processual prospectivo previsto no Projeto de Novo Código de Processo Civil, que deve entrar vigor em breve. Com este objetivo, será abordado no início da dissertação o dogma da unidade estrutural da sentença, sua origem, fundamentos e aplicabilidade n...

  4. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  5. Defense Civil Support: DOD Has Made Progress Incorporating the Homeland Response Force into the Chemical, Biological, Radiological, and Nuclear Response Enterprise

    Science.gov (United States)

    2016-06-01

    role supporting civil authorities in a CBRN incident. By 2012, DOD had established the HRF, comprising 10 geographically dispersed National Guard...HRF/CERFP) (Sept. 30, 2010). 44A concept of operation is a verbal or graphic statement that clearly and concisely expresses what a Commander

  6. [Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation].

    Science.gov (United States)

    Kammerl, Rudolf; Wartberg, Lutz

    2018-02-01

    Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation Everyday life of adolescents and their parents is increasingly characterized by digital media usage (also referred to as "process of mediatization"). In the current study, associations between problematic Internet use of the adolescents (as a possible consequence of the process of mediatization) and parental media education were explored. For this purpose, throughout Germany 1,095 family dyads (an adolescent and a related parent) were investigated with a standardized questionnaire measuring different aspects of parental media education and adolescent problematic Internet use. We conducted two multiple linear regression analyses (dimensional approach) with adolescent problematic Internet use based on self-ratings (model 1, corrected R 2 = 0.18) and parental assessment (model 2, corrected R 2 = 0.24) as response variables. Consistently for self- and parental ratings, adolescent problematic Internet use was statistically significant related to male gender (of the adolescent), a more frequent inconsistent media education (adolescents' and parents' perspective) and a stronger monitoring (parents' perspective). Additionally, we observed associations between the parental rating of adolescent problematic Internet use and a less frequent active and restrictive Internet Mediation (parents' perspective). The findings of the present study show the importance of parental media education for problematic Internet use in adolescence and especially, the role of inconsistent media education should be investigated again in further studies.

  7. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  8. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  9. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  10. 42 CFR 59.209 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Civil rights. 59.209 Section 59.209 Public Health... Grants for Family Planning Service Training § 59.209 Civil rights. Attention is called to the requirements of Title VI of the Civil Rights Act of 1964 (78 Stat. 252, 42 U.S.C. 2000d et seq.) and in...

  11. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  12. A roadmap for security challenges in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Arbia Riahi Sfar

    2018-04-01

    Full Text Available Unquestionably, communicating entities (object, or things in the Internet of Things (IoT context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the IoT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the IoT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current standardization activities are surveyed and discussed to the ensure the security of IoT components and applications. Keywords: Internet of Things, Systemic and cognitive approach, Security, Privacy, Trust, Identification, Access control

  13. Politicized Civil Society in Bangladesh: Case Study Analyses

    Directory of Open Access Journals (Sweden)

    Farhat Tasnim

    2017-03-01

    Full Text Available Although civil society in Bangladesh is recognized for its vibrant performance in social development, it is often criticized for its inability to ensure good governance and democracy. The aim of this paper is to point out the reasons for this failure of civil society. Through performing case studies upon five civil society organizations representing different sector and level of the civil society, the paper concludes that civil society organizations in Bangladesh are often politicized and co-opted by different political parties. In a typical scenario, civil society can provide a counterbalance or even monitor the state both at the national and local level. However, in Bangladesh, often the civil society organizations have compromised their autonomy and politicized themselves to certain political parties or political block. In such a vulnerable position, civil society can hardly play its expected role to ensure good governance and strengthen democracy.

  14. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  15. Proposal for the increase of the contract amounts for LHC civil engineering construction and civil engineering consultancy contracts

    CERN Document Server

    2001-01-01

    This document concerns the increase of the contract amounts for LHC civil engineering construction contracts and civil engineering consultancy contracts. The Finance Committee is invited to agree to the increase of the contract amounts with: - the joint venture TEERAG-ASDAG (AT), C. BARESEL (DE) and LOCHER (CH) for civil engineering construction, package 1, for a revised total amount of 91 500 000 Swiss francs, subject to revision; - the joint venture EDF (FR) and KNIGHT&PIESOLD (GB) for the provision of civil engineering consultancy services, package 1, for a revised total amount of 14 400 000 Swiss francs, subject to revision; - the joint venture TAYLOR WOODROW (GB), AMEC (GB) and SPIE BATIGNOLLES (FR) for civil engineering construction, package 3a, for a revised total amount of 118 000 000 Swiss francs, subject to revision; - the joint venture BROWN&ROOT (GB), INTECSA (ES) and HIDROTECNICA (PT) for the provision of civil engineering consultancy services, package 3, for a revised total amount of 14 ...

  16. Expanding Advanced Civilizations in the Universe

    Science.gov (United States)

    Gros, C.

    The 1950 lunch-table remark by Enrico Fermi `Where is everybody' has started intensive scientific and philosophical discussions about what we call nowadays the `Fermi paradox': If there had been ever a single advanced civilization in the cosmological history of our galaxy, dedicated to expansion, it would have had plenty of time to colonize the entire galaxy via exponential growth. No evidence of present or past alien visits to earth are known to us, leading to the standard conclusion that no advanced expanding civilization has ever existed in the milky-way. This conclusion rest fundamentally on the ad-hoc assumption, that any alien civilizations dedicated to expansion at one time would remain dedicated to expansions forever. Considering our limited knowledge about alien civilizations we need however to relax this basic assumption. Here we show that a substantial and stable population of expanding advanced civilization might consequently exist in our galaxy.

  17. Compulsive Internet use: the role of online gaming and other internet applications.

    Science.gov (United States)

    van Rooij, Antonius J; Schoenmakers, Tim M; van de Eijnden, Regina J J M; van de Mheen, Dike

    2010-07-01

    Increasing research on Internet addiction makes it necessary to distinguish between the medium of Internet and its specific applications. This study explores the relationship between time spent on various Internet applications (including online gaming) and Compulsive Internet Use in a large sample of adolescents. The 2007 (N=4,920) and 2008 (N=4,753) samples of a longitudinal survey study among adolescents were used, as well as the 2007-2008 cohort subsample (N=1421). Compulsive Internet Use was predicted from the time spent on the various Internet applications in two cross-sectional multiple linear regression models and one longitudinal regression model in which changes in behavior were related to changes in Compulsive Internet Use. In both samples, downloading, social networking, MSN use, Habbo Hotel, chatting, blogging, online games, and casual games were shown to be associated with Compulsive Internet Use. Off these, online gaming was shown to have the strongest association with Compulsive Internet Use. Moreover, changes in online gaming were most strongly associated with changes in Compulsive Internet Use over time for the longitudinal cohort. A clear relationship was shown between online gaming and Compulsive Internet Use. It is further argued that a subgroup of compulsive Internet users should be classified as compulsive online gamers. Copyright (c) 2010 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. Features of personnel motivation in the civil service

    Directory of Open Access Journals (Sweden)

    N. F. Artemenko

    2016-06-01

    The problems and the current state of civil servants motivation are investigated. The author reveals the contents of the new Law of Ukraine «On Civil Service» in the context of civil servants motivation and determines the ways of improving civil servants motivation in Ukraine.

  19. Responsabilidade civil do Estado por omissão estatal Civil liability of the State for environmental neglect

    Directory of Open Access Journals (Sweden)

    Haide Maria Hupffer

    2012-06-01

    Full Text Available Constituição Federal de 1988 é um divisor de águas ao assumir-se como Constituição Ambiental, provocando uma ruptura em relação ao conceito de responsabilidade civil. Partindo de uma abordagem qualitativa, dialética e jurisprudencial, este artigo analisa o Princípio Responsabilidade desenvolvido por hans jonas e realiza um diálogo com o instituto da responsabilidade civil ambiental, identificando, com apoio na legislação constitucional e infraconstitucional, as controvérsias doutrinárias acerca da natureza da responsabilidade estatal (objetiva ou subjetiva frente a casos de omissão da administração pública e à ocorrência de dano ambiental. Conclui-se que o Superior Tribunal de Justiça assume uma dimensão mais alargada do conceito de responsabilidade civil do Estado, demonstrando uma tendência pela responsabilidade civil objetiva com base no risco. Assim, o Brasil, salvo algumas divergências doutrinárias, adota a responsabilidade civil objetiva do Estado pela teoria do risco administrativo alicerçada no ato ilícito e na aceitação do risco.The Federal Constitution of 1988 is a 'water divisor' since it assumes the role of Environmental Constitution, causing a rapture of the concept of civil liability. Starting from a qualitative, dialectical and jurisprudential approach, this article analyzes the Principle of Liability according to Hans Jonas in order to dialogue with the Institute of Civil Environmental Liability, identifying, with the support of the constitutional and infraconstitutional legislation, the doctrinary controversies about the nature of state liability (objective or subjective towards cases of neglect by the public administration and the event of environmental damage. It is possible to conclude that the Higher Court of Justice assumes a larger dimension of the civil liability of the State, thus showing the tendency towards the objective civil liability based on the risk. Therefore, Brazil, regarded some

  20. Civil works for NPPs construction

    International Nuclear Information System (INIS)

    Portenseigne, Christophe

    2014-01-01

    Christophe Portenseigne, Technical Director of Bouygues Travaux Publics, provided explanations on the main challenges of Civil work for the construction of the 3. generation of NPPs. He then provided an overview of the new Civil Work concepts for the 4. generation of NPPs

  1. Environmental Ethics and Civil Engineering.

    Science.gov (United States)

    Vesilind, P. Aarne

    1987-01-01

    Traces the development of the civil engineering code of ethics. Points out that the code does have an enforceable provision that addresses the engineer's responsibility toward the environment. Suggests revisions to the code to accommodate the environmental impacts of civil engineering. (TW)

  2. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  3. Cybersecurity in European Union and In Mercosur: Big Data and Surveillance Versus Privacy and Data Protection On the Internet

    OpenAIRE

    Favera, Rafaela Bolson Dalla; Silva, Rosane Leal da

    2016-01-01

    This paper aims to discuss the surveillance practices, with the help of big data, especially after the revelations of Edward Snowden in 2013. It aims to analyze the acting of European Union in relation to the cybersecurity, besides to expose and discuss any existing strategies in Mercosur to face these problems, which will culminate with the analysis of the Internet Civil Mark in Brazil. It was found the need for the same block members act of transnational and cooperative manner, as recommend...

  4. The impact of internet gambling on gambling problems: a comparison of moderate-risk and problem Internet and non-Internet gamblers.

    Science.gov (United States)

    Gainsbury, Sally M; Russell, Alex; Hing, Nerilee; Wood, Robert; Blaszczynski, Alex

    2013-12-01

    Numerous studies have reported higher rates of gambling problems among Internet compared with non-Internet gamblers. However, little research has examined those at risk of developing gambling problems or overall gambling involvement. This study aimed to examine differences between problem and moderate-risk gamblers among Internet and non-Internet gamblers to determine the mechanisms for how Internet gambling may contribute to gambling problems. Australian gamblers (N = 6,682) completed an online survey that included measures of gambling participation, problem gambling severity, and help seeking. Compared with non-Internet gamblers, Internet gamblers were younger, engaged in a greater number of gambling activities, and were more likely to bet on sports. These differences were significantly greater for problem than moderate-risk gamblers. Non-Internet gamblers were more likely to gamble on electronic gaming machines, and a significantly higher proportion of problem gamblers participated in this gambling activity. Non-Internet gamblers were more likely to report health and psychological impacts of problem gambling and having sought help for gambling problems. Internet gamblers who experience gambling-related harms appear to represent a somewhat different group from non-Internet problem and moderate-risk gamblers. This has implications for the development of treatment and prevention programs, which are often based on research that does not cater for differences between subgroups of gamblers. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  5. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  6. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  7. Insights into Motivating Internet Users towards Internet Banking

    OpenAIRE

    J. Ramola Premalatha

    2016-01-01

    Internet banking has evolved from helping customers meet their basic banking needs to meeting their sophisticated needs. In recent years, the number of internet banking users has been increasing exponentially. As customers get more and more educated, getting insight about internet banking has become a primary area of concern for all leading banks in India. Hence, the study is made to analyse the perception of customers specifically who are computer literate, in a semi-urban area about interne...

  8. 76 FR 71431 - Civil Penalty Calculation Methodology

    Science.gov (United States)

    2011-11-17

    ... DEPARTMENT OF TRANSPORTATION Federal Motor Carrier Safety Administration Civil Penalty Calculation... is currently evaluating its civil penalty methodology. Part of this evaluation includes a forthcoming... civil penalties. UFA takes into account the statutory penalty factors under 49 U.S.C. 521(b)(2)(D). The...

  9. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  10. [Viruses and civilization].

    Science.gov (United States)

    Chastel, C

    1999-01-01

    A few million years ago, when primates moved from the east African forest to the savannah, they were already infected with endogenous viruses and occultly transmitted them to the prime Homo species. However it was much later with the building of the first large cities in Mesopotamia that interhuman viral transmission began in earnest. Spreading was further enhanced with the organization of the Egyptian, Greek, Roman, and Arab empires around the Mediterranean. Discovery of the New World in 1492 led to an unprecedented clash of civilizations and the destruction of pre-Columbian Indian civilizations. It also led to a rapid spread of viruses across the Atlantic Ocean with the emergence of yellow fever and appearance of smallpox and measles throughout the world. However the greatest opportunities for worldwide viral development have been created by our present, modern civilization. This fact is illustrated by epidemic outbreaks of human immunodeficiency virus, Venezuela hemorrhagic fever, Rift valley fever virus, and monkey pox virus. Close analysis underscores the major role of human intervention in producing these events.

  11. Features of upbringing children in civil law

    OpenAIRE

    Лобжанідзе, Давид

    2014-01-01

    The paper analyzes the features of upbringing children in civil law, in particular under the Civil Code of Georgia. The author examines the concept of the family as a social phenomenon and its underlying principles. Attention is paid also to the court practice of upbringing children and determining the place of their residence. English abstract D. Lobzhanidze Features of upbringing children in civil law. The paper analyzes the features of upbringing children in civil law, in particular u...

  12. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  13. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  14. Using an Internet-Based Breast Cancer Risk Assessment Tool to Improve Social-Cognitive Precursors of Physical Activity.

    Science.gov (United States)

    Fowler, Stephanie L; Klein, William M P; Ball, Linda; McGuire, Jaclyn; Colditz, Graham A; Waters, Erika A

    2017-08-01

    Internet-based cancer risk assessment tools might serve as a strategy for translating epidemiological risk prediction research into public health practice. Understanding how such tools affect key social-cognitive precursors of behavior change is crucial for leveraging their potential into effective interventions. To test the effects of a publicly available, Internet-based, breast cancer risk assessment tool on social-cognitive precursors of physical activity. Women (N = 132) aged 40-78 with no personal cancer history indicated their perceived risk of breast cancer and were randomly assigned to receive personalized ( www.yourdiseaserisk.wustl.edu ) or nonpersonalized breast cancer risk information. Immediately thereafter, breast cancer risk perceptions and physical activity-related behavioral intentions, self-efficacy, and response efficacy were assessed. Personalized information elicited higher intentions, self-efficacy, and response efficacy than nonpersonalized information, P values Internet-based risk assessment tools can produce beneficial effects on important social-cognitive precursors of behavior change, but lingering skepticism, possibly due to defensive processing, needs to be addressed before the effects can be maximized.

  15. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  16. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  17. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  18. Is there a relationship between Internet dependence and eating disorders? A comparison study of Internet dependents and non-Internet dependents.

    Science.gov (United States)

    Tao, Z L; Liu, Y

    2009-01-01

    Several studies have examined the underlying psychopathology in overuse of the Internet, including depression, social anxiety, and substance dependence. A relationship between these psychological disorders appears to exist. No links have been established between Internet dependence and eating disorders. Fifty-four Internet dependents were compared with a control group concerning symptomatic aspects of eating disorders and psychological characteristics related to eating disorders. They all belonged to 1199 respondents of Chinese secondary school and college students between the ages of 12 and 25 years old. A Mann-Whitney U-test was used to determine the difference between Internet dependent groups and non-Internet dependent groups concerning Eating Attitudes Test and Eating Disorder Inventory scores. Females and male Internet dependents rated themselves with significantly higher symptomatic aspects of eating disorders than control groups. Female and male Internet dependents showed significantly higher psychological characteristics related to eating disorders than control groups. A relationship between Internet dependence and eating disorders appears to exist.

  19. 42 CFR 493.1834 - Civil money penalty.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Civil money penalty. 493.1834 Section 493.1834... (CONTINUED) STANDARDS AND CERTIFICATION LABORATORY REQUIREMENTS Enforcement Procedures § 493.1834 Civil money... Secretary to impose civil money penalties on laboratories. Section 1846(b)(3) of the Act specifically...

  20. Physicians should prepare for nuclear disaster

    International Nuclear Information System (INIS)

    Maccabee, H.D.

    1985-01-01

    In this paper, the author insists that physicians must take an active role in the civil defense of the United States. They must prepare to save lives and prevent suffering in any type of disaster including nuclear war. The author makes comparisons of America's civil defense programs and those of other nations. The United States is way behind other nations in civil defense. The author gives five advantages of civil defense. He says civil defense, unlike offensive weapons systems, cannot directly threaten the lives of Russians or any other nation. Properly designed shelter systems can serve multiple purposes, including storage and parking. Construction of shelters is likely to be labor-intensive by comparison with weapons systems and would probably result in more jobs in portions of the economy that have been distressed. If arms control and reduction negotiations are successful, there may be a transition period of fear and instability while methods of verification are checked. An adequate civil defense system could help to bridge these gaps of insecurity. The extension of the above argument would be to replace the doctrine of mutually assured destruction (MAD) with mutually assured survival

  1. 25 CFR 11.501 - Judgments in civil actions.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Judgments in civil actions. 11.501 Section 11.501 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Civil Actions § 11.501 Judgments in civil actions. (a) In all civil cases, judgment shall...

  2. Legal regulation of public relations related to the use of the Internet

    Directory of Open Access Journals (Sweden)

    О. Ю. Битяк

    2015-05-01

    Full Text Available Problem setting. Using Internet technologies is essential to the functioning of public institutions and the economy, public policy in conditions of world globalization. Continues to be problematic issue of protecting the rights and interests of individuals and businesses in the Internet. The issue of legal regulation of social relations associated with the use interenet technology is also controversial in terms of academics conceptually – appropriate or not regulation of such relationship, what is the relationship that their essence and that their contents. Recent research and publications analysis. Known for lawyers is to look at the relationship as a product of interaction between people and all kinds and forms relationships arising and function in society is public, aimed at meeting the needs and interests of individuals or their associations. However, the relationship between certain subjects arise and only in such circumstances may use legal mechanisms for the settlement of constitutional, civil, administrative, economic, legal and other relations. In all cases of this relationship is at least two parties, the two entities for the right (law does not matter in which organizational and legal state, they are relative to each other. It is important that they enter into relationships with each other, and these relations can settle right. Participants Internet relationship certainly serve certain organizations and individuals, but they are not identified as personalities. Each participant may make Internet network any information, preferably only that it did not cause harm to others. Unfortunately this is not always the case. On the Internet you can find data relating to individuals, the way is not always true, but set them Distributor virtually impossible. In the Internet greatly increased the number of entities that use of the Internet in various fields - social, economic, political, cultural, religious, gender, etc. In this regard, we can

  3. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  4. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  5. 42 CFR 460.46 - Civil money penalties.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Civil money penalties. 460.46 Section 460.46 Public...) Sanctions, Enforcement Actions, and Termination § 460.46 Civil money penalties. (a) CMS may impose civil money penalties up to the following maximum amounts: (1) For each violation regarding enrollment or...

  6. Increase of the contract amounts for LHC civil-engineering construction and civil-engineering consultancy contracts

    CERN Document Server

    2005-01-01

    This document concerns the increase of the contract amounts for LHC civil-engineering construction and civil-engineering consultancy, Package 2. The Finance Committee is invited to take note of the increase of the contract amounts with: - the joint venture DRAGADOS (ES) and SELI (IT) for civil-engineering construction, LHC Package 2, for an amount of 28 087 000 Swiss francs, subject to revision, in the amount previously announced to Finance Committee (CERN/FC/4516) of 132 200 000 Swiss francs, subject to revision, bringing the total to a maximum amount of 160 287 000 Swiss francs, subject to revision. - the joint venture GIBB (GB), GEOCONSULT (AT) and SGI (CH) for the provision of civil-engineering consultancy services, LHC Package 2, for an amount of 900 000 Swiss francs, subject to revision, in the amount previously announced to Finance Committee of 13 800 000 Swiss francs, subject to revision, bringing the total to a maximum amount of 14 700 000 Swiss francs, subject to revision

  7. Rhetoric of civil conflict management: United Nations Security Council debates over the Syrian civil war

    Directory of Open Access Journals (Sweden)

    Juraj Medzihorsky

    2017-04-01

    Full Text Available This paper introduces a spatial model of civil conflict management rhetoric to explore how the emerging norm of responsibility to protect shapes major power rhetorical responses to civil war. Using framing theory, we argue that responsibility to protect functions like a prescriptive norm, such that representing a conflict as one of (1 human rights violations (problem definition, implies rhetorical support for (2 coercive outside intervention (solution identification. These dimensions reflect the problem-solution form of a prescriptive norm. Using dictionary scaling with a dynamic model, we analyze the positions of UN Security Council members in debates over the Syrian Civil War separately for each dimension. We find that the permanent members who emphasized human rights violations also used intervention rhetoric (UK, France, and the US, and those who did not used non-intervention rhetoric (Russia and China. We conclude that, while not a fully consolidated norm, responsibility to protect appears to have structured major power rhetorical responses to the Syrian Civil War.

  8. Internet use and suicidal behaviors: internet as a threat or opportunity?

    Science.gov (United States)

    Robert, Anna; Suelves, Josep Maria; Armayones, Manuel; Ashley, Sivakamy

    2015-04-01

    Suicidal behavior is a common and severe health problem around the world. Internet use has been related to an increase in suicidal behaviors, but few studies have focused on the potential benefits of Internet use for preventing self-harm and suicide. We reviewed the existing literature on the relationship between suicide and Internet use. The accessibility of suicide-related information on the Internet seems to have an impact on the incidence of suicide behaviors. However, the Internet is useful for linking people who feel lonely or isolated, and it provides access to suicide prevention information and resources. The Internet can influence vulnerable people to attempt suicide, but it can also be used to prevent self-harm and suicide. We propose some efforts that can be made in this preventive line.

  9. Energy use, entropy and extra-terrestrial civilizations

    International Nuclear Information System (INIS)

    Hetesi, Zsolt

    2010-01-01

    The possible number of extra-terrestrial civilizations is estimated by the Drake-equation. Many articles pointed out that there are missing factors and over-estimations in the original equation. In this article we will point out that assuming some axioms there might be several limits for a technical civilization. The key role of the energy use and the problem of the centres and periphery strongly influence the value of the Llifetime of a civilization. Our development have several edifications of the investigations of the growth of an alien civilization.

  10. Energy use, entropy and extra-terrestrial civilizations

    Energy Technology Data Exchange (ETDEWEB)

    Hetesi, Zsolt, E-mail: zs.hetesi@astro.elte.h [Eoetvoes University, Department of Astronomy, Budapest, H-1518, PO Box 32 (Hungary)

    2010-03-01

    The possible number of extra-terrestrial civilizations is estimated by the Drake-equation. Many articles pointed out that there are missing factors and over-estimations in the original equation. In this article we will point out that assuming some axioms there might be several limits for a technical civilization. The key role of the energy use and the problem of the centres and periphery strongly influence the value of the Llifetime of a civilization. Our development have several edifications of the investigations of the growth of an alien civilization.

  11. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  12. Problematic internet users' skin conductance and anxiety increase after exposure to the internet.

    Science.gov (United States)

    Romano, Michela; Roaro, Alessandra; Re, Federica; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2017-12-01

    To examine the impact of cessation of an internet session on skin conductance responses and anxiety of higher and lower problem internet users, in order to explore possible physiological withdrawal effects. Participants were measured in terms of their skin conductance before (15min), during (15min), and after (15min) an internet session, and completed self-report measures of state anxiety and problematic internet use. Higher, but not lower, problem users showed increased skin conductance after internet use was stopped, relative to before their internet session. Higher problem users' GSR scores increased, as the time from internet cessation became longer. Higher problem users also showed increased levels of anxiety, following their internet session, which correlated with their skin conductance scores. These results suggest that, following termination of an internet session, withdrawal-like effects are seen, both psychologically and physiologically. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  14. Journal of Civil Engineering, JKUAT

    African Journals Online (AJOL)

    The Journal of Civil Engineering, JKUAT aims to publish definitive and original research papers of high standard, containing material of broad interest and of significant contribution to civil engineering, with emphasis being placed on material that is applicable to the solution of practical problems. It provides a forum for ...

  15. 12 CFR 509.103 - Civil money penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Civil money penalties. 509.103 Section 509.103... PROCEDURE IN ADJUDICATORY PROCEEDINGS Local Rules § 509.103 Civil money penalties. (a) Assessment. In the... may serve an order of assessment of civil money penalty upon the party concerned. The assessment order...

  16. 42 CFR 73.21 - Civil money penalties.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Civil money penalties. 73.21 Section 73.21 Public... SELECT AGENTS AND TOXINS § 73.21 Civil money penalties. (a) The Inspector General of the Department of Health and Human Services is delegated authority to conduct investigations and to impose civil money...

  17. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  18. 40 CFR 35.925-9 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Civil rights. 35.925-9 Section 35.925-9... ASSISTANCE Grants for Construction of Treatment Works-Clean Water Act § 35.925-9 Civil rights. That if the... the Civil Rights Act of 1964 and part 7 of this chapter have been met. ...

  19. 12 CFR 1250.3 - Civil money penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Civil money penalties. 1250.3 Section 1250.3 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES FLOOD INSURANCE § 1250.3 Civil money... to § 1250.2, the Director of FHFA, or his or her designee, may assess civil money penalties against...

  20. Modeling traditional literacy, internet skills and internet usage: an empirical study

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2016-01-01

    This paper focuses on the relationships among traditional literacy (reading, writing and understanding text), medium-related Internet skills (consisting of operational and formal skills), content-related Internet skills (consisting of information and strategic skills) and Internet usage types

  1. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  2. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  3. Responsabilidade civil das empresas de construção civil pelos vícios e defeitos do produto

    OpenAIRE

    Guedes Júnior, Alberto Augusto

    2013-01-01

    Responsabilidade civil das empresas de construção civil pelos vícios e defeitos do produto. A discussão ocorre através da análise rápida da evolução do sistema da responsabilidade civil o ordenamento geral e na legislação do consumidor, considerando o afastamento da teoria da culpa e o fortalecimento da responsabilização objetiva com fundamento a boa-fé. Este conflito e interação entre os códigos no que tange a responsabilização civil pelos acidentes de consumo traça a base dos ...

  4. Civil society: beyond non profit / Sociedad civil: más allá del non profit

    Directory of Open Access Journals (Sweden)

    Miguel de Haro Serrano

    2013-10-01

    Full Text Available For a numerous group of recognized and proved authority authors, the Civil Society is limited to the Non Profit organizations. Non Profit is the great limit, the rigid and static border. The limes on the Roman Empire were less overwhelming than the non profit of certain academics. Dura lex and unfair law that keeps aside from the civil society scope the entities on the social economy and the whole market around mercantile enterprises and businesses. Nevertheless, the new changes in the today’s society and the new concept of businesses oriented to the society without forsaking the quest for economic profit, poses a Civil Society beyond non profit.

  5. Undesigning the Internet : An exploratory study of reducing everyday Internet connectivity

    OpenAIRE

    Widdicks, Kelly Victoria; Ringenson, Tina; Pargman, Daniel; Kuppusamy, Vishnupriya; Lago, Patricia

    2018-01-01

    Internet connectivity is seamlessly integrated into many of our everyday habits and activities. Despite this, previous research has highlighted that our rather excessive Internet use is not sustainable or even always socially beneficial. In this paper, we carried out an exploratory study on how Internet disconnection affects our everyday lives and whether such disconnection is even possible in today’s society. Through daily surveys, we captured what Internet use means for ten participants and...

  6. Civil Rights for Trafficked Persons: Recommendations for a More Effective Federal Civil Remedy

    OpenAIRE

    Shannon Lack

    2008-01-01

    In response to increasing public awareness of human trafficking in the United States, the Victims of Trafficking and Violence Protection Act (TVPA) was signed into law by President Bill Clinton in October of 2000. The TVPA consolidated existing legislation to create a comprehensive civil remedy; this ensures that trafficking victims are no longer forced to seek redress under multiple criminal and civil statutes that target only components of the human trafficking offense. However, despite its...

  7. Civil rights reference of administrative procedures

    International Nuclear Information System (INIS)

    Held, J.

    1984-01-01

    The book deals with the constitutional obligations which substantive civil rights demand from administrative procedures. The Federal Constitutional Court distinguishes between protection of civil rights in, and by, administrative and judicial procedures. The author analyses the example of the decision of the Federal Constitutional Court concerning the atomic power plant of Muelheim-Kaerlich. In the licensing procedure pursuant to the Atomic Energy Act, the civil rights of persons concerned are guaranteed by the governmental obligation to its protection. (CW) [de

  8. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  9. 12 CFR 908.6 - Civil money penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Civil money penalties. 908.6 Section 908.6... Proceedings § 908.6 Civil money penalties. (a) Notice of assessment—(1) Grounds. The Finance Board may issue and serve a notice of assessment of a civil money penalty on any Bank or any executive officer or...

  10. Civil Society, Democratic Space, and Social Work

    Directory of Open Access Journals (Sweden)

    Neelmani Jaysawal

    2013-10-01

    Full Text Available Civil Society envisages the growth of civilization in a way that the society is in “civilized form.” It has been prominent in Social science since time immemorial. Till 18th century, it was synonymous with the state or political society. It was more or less direct translation of Cicero’s Societas’ Civilis and Aristotle’s Koinonia politike. According to Karl Marx, “Civil Society embraces the whole material intercourse of individuals within a definite stage of development of productive forces.” Civil Society is an arena where modern man legitimately gratifies his self-interest and develops his individuality, but also learns the value of group action, social solidarity which educates him for citizenship and equips him to participate in the political sphere of the state. It provides “networks of civic engagement” within which reciprocity is learned and enforced, trust is generated. An active and diverse civil society plays a valuable role in advancement of democracy. It seeks to ensure that citizen’s interests are taken seriously. The social work intervention may not be democratically envisaged until it is promulgated by civic engagement through Civil Society. Methodology: This is a descriptive study which consists of secondary source of data collection based on reports, books, periodic journals, web-based articles. There have been utilized three case studies for reaching the findings of study. This article will highlight on role of civil society in providing democratic space and assisting social workers to ensure inclusive growth through conglomeration of state and individuals.

  11. A study on Turkish adolescent's Internet use: possible predictors of Internet addiction.

    Science.gov (United States)

    Ak, Serife; Koruklu, Nermin; Yılmaz, Yusuf

    2013-03-01

    The purpose of this study is to investigate the internet use of Turkish adolescents, with a (particular) focus on the risk of Internet addiction. A web-based questionnaire was completed by a total of 4,311 adolescents attending public high schools in grades 9-12, in a small-sized city in western Turkey. Ages ranged from 15 to 19 years, 54 percent were female and 46 percent male. The questionnaire included items on sociodemographic information, Internet usage, and a Turkish version of the Young's Internet Addiction Test. The data were analyzed in SPPS 15.0 program using the t test, the Mann-Whitney U test, correlation and hierarchic regression analysis. The findings show that, regardless of gender, Facebook ranked highest in the classification of students' purpose of Internet use; it was also found that females mainly used the Internet for communication, whereas males were more interested in playing online games and reading newspapers and magazines. The results of hierarchic regression analysis indicated that the significant predictors of the internet addiction were the presence of Internet access at home, gender, and family income levels.

  12. [Digital democracy and experiences in e-participation: Internet activism and public policy].

    Science.gov (United States)

    Araújo, Rafael de Paula Aguiar; Penteado, Cláudio Luis Camargo; Santos, Marcelo Burgos Pimentel dos

    2015-12-01

    The article explores processes of interaction between the State and organized civil society in an effort to assess the weight of the various social mobilization strategies utilized by different social organizations active in the city of São Paulo. The study is particularly interested in analyzing how the use of information and communications technology (ICT) influences the development of public policy as a means for shaping citizen opinion and establishing demands. A Political Participation and Influence Index was used to evaluate experiences in Internet activism in the city of São Paulo. Findings suggest that the movements and collectivities with the most inventive and broadest diversity of strategies achieve better results, signaling a new method of action in contemporary politics.

  13. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  14. Civil Engineering Technology Needs Assessment.

    Science.gov (United States)

    Oakland Community Coll., Farmington, MI. Office of Institutional Planning and Analysis.

    In 1991, a study was conducted by Oakland Community College (OCC) to evaluate the need for a proposed Civil Engineering Technology program. An initial examination of the literature focused on industry needs and the job market for civil engineering technicians. In order to gather information on local area employers' hiring practices and needs, a…

  15. 28 CFR 522.14 - Inmates serving civil contempt commitments.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Inmates serving civil contempt... ADMISSION, CLASSIFICATION, AND TRANSFER ADMISSION TO INSTITUTION Civil Contempt of Court Commitments § 522.14 Inmates serving civil contempt commitments. We treat inmates serving civil contempt commitments in...

  16. Period of internet usage: An indicator of the buying behaviour of internet users?

    Directory of Open Access Journals (Sweden)

    PJ du Plessis

    2004-07-01

    Full Text Available This article focuses on the experience of the Internet user with regard to purchasing goods and services. A self-administered survey, hosted on a dedicated website, was used as a data collection method and 1005 responses were received. It was found that the period of Internet usage significantly influenced the decision to purchase via the Internet. Another finding was that the period of Internet usage significantly influenced whether those shopping on the Internet searched for, or considered searching for, product and service information online prior to purchasing from non-Internet-based sellers.

  17. Sociedad civil: una concepción radical

    Directory of Open Access Journals (Sweden)

    Domingo García Marzá

    2012-02-01

    Full Text Available El presente trabajo tiene como objetivos presentar un concepto de sociedad civil desde una perspectiva crítica, una perspectiva que pueda dar razón del potencial de cambio y transformación social que encierra este ámbito de la interacción social. Con este fin, se adentra en primer lugar en la difícil relación entre democracia y sociedad civil, analizándola desde el paso de las democracias participativas a las democracias deliberativas. El carácter global de la sociedad civil y los problemas de realización práctica nos conducen, en segundo lugar, a la discusión de la propuesta de autores como J. Habermas y M. Kaldor, destacando las insuficiencias de sus respectivos enfoques. A continuación, y en discusión con los trabajos de J. Keane, se presenta una propuesta de definición y fundamentación del concepto de sociedad civil apoyado en una hermenéutica crítica, capaz de justificar su núcleo moral como ética de la sociedad civil y, al mismo tiempo, de sus posibilidades reales de aplicación. Por último, se propone el concepto de recursos morales para reconstruir las características básicas que definen a los recursos propios de la sociedad civil.The objective of this paper is to present a concept of civil society from a critical perspective that can explain the potential for change and social transformation encompassed within this sphere of social interaction. To this end, we first explore the difficult relationship between democracy and civil society, through an analysis of the shift from participative to deliberative democracy. The global character of civil society and the problems of its practical achievement lead us, in a second stage, to discuss proposals from authors such as J. Habermas and M. Kaldor, and to uncover the inadequacies of their respective approaches. This is followed by a proposal, arising from debate on the works of J. Keane, in which the concept of civil society is defined and grounded

  18. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  19. Civil Society

    Science.gov (United States)

    Social Media Facebook @oasofficial Facebook Twitter @oas_official Twitter Newsletters Documents OAS Technology Social Development Summits of the Americas Sustainable Development T Telecommunications Terrorism Tourism Trade Treaties and Agreements W Women Y Youth Strategic Partners Permanent Observers Civil Society

  20. Development of internet-based cooperative system for integrity evaluation of reactor pressure vessel

    International Nuclear Information System (INIS)

    Kim, Jong Choon; Choi, Jae Boong; Kim, Young Jin; Choi, Young Hwan

    2004-01-01

    Since early 1950s fracture mechanics has brought significant impact on structural integrity assessment in a wide range of industries such as power, transportation, civil and petrochemical industries, especially in nuclear power plant industries. For the last two decades, significant efforts have been devoted in developing defect assessment procedures, from which various fitness-for-purpose or fitness-for-service codes have been developed. From another aspect, recent advances in IT (Information Technologies) bring rapid changes in various engineering fields. IT enables people to share information through network and thus provides concurrent working environment without limitations of working places. For this reason, a network system based on internet or intranet bas been appeared in various fields of business. Evaluating the integrity of structures is one of the most critical issues in nuclear industry. In order to evaluate the integrity of structures, a complicated and collaborative procedure is required including regular in-service inspection, fracture mechanics analysis, etc. And thus, experts in different fields have to cooperate to resolve the integrity problem. In this paper, an internet-based cooperative system for integrity evaluation system which adapts IT into a structural integrity evaluation procedure for reactor pressure vessel is introduced. The proposed system uses Virtual Reality (VR) technique, Virtual Network Computing (VNC) and agent programs. This system is able to support 3-dimensional virtual reality environment and to provide experts to cooperate by accessing related data through internet

  1. DOES CIVIL SOCIETY CREATE SOCIAL ENTREPRENEURS?

    OpenAIRE

    Gauca Oana; Hadad Shahrazad

    2013-01-01

    The purpose of this paper is to analyze whether civil society itself can enhance or stimulate the creation of social entrepreneurs, by studying the traits of the civil society and the various definitions attributed to it. The main question that the paper wants to answer to is and the main approach used in this research paper is the theoretical one. By studying existing articles and books on the topic, the paper tries to emphasize the various dimensions that civil society can embrace, as pictu...

  2. Internet Freedom in Asia: Case of Internet Censorship in China

    Directory of Open Access Journals (Sweden)

    ZAINUDDIN MUDA Z. MONGGILO

    2016-02-01

    Full Text Available Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate information which is traced through the relevant literature study. China is a unique case since the internet censorship regulation contributes to its status as the country with the least internet freedom yet at the same time it is credited as having the most internet users globally. In addition, China known as the communist country that began opening up to globalization and information of technology, but the government’s control over it is still so tight and binding, not only in the press, or the traditional media, but also in new media with the internet censorship. The control over this information may have a clear objective to maintain a climate of information in the community, but on the other hand, such control is tantamount to restricting the right of citizens to make, use, and distribute information, and more fatal as a violation of human rights.

  3. Governing Civil Society Organisations and Constructing the Common Good

    DEFF Research Database (Denmark)

    Hein Jessen, Mathias

    This paper argues that civil society is something that must be produced and constructed in order to come into existence. This construction entails a specific production of what civil society is, which values are (and should be) present in it, what the common good is and how civil society and civil...... with specific (good) values, but is at the same time instrumentalised to provide welfare services the state can and will no longer provide. Civil society, civil society organisations and the common good are not given entities, but constantly produced and mobilised in different political conjunctures....

  4. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  5. Analysis of the Construction of Ecological Civilization in the Western Ethnic Areas

    Institute of Scientific and Technical Information of China (English)

    Wang Yongli

    2017-01-01

    each province; and the characteris ̄tics of ecological protection and resource environ ̄ment in ethnic areas. First of all, we should change the concept of government at all levels and the entire society in western ethnic areas, and improve the system of ecological civilization construction. For this pur ̄pose, we must:( i) strengthen the top-level de ̄sign of the ecological civilization system; ( ii) im ̄prove relevant systems, such as the development of the national land space; and ( iii ) improve envi ̄ronmental protection and ecological compensation in the western ethnic areas and the whole country. Furthermore, through making use of both formal systems, such as political, economic and legal ones, and informal systems, such as ecological culture, we should jointly safeguard and promote the construction of ecological civilization. On the one hand, we must establish and improve various policies related to finance, tax, population and land to improve the level of ecological political civ ̄ilization in the western ethnic areas from the level of central government to local administrations. On the other hand, the central government and local administrations in the western ethnic areas must enhance the awareness of the construction of eco ̄logical civilization through various ways, including school education and the internet. Secondly, we should vigorously develop the advantages of the ecological industry in western ethnic areas, such as ecological tourism, ecologi ̄cal agriculture and other ecological industries. The construction of ecological civilization should strive to find a balance between ecological environment and stable economic growth. Therefore, according to the characteristics of their ecological environ ̄ment, resources, climate and the capacity of the ecological carrying capacity, we should choose ec ̄ological industries suitable for regional develop ̄ment, such as ecological agriculture, ecological tourism;change the original model of

  6. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  7. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  8. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  9. American Society of Civil Engineers | ASCE

    Science.gov (United States)

    Membership Your New Membership: Getting Started Member Value Civil Engineering Salaries Manage Your Account Vote Now Education & Careers Training & Courses Getting Licensed & Certified Live Exam Reviews Specialty Certifications Civil Engineering Body of Knowledge Volunteer Opportunities Jobs Ethics

  10. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  11. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  12. Romania's Experiences with Defense Reform Since the December 1989 Revolution and the Dimensions of Civil-Military Relations Viewed as a Trinity

    National Research Council Canada - National Science Library

    Stan, Ramona

    2007-01-01

    ...) since the collapse of communism in December 1989. The purpose of the thesis is to identify relevant qualitative and quantitative indicators for measuring the progress of Romanian political and military authorities in implementing defense reform initiatives...

  13. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  14. A la izquierda de internet : las redes ciudadanas y las nuevas formas de organización civil

    OpenAIRE

    Llistar, David

    2001-01-01

    Dentro de las posibilidades de las nuevas tecnologías de la comunicación, Internet adquiere un papel protagonista por las posibilidades que ofrece. A partir de algunas experiencias, como las que se presentan en este artículo, hoy es posible considerar este medio de comunicación global e interactivo como uno de los recursos de comunicación con mayor potencial para la formación y fortalecimiento de la cultura democrática, la educación para el desarrollo y la movilización ciudadana.

  15. Internet Self-Efficacy Preferences of Internet Based Environments and Achievement of Prospective Teachers

    Science.gov (United States)

    Ozyalcin Oskay, Ozge

    2011-01-01

    The aims of this study are to determine prospective chemistry teachers' internet self-efficacy and preferences of constructivist internet-assisted environments and to examine the relationship between their internet self-efficacy and their preferences for constructivist internet-assisted environments, the relationship between their achievement in…

  16. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  17. 75 FR 1076 - Outer Continental Shelf Civil Penalties

    Science.gov (United States)

    2010-01-08

    ... initiate civil penalty proceedings; however, violations that cause injury, death, or environmental damage... DEPARTMENT OF THE INTERIOR Minerals Management Service Outer Continental Shelf Civil Penalties... daily civil penalty assessment. SUMMARY: The Outer Continental Shelf Lands Act requires the MMS to...

  18. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  19. Engagement citoyen et société civile

    Directory of Open Access Journals (Sweden)

    Gautier Pirotte

    2009-11-01

    Full Text Available Cet article cherche à rapprocher par la réflexion la notion de société civile de celle de l’engagement citoyen à partir de l’expérience postcommuniste roumaine. Si le domaine de la société civile ne concentre pas tous les phénomènes d’engagement citoyen, il demeure néanmoins un espace privilégié d’expression de cet engagement. La question qui anime ce texte est assez simple : comment envisager l’étude de l’engagement du citoyen à l’intérieur des nouvelles sociétés civiles d’Europe Centrale et Orientale, et plus spécifiquement au sein de la nouvelle société civile roumaine ? Cette interrogation, si simple soit-elle, se révèle bien vite plus complexe si l’on tient compte des problèmes que soulèvent à la fois les concepts de société civile et d’engagement mobilisés ici mais aussi l’expérience postcommuniste souvent abordée de manière homogène alors qu’elle se révèle empiriquement très hétéroclite.Citizen commitment and civil society. A reflexion based upon the Romanian project of post-communist civil societyUsing the post-communist experience in Romania, this article reflects upon the way to bring together the concepts of civil society and citizen commitment. Whilst civil society does not concentrate all the phenomena of citizenship, the concept remains nonetheless a privileged expression of citizen commitment. The question underlying this text is relatively simple: how should the study of citizen commitment be approached within the new civil societies of Central and Eastern Europe, and more specifically within the new Romanian civil society ? As simple as it may appear, the question becomes rapidly more complex as soon as the problems deriding from the concepts of civil society and citizen commitment themselves are taken into consideration but also because the post-communist experience is often treated in a homogeneous way whilst it is in fact empirically very heterogeneous

  20. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  1. Conviviality of internet social networks: An exploratory study of internet campaigns in Iran

    OpenAIRE

    Ameripour, Aghil; Nicholson, Brian; Newman, Michael

    2010-01-01

    In this study, we focus on the relationship between Internet social networks and societal change by examining case studies of the impact of Internet-based campaigns in Iran. Ivan Illich's theory of Conviviality of Tools enables an analysis of the conviviality of the Internet. Subsequently, this conceptual lens is used to examine empirical data from two Internet-based campaigns. The paper contributes theoretical and practical implications regarding conviviality of Internet social networks and ...

  2. 32 CFR 516.4 - Responsibilities.

    Science.gov (United States)

    2010-07-01

    ... with regard to settlement of a case. (c) Assistant Judge Advocate General For Civil Law and Litigation... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC... criminal or civil matters in Federal court under the following circumstances: (1) Felony and misdemeanor...

  3. Social media and mobile communications adoption patterns of South African civil society organisations

    Directory of Open Access Journals (Sweden)

    Kiru Pillay

    2014-08-01

    Objectives: This study focuses on how South African civil society organisations (CSOs deploy Web 2.0 services and technologies for social advocacy and the context of this technology use. Whilst the literature points to many studies relating to the use of the Internet for advocacy, it also suggests that the role and impact of emerging technologies have not been studied in any detail in CSOs. Such studies have the potential to provide new perspectives to current theoretical frameworks and also to add to the discourse around the use of emerging technologies for advocacy. Method: A survey of South African CSOs explored the level of knowledge of social media services and revealed which services in particular were being adopted. Results: The key findings that emerged were that the sector has a low level of knowledge of social media services and an accompanying low level of adoption. These are partly explained by factors such as macro-economic policies and low levels of Internet penetration and ICT readiness. Conclusion: Further research to determine why certain social media services have been embraced more willingly than others and an analysis of the patterns of adoption to determine any underlying significance or relationships is necessary. An analysis of how CSOs build their advocacy capabilities by appropriating social media and how they thus provide alternate discourses and agendas would be instructive.

  4. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  5. Obrigações empresariais no Novo Código Civil Corporate law and the New Brazilian Civil Code

    Directory of Open Access Journals (Sweden)

    Ligia Paula Pires Pinto Sica

    2008-06-01

    Full Text Available Tendo em vista a promulgação do novo código civil brasileiro, que reúne dispositivos que revogam o antigo código civil de 1916 e a maioria dos capítulos do código comercial de 1850, unificando-os, é importante que se frise que remanesce a diferenciação entre as matérias de direito civil e comercial, de acordo com suas lógicas peculiares. Sendo assim e tendo o novo código introduzido diversas normas de caráter geral, este trabalho pretende discutir o papel do juiz e da jurisprudência na aplicação dessas normas de maneira casuística, dando-lhes tratamentos distintos de acordo com os fatos apresentados em juízo, de forma a manter a autonomia das áreas do direito mencionadas e garantir aos agentes econômicos o grau de segurança e previsibilidade necessário às suas atuações no mercado.In regard of the enactment of the New Brazilian Civil Code, that unifies the issues treated in the old civil code from 1916 and on the majority of the chapters of the commercial code from 1850, it's important to insist that the differences between the civil and commercial law remains, according to their peculiar logics. Asitis, and as the new code brought several rules of general character, this paper intends to discuss the role of the judge and jurisprudence in the civil law system, by interpretating those rules in a casuistic manner, giving them different treatments, according to the presented facts during litigation, in a way to maintain the autonomy of the law areas mentioned above and guarantee to the economic agents the level of certainty and previsibility, needed to exercise their activities in the market.

  6. World tour through the internet

    International Nuclear Information System (INIS)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-01

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  7. World tour through the internet

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-15

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  8. Addictive Potential of Internet Applications and Differential Correlates of Problematic Use in Internet Gamers versus Generalized Internet Users in a Representative Sample of Adolescents.

    Science.gov (United States)

    Rosenkranz, Tabea; Müller, Kai W; Dreier, Michael; Beutel, Manfred E; Wölfling, Klaus

    2017-01-01

    This paper examines the addictive potential of 8 different Internet applications, distinguishing male and female users. Moreover, differential correlates of problematic use are investigated in Internet gamers (IG) and generalized Internet users (GIU). In a representative sample of 5,667 adolescents aged 12-19 years, use of Internet applications, problematic Internet use, psychopathologic symptoms (emotional problems, hyperactivity/inattention, and psychosomatic complaints), personality (conscientiousness and extraversion), psychosocial correlates (perceived stress and self-efficacy), and coping strategies were assessed. The addictive potential of Internet applications was examined in boys and girls using regression analysis. MANOVAs were conducted to examine differential correlates of problematic Internet use between IG and GIU. Chatting and social networking most strongly predicted problematic Internet use in girls, while gaming was the strongest predictor in boys. Problematic IG exhibited multiple psychosocial problems compared to non-problematic IG. In problematic Internet users, GIU reported even higher psychosocial burden and displayed dysfunctional coping strategies more frequently than gamers. The results extend previous findings on the addictive potential of Internet applications and validate the proposed distinction between specific and generalized problematic Internet use. In addition to Internet gaming disorder, future studies should also focus on other highly addictive Internet applications, that is, chatting or social networking, regarding differential correlates of problematic use. © 2017 S. Karger AG, Basel.

  9. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  10. Gender differences in Internet identification and Internet anxiety ...

    African Journals Online (AJOL)

    This exploratory study investigated gender differences in Internet identification and Internet anxiety. A sample of 231 students (138 females and 93 males) from four different schools participated in the study. A structured interview schedule was used to collect data. Factor analysis was carried out to test for construct validity.

  11. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  12. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  13. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  14. 76 FR 74625 - Civil Monetary Penalties Inflation Adjustment

    Science.gov (United States)

    2011-12-01

    ...-2011] RIN 1125-AA69 Civil Monetary Penalties Inflation Adjustment AGENCIES: U.S. Customs and Border... adjust for inflation certain civil monetary penalties assessed under the Immigration and Nationality Act... assessed under the INA. The Federal Civil Penalties Inflation Adjustment Act of 1990 (Adjustment Act...

  15. Islamic Revolution: a Civilization-building Revolution; Iranian University:

    Directory of Open Access Journals (Sweden)

    Mohammad Baqer Khorramshad

    2009-08-01

    Full Text Available Islamic Revolution and the consequent Islamic state in Iran have revived Iranian-Islamic civilization’s discourse in a modern form which is rooted in both Iranian and Islamic ancient civilizations. Post-revolutionary Iran, as an obviously determinant country in this civilizational field, which has developed the civilization in the modern era, necessarily has to think and act civilizationally in order to resist western Humanist and Materialist affects. Academy is the place within which knowledge, as clearly one of the most important foundations of civilization-building, is produced. Civilization-building is the horizon toward which Iranian Universities should orient themselves. Academy is the canon of science, knowledge, and culture, and therefore plays an affective role in the formation, development and flourishing of a civilization; and it could be said that University is the foundation on which civilization is built. In other words, University in the modern era is not only the site of education and research, but also as an epistemological basis, participates in the process of culture and civilization-building; the matter which this study attempts to elaborate. Thus, we attempt to explain and define the necessary tools and indicators in the process.

  16. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  17. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  18. 29 CFR 530.302 - Amounts of civil money penalties.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Amounts of civil money penalties. 530.302 Section 530.302... EMPLOYMENT OF HOMEWORKERS IN CERTAIN INDUSTRIES Civil Money Penalties § 530.302 Amounts of civil money penalties. (a) A civil money penalty, not to exceed $500 per affected homeworker for any one violation, may...

  19. Global civil society: between nation states and transnational corporations

    Directory of Open Access Journals (Sweden)

    S. A. Kvitka

    2017-06-01

    Full Text Available Global civil society is the subject of the formation of a new world order and the modern humanitarian outlook, which is based on the primacy of justice and human rights. One of the actors head of global civil society is an international non-governmental organizations. But wrong to equate global civil society with the activities of these organizations only. Mostly they influence governments and their humanitarian and international politics. Meanwhile, the role of global civil and its society various institutions is much greater and significant. The article discusses the various aspects of the civil society from the position that it took place between transnational companies (TNCs and nation-states. The role of the latter is gradually reduced - economic regulation take on multinationals and public administration is a field of activity of various institutions and structures that scientists considered it as a manifestation of global civil society. In Ukraine, which is also involved in the process of globalization, global civil society is one of the main factors of its national civil society.

  20. Civil forensic psychiatry - Part 1: an overview.

    Science.gov (United States)

    Samuels, Anthony H

    2018-02-01

    Objectives This paper provides an overview for general and forensic psychiatrists of the complexity and challenge of working in the civil medico-legal arena. It covers expert evidence, ethics, core concepts in civil forensic psychiatry and report writing. Conclusions Civil forensic psychiatry is an important sub-speciality component of forensic psychiatry that requires specific skills, knowledge and the ability to assist legal bodies in determining the significance of psychiatric issues.

  1. 44 CFR 312.5 - Personnel.

    Science.gov (United States)

    2010-10-01

    ... of specific programs, through payment of salaries and benefits of State and local civil defense staff... from attack-related civil defense preparedness: (a) In developing, maintaining, testing and exercising...

  2. Opportunities in Civil Engineering. [VGM Career Horizons Series].

    Science.gov (United States)

    Hagerty, D. Joseph; Heer, John E., Jr.

    This book presents information on career opportunities in civil engineering. Chapter 1 focuses on the scope of civil engineering, discussing: role of scientist, engineer, and technologists; engineering and engineering technology; civil engineer's role and obligations; and other information. Chapter 2 considers such aspects of the education for…

  3. Civil Procedure in Cross-cultural Dialogue: Eurasia Context

    Directory of Open Access Journals (Sweden)

    Stefaan Voet

    2014-01-01

    Full Text Available Reviewed book: Civil Procedure in Cross-cultural Dialogue: Eurasia Context: IAPL World Conference on Civil Procedure, September 18–21, 2012, Moscow, Russia (Dmitry Maleshin, ed. (Statut 2012, available at (accessed March 9, 2014 [hereinafter Civil Procedure in Cross-cultural Dialogue: Eurasia Context].

  4. La ética en internet

    OpenAIRE

    Issa Luna Pla

    2015-01-01

    En América Latina el INTERNET es un medio con muchas limitaciones. Solo el 10 ó 15 por ciento de la población total, residente en Argentina, México y Brasil tiene acceso. Trata sobre el Comercio en Internet, la regulación y la ética, las nuevas formas de aplicar reglas, el Internet como espacio público, las comunidades de Internet, los parámetros de ética y responsabilidad social en Internet, los menores y la libertad de expresión, los contenidos informativos en Internet, el Internet corporat...

  5. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  6. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  7. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  8. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  9. 25 CFR 11.500 - Law applicable to civil actions.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Law applicable to civil actions. 11.500 Section 11.500 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Civil Actions § 11.500 Law applicable to civil actions. (a) In all civil cases, the...

  10. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  11. La ética en internet

    Directory of Open Access Journals (Sweden)

    Issa Luna Pla

    2015-01-01

    Full Text Available En América Latina el INTERNET es un medio con muchas limitaciones. Solo el 10 ó 15 por ciento de la población total, residente en Argentina, México y Brasil tiene acceso. Trata sobre el Comercio en Internet, la regulación y la ética, las nuevas formas de aplicar reglas, el Internet como espacio público, las comunidades de Internet, los parámetros de ética y responsabilidad social en Internet, los menores y la libertad de expresión, los contenidos informativos en Internet, el Internet corporativo, Autorregulación en Internet, tecnología para rastrear contenidos y la situación de América Latina.

  12. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  13. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  14. 33 CFR 401.205 - Civil and criminal penalties.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Civil and criminal penalties. 401... § 401.205 Civil and criminal penalties. (a) If the violation of the Seaway Regulations carries a... criminal proceedings shall not bar the initiation of civil penalty proceedings by the Associate...

  15. 46 CFR 221.93 - Collection of civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Collection of civil penalties. 221.93 Section 221.93... RELATED ACTIVITIES REGULATED TRANSACTIONS INVOLVING DOCUMENTED VESSELS AND OTHER MARITIME INTERESTS Civil Penalties § 221.93 Collection of civil penalties. Within 30 days after receipt of the Hearing Officer's...

  16. The Impact of Civil Society Organizations on Sustainable ...

    African Journals Online (AJOL)

    Civil society groups are agents of development in any nation. Civil society organizations appear to play important role in social, political and economic development activities. The transformation of any society or system, particularly the developing societies like Nigeria depend on the effectiveness and efficiency of its civil ...

  17. 78 FR 5722 - Civil Monetary Penalty Inflation Adjustment

    Science.gov (United States)

    2013-01-28

    ... Civil Monetary Penalty Inflation Adjustment AGENCY: U.S. Army Corps of Engineers, DoD. ACTION: Direct... for inflation. The adjustment of civil penalties to account for inflation is required by the Federal Civil Penalties Inflation Adjustment Act of 1990, as amended. Since we have not made any adjustments to...

  18. 78 FR 5760 - Civil Monetary Penalty Inflation Adjustment

    Science.gov (United States)

    2013-01-28

    ... Civil Monetary Penalty Inflation Adjustment AGENCY: U.S. Army Corps of Engineers, DoD. ACTION: Proposed... account for inflation. The adjustment of civil penalties to account for inflation is required by the Federal Civil Penalties Inflation Adjustment Act of 1990, as amended. Since we have not made any...

  19. Learning for Life: The People’s Free University and the Civil Commons

    Directory of Open Access Journals (Sweden)

    Howard Woodhouse

    2011-07-01

    Full Text Available Normal 0 false false false EN-CA X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} This article stems from the author’s experience as one of the organizers of an alternative form of higher education, which drew its inspiration from the civil commons.  In the early years of the new millennium, the People’s Free University of Saskatchewan (PFU offered a wide variety of courses to members of the public without charge, adopting as its founding principle the belief that “Everyone can learn, Everyone can teach.”  As a form of community-based education, the PFU accommodated the needs and aspirations of a diversity of individuals and groups too often denied by “research-intensive” universities.  The civil commons itself is a web of interlocking institutions based on the life-code of value, which strengthens the public interest and enhances the growth of organic life.  Unlike the money-code of value, whose goods are only available to those who can pay, the goods of the civil commons are accessible to all.  This inner logic enables a full realization of life value as exemplified in the living tradition of popular university education.

  20. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  1. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  2. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  3. Civil Society, Health, and Social Exclusion in Bangladesh

    Science.gov (United States)

    Mahmud, Simeen

    2009-01-01

    Civil society has the potential to have a positive impact on social exclusion and health equity through active monitoring and increased accountability. This paper examines the role of civil society in Bangladesh to understand why this potential has not been realized. Looking at two models of civil society action—participation in decentralized public-sector service provision and academic think-tank data analysis—this analysis examines the barriers to positive civil society input into public policy decision-making. The role of non-governmental organizations, political, cultural and economic factors, and the influence of foreign bilateral and multilateral donors are considered. The paper concludes that, with a few exceptions, civil society in Bangladesh replicates the structural inequalities of society at large. PMID:19761087

  4. Internet Freedom in Asia: Case of Internet Censorship in China

    OpenAIRE

    MONGGILO, ZAINUDDIN MUDA

    2016-01-01

    Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience) as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate informati...

  5. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  6. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  7. Global Standards of Market Civilization

    DEFF Research Database (Denmark)

    Global Standards of Market Civilization brings together leading scholars, representing a range of political views, to investigate how global 'standards of market civilization' have emerged, their justification, and their political, economic and social impact. Key chapters show how as the modern...... thought, as well as its historical application part II presents original case studies that demonstrate the emergence of such standards and explore the diffusion of liberal capitalist ideas through the global political economy and the consequences for development and governance; the International Monetary...... Fund's capacity to formulate a global standard of civilization in its reform programs; and problems in the development of the global trade, including the issue of intellectual property rights. This book will be of strong interest to students and scholars in wide range of fields relating to the study...

  8. Artificial Intelligence in Civil Engineering

    Directory of Open Access Journals (Sweden)

    Pengzhen Lu

    2012-01-01

    Full Text Available Artificial intelligence is a branch of computer science, involved in the research, design, and application of intelligent computer. Traditional methods for modeling and optimizing complex structure systems require huge amounts of computing resources, and artificial-intelligence-based solutions can often provide valuable alternatives for efficiently solving problems in the civil engineering. This paper summarizes recently developed methods and theories in the developing direction for applications of artificial intelligence in civil engineering, including evolutionary computation, neural networks, fuzzy systems, expert system, reasoning, classification, and learning, as well as others like chaos theory, cuckoo search, firefly algorithm, knowledge-based engineering, and simulated annealing. The main research trends are also pointed out in the end. The paper provides an overview of the advances of artificial intelligence applied in civil engineering.

  9. Internet addiction, problematic internet use, nonproblematic internet use among Chinese adolescents: Individual, parental, peer, and sociodemographic correlates.

    Science.gov (United States)

    Zhou, Nan; Cao, Hongjian; Li, Xiaomin; Zhang, Jintao; Yao, Yuanwei; Geng, Xiaomin; Lin, Xiuyun; Hou, Shumeng; Liu, Fenge; Chen, Xiaoli; Fang, Xiaoyi

    2018-05-01

    Internet addiction has been typically conceptualized as either a continuous construct or a dichotomous construct. Limited research has differentiated adolescents with problematic Internet use (PIU) from the Internet addiction group (IA) and/or nonproblematic Internet use group (NPIU) and examined the potential correlates. To fill this gap, based on data obtained from 956 Chinese adolescents (11-19 years, 47% male), this study examined if adolescents with PIU is a distinctive group from the IA and NPIU. This study also examined factors from different ecological levels that may differentiate among the three groups, including individual, parental, peer, and sociodemographic factors. Results indicated that IA, PIU, and NPIU differed significantly on scores of Young's Diagnostic Questionnaire (YDQ). Critical factors emerging from different ecological levels could differentiate between PIU and NPIU and between IA and NPIU. Such findings suggest that PIU may represent a distinct, intermediate group of Internet users. The potential theoretical and practical implications of identifying PIU were also discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  10. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  11. 10 CFR 824.15 - Collection of civil penalties.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Collection of civil penalties. 824.15 Section 824.15 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.15 Collection of civil penalties. If any person fails to pay an...

  12. 22 CFR 1104.14 - Assessment of civil penalties.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Assessment of civil penalties. 1104.14 Section... STATES SECTION PROTECTION OF ARCHAEOLOGICAL RESOURCES § 1104.14 Assessment of civil penalties. (a) The Commissioner may assess a civil penalty against any person who has violated any prohibition contained in § 1104...

  13. 12 CFR 263.65 - Civil penalty inflation adjustments.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Civil penalty inflation adjustments. 263.65... Money Penalties § 263.65 Civil penalty inflation adjustments. (a) Inflation adjustments. In accordance with the Federal Civil Penalties Inflation Adjustment Act of 1990 (28 U.S.C. 2461 note), the Board has...

  14. 42 CFR 493.1846 - Civil action.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Civil action. 493.1846 Section 493.1846 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) STANDARDS AND CERTIFICATION LABORATORY REQUIREMENTS Enforcement Procedures § 493.1846 Civil action. If CMS...

  15. 7 CFR 1735.15 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Civil rights. 1735.15 Section 1735.15 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE... Policies § 1735.15 Civil rights. Borrowers are required to comply with certain regulations on...

  16. Journal of Civil Engineering, JKUAT: Submissions

    African Journals Online (AJOL)

    Author Guidelines. AIMS AND SCOPE The Journal of Civil Engineering, JKUAT aims to publish original research papers of high standard, containing material of broad interest and of significant contribution to civil engineering, with emphasis being placed on material that is applicable to the solution of practical problems.

  17. Educating Civil Engineers for Developing Countries

    Science.gov (United States)

    Stanley, D.

    1974-01-01

    Based on engineering teaching experience in Africa and Asia, ideas are presented on educating civil engineers for developing countries, especially those in Africa. Some of the problems facing educational planners, teachers, and students are addressed, including responsibilities of a newly graduated civil engineer, curriculum development, and…

  18. Risk Factors of Internet Addiction among Internet Users: An Online Questionnaire Survey.

    Directory of Open Access Journals (Sweden)

    Chia-Yi Wu

    Full Text Available Internet addiction (IA has become a major public health issue worldwide and is closely linked to psychiatric disorders and suicide. The present study aimed to investigate the prevalence of IA and its associated psychosocial and psychopathological determinants among internet users across different age groups.The study was a cross-sectional survey initiated by the Taiwan Suicide Prevention Center. The participants were recruited from the general public who responded to the online questionnaire. They completed a series of self-reported measures, including Chen Internet Addiction Scale-revised (CIAS-R, Five-item Brief Symptom Rating Scale (BSRS-5, Maudsley Personality Inventory (MPI, and questions about suicide and internet use habits.We enrolled 1100 respondents with a preponderance of female subjects (85.8%. Based on an optimal cutoff for CIAS-R (67/68, the prevalence rate of IA was 10.6%. People with higher scores of CIAS-R were characterized as: male, single, students, high neuroticism, life impairment due to internet use, time for internet use, online gaming, presence of psychiatric morbidity, recent suicide ideation and past suicide attempts. Multiple regression on IA showed that age, gender, neuroticism, life impairment, internet use time, and BSRS-5 score accounted for 31% of variance for CIAS-R score. Further, logistic regression showed that neuroticism, life impairment and internet use time were three main predictors for IA. Compared to those without IA, the internet addicts had higher rates of psychiatric morbidity (65.0%, suicide ideation in a week (47.0%, lifetime suicide attempts (23.1%, and suicide attempt in a year (5.1%.Neurotic personality traits, psychopathology, time for internet use and its subsequent life impairment were important predictors for IA. Individuals with IA may have higher rates of psychiatric morbidity and suicide risks. The findings provide important information for further investigation and prevention of IA.

  19. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  20. Civil & Criminal Penalties

    Data.gov (United States)

    US Consumer Product Safety Commission — When CPSC is involved in a civil or criminal investigations into violations of the Consumer Products Safety Act the Commission publishes final determinations and...

  1. Civil Surgeon Info

    Data.gov (United States)

    Department of Homeland Security — USCIS designates certain doctors (also known as civil surgeons) to perform the medical exam required for most Green Card applicants. This data set represents the...

  2. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  3. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  4. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  5. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  6. THE LAWYER`S OPINION IN MODERN CIVIL LAW

    Directory of Open Access Journals (Sweden)

    Elena Evgenyevna Dubovaya

    2015-12-01

    Full Text Available Purpose to define value of freedom and fight of opinions, views and lawyer’s positions in development of science of civil law.Methodology theoretical analysis, inductive and deductive methods.Results It is established that fight of opinions, collision of various positions allows to understand more deeply the discussed problem, to come nearer to truth. So, free expression of opinions is the engine of development of civil law.Practical implications introduction in educational process on disciplines of civil jurisprudence, further research of fight of opinions in civil law.Tendencies of the present stage of development of legal system are characterized by aspiration to fix in the Russian legal system of the beginning of private law, where at the head of a corner – people as a legal entity. Opinions of lawyers on various legal problems, and the attitudes towards these opinions are subject to considerable dynamics. The centuries-old history of development of the right showed that fight of opinions, collision of various positions allows to understand more deeply the discussed problem, to come nearer to truth. The modern civil law widely uses a method of comparative jurisprudence, studying experience of the civilized countries which promoted in development of the civil legislation.

  7. Journal of Civil Engineering, JKUAT: Journal Sponsorship

    African Journals Online (AJOL)

    Journal of Civil Engineering, JKUAT: Journal Sponsorship. Journal Home > About the Journal > Journal of Civil Engineering, JKUAT: Journal Sponsorship. Log in or Register to get access to full text downloads.

  8. 42 CFR 38.8 - Criminal and civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Criminal and civil penalties. 38.8 Section 38.8... EXAMINATIONS DISASTER ASSISTANCE FOR CRISIS COUNSELING AND TRAINING § 38.8 Criminal and civil penalties... a civil penalty of not more than $5,000 for each violation. (c) Whoever knowingly misapplies the...

  9. 29 CFR 500.143 - Civil money penalty assessment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Civil money penalty assessment. 500.143 Section 500.143... MIGRANT AND SEASONAL AGRICULTURAL WORKER PROTECTION Enforcement § 500.143 Civil money penalty assessment. (a) A civil money penalty may be assessed for each violation of the Act or these regulations. (b) In...

  10. 30 CFR 208.14 - Civil and criminal penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Civil and criminal penalties. 208.14 Section... MANAGEMENT SALE OF FEDERAL ROYALTY OIL General Provisions § 208.14 Civil and criminal penalties. Failure to abide by the regulations in this part may result in civil and criminal penalties being levied on that...

  11. Social Studies. Dawn: The Birth of Selected Civilizations.

    Science.gov (United States)

    Cold, Ron

    The Quinmester world studies course for grades 7 through 9 investigates concepts of prehistory, culture, and civilization, offering an in depth understanding of the reasons why and how civilizations rise and fall. Emphasis is on comparing past and present civilizations. One major purpose of the course is for students to comprehend that…

  12. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  13. Civil liability on nuclear activities

    International Nuclear Information System (INIS)

    Bittar, C.A.

    1982-01-01

    The civil liability theory in the actual context is shown in the first and second part of this thesis, including some considerations about concepts and types of liability in dangerous and not dangerous activities. In the third part, the legal aspects of civil liability for the nuclear activities are analyzed, with a brief description of the history evolution, standard systems, inspection corporation and juridical regulation. (C.G.C.). 239 refs

  14. The Internet Engineering Task Force and The Future of Internet

    OpenAIRE

    Baccelli , Emmanuel; Clausen , Thomas Heide; Jacquet , Philippe

    2009-01-01

    International audience; If one wants to identify where ideas and initiatives regarding the Internet are being confronted, the Internet Engineering Task Force (IETF) is unavoidable. Created in 1986 by US government agencies (DoD, Department of Energy, NASA, NSF) to supervise the design and deployment of Internet protocols, it was initially open only for US government funded researchers. Early 1987 saw a dozen of industry representatives invited, and in a matter of months, the IETF was opened t...

  15. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  16. 7 CFR 1738.17 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Civil rights. 1738.17 Section 1738.17 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Loan Purposes and Basic Policies § 1738.17 Civil rights...

  17. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  18. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  19. PERLINDUNGAN HUKUM BAGI KONSUMEN BERKAITAN DENGAN PENCANTUMAN DISCLAIMER OLEH PELAKU USAHA DALAM SITUS INTERNET (WEBSITE

    Directory of Open Access Journals (Sweden)

    Ni Putu Ria Dewi Marheni

    2014-04-01

    Full Text Available This Research is entitled “Legal Protection for Consumers Related to the Inclusion of Disclaimer by Business Owner in Website”. The problems of the present study are: first, how the inclusion of disclaimer in websites in Indonesia is like; second, what the legal protection for consumers related to the inclusion of disclaimer by business owner in websites is like. The method used in the present study is the normative legal research. The results of the study showed: first, no norm regulating disclaimer in the Act Number 11 of 2008 concerning the electronic information and transaction which specifically regulate activities in the cyberspace. However, if generally viewed from the protection for consumers in the Act Number 8 of 1999 concerning Protection for Consumers, most inclusions of disclaimer in the website is classified as exoneration clausal which is partially prepared by business agents to avoid what they are supposed to be responsible for. Second, the form of legal protection needed by consumers in the internet is still weak. However, the general legal protection for consumers may be provided through: a Being preventive:  Reliability Certification Board ‘Lembaga Sertifikasi Keandalan’(LSK which is supposed to give certification for every internet site already regulated by the Regulation of the Republic of Indonesia Number 82 of 2012 concerning the Implementation of Electronic System and Transaction  which is a derivative of Article 10 clause (2 of the Act Number 11 of 2008 concerning Electronic Information and Transaction; b being repressive: through Litigation Lane which may be done by submitting a civil suit and civil sanction based on the Act Number 11 of 2008 concerning Electronic Information and Transaction. Another alternative is through the Non Litigation lane, that is, the Arbitrate Lane, which is settled using the Alternative of Dispute Settlement

  20. Crisis or Fluidity? Florian Znaniecki’s Theory of Civilization

    Directory of Open Access Journals (Sweden)

    Elżbieta Hałas

    2017-01-01

    Full Text Available The preoccupation with the processes of globalization, which has become a key concept in the analysis of the sociocultural condition of postmodernity, has led to a decreased interest in the theory of civilization. The ideological burden of the concept of civilization and its stigmatization by critics of post-Enlightenment modernity also contribute to this current state. However, issues associated with the processes of civilization have once again come to the fore, as shown by the reconstruction of threads associated with civilization in social theory, including sociological works. The views on civilization presented by Weber, Durkheim and Mauss, by their successors Sorokin, Elias and Nelson, down to the contemporary publications of Huntington and Eisenstadt are widely known, whereas works published on this subject in Polish by Florian Znaniecki are not. On a backdrop of the genesis of civilization-associated discourse and its antinomy as regards religion, the article presents Znaniecki’s concept of civilization processes as the social integration of culture, developed on the basis of his theory of cultural and social systems. Two types of human participation in culture are significant here: cultural communities and social groups which create a cultural bond. The de-civilizing processes which Znaniecki described are shown. The article analyzes Znaniecki’s idea of a fluid civilization and the conditions which are necessary for its existence, in the shape of reflexive cultural knowledge as the answer to a cultural crisis. The new type of cultural crisis stems from cultural innovations. The article shows the differences between Znaniecki’s concept of fluidity and Bauman’s liquid modernity. It presents the concept of “civilization of the future” as a pan-human civilization, which requires the formation of a new type of cultural community – the world culture society.