WorldWideScience

Sample records for justice secured implementing

  1. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  2. The first year of implementation of the Child Justice Act

    African Journals Online (AJOL)

    The Child Justice Act 75 of 2008 mandates the Minister of Justice and Constitutional Development to report annually on the implementation of the Child Justice Act to the Parliamentary Portfolio Committee on Justice and Constitutional Development. On 1 April 2011 a year had passed since the implementation of the Child ...

  3. Enhancing implementation security of QKD

    Science.gov (United States)

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  4. Crime, In/Security and Mob Justice

    DEFF Research Database (Denmark)

    Orock, Rogers Tabe Egbe

    2014-01-01

    from violent crime. The widespread sense of anxiety over various forms of violent crime and state failure to guarantee protection for citizens generates a quest for alternative practices of safety-making that, in turn, evoke serious concerns over state power and sovereignty in Africa. Focusing on mob...... justice in Cameroon, this article argues that the political contextualisation of sovereignty must pay attention not only to the sovereign’s right to kill and let live, but also its responsibility to guarantee safety for those citizens it chooses to let live. The paper demonstrates that in Cameroon mob...

  5. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  6. Implementing Security Sector Reform

    Science.gov (United States)

    2008-12-04

    ownership and genuine reform. His experience in Diyala Province indicated that the most effective means of pursuing transition and transformation among...that I have no solution to the security situation in Afghanistan, or to the questions of violence, crime, insurrection, or militias vs . army vs ...than to merge those interests into a greater whole. Franchising of problems or solutions is often the result. In Afghanistan, problems and

  7. DATA WAREHOUSES SECURITY IMPLEMENTATION

    Directory of Open Access Journals (Sweden)

    Burtescu Emil

    2009-05-01

    Full Text Available Data warehouses were initially implemented and developed by the big firms and they were used for working out the managerial problems and for making decisions. Later on, because of the economic tendencies and of the technological progress, the data warehou

  8. Continent at a Crossroads: Prosperity, Justice, and Security in South America

    National Research Council Canada - National Science Library

    Scott, Frances K

    2006-01-01

    This Special Bibliography Series, Number 107, "Continent at the Crossroads: Prosperity, Justice, and Security in South America," was developed by Social Sciences Bibliographer and Reference Librarian Frances K...

  9. The uniqueness of the energy security, justice, and governance problem

    International Nuclear Information System (INIS)

    Goldthau, Andreas; Sovacool, Benjamin K.

    2012-01-01

    This article argues that among all policy fields exhibiting externalities of a global scale, energy stands out on four dimensions: vertical complexity, horizontal complexity, higher entailed costs, and stronger path dependency. These structural attributes are at odds with contemporary key challenges of energy security, energy justice, and low carbon energy transition. With regard to the latter, energy governance challenges occur related to unclear levels of authority and weak resilience. This has implications for energy scholarship, specifically relating to the political economy of energy transitions, discussions about common pool resources, systems analysis, and other neighboring disciplines. - Highlights: ► Among all policy fields exhibiting global externalities, energy stands out. ► It is characterized by greater complexity, higher costs, and stronger path dependency. ► This is at odds with key challenges relating to security, justice, and transition. ► Problems are particularly related to unclear levels of authority and weak resilience. ► Energy scholarship needs to focus further on these issues.

  10. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    When the United Nations Security Council first met in January 1946, it was unable to reach agreement on rules of procedure to govern its operation. Instead, “provisional” rules were adopted in anticipation of further negotiation at a later date. The same provisional rules govern the Council’s work...... today, but provide only the skeletal framework of its contemporary practice. From the early 1990s, the Council increasingly implemented informal working methods to expedite its decision-making. This paper will critically examine the tension between the procedural practice of the Security Council...... to act ‘in conformity with the principles of justice and international law’ as stipulated in the very first provision of the United Nations Charter. Scholarship to date has largely ignored the procedural context of Security Council decisions, notwithstanding it provides the very structure within which...

  11. International and Local Visions of the Justice and Security Sector in the West Bank

    Directory of Open Access Journals (Sweden)

    Ida Nafstad

    2018-03-01

    Full Text Available Considerable efforts by leading experts and funds from around the world are put into restructuring the West Bank justice and security sector (JSS. This is an effort done in a highly contested environment, with an ongoing Israeli occupation and weak local trust in the Palestine Authority (PA. This article analyzes the understandings by local Palestinian non-government organizations and international bodies aiding in building the JSS of what a legitimate development of the JSS is and should be, and whose voices become dominant in the discussions and implementations of it. The argument made is that Western legal knowledge, with its focus on security and technocratic solutions, have been dominant at the expense of core political solutions in regard to the Israeli occupation and the workings of the PA, and that it has downplayed the local context, local voices and their understandings of a legitimate JSS.

  12. Agile IT Security Implementation Methodology

    CERN Document Server

    Laskowski, Jeff

    2011-01-01

    The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects. It is useful for anyone responsible for the deployment of IT security countermeasures. Security people with a strong knowledge of agile software development will find this book to be a good review of agile concepts.

  13. Internet security information system implement method

    International Nuclear Information System (INIS)

    Liu Baoxu; Mei Jie; Xu Rongsheng; An Dehai; Yu Mingjian; Chen Xiangyang; Zheng Peng

    1999-01-01

    On the basis of analysis of the key elements that will affect the Internet Security Information System, the author takes UNIX Operating System as an example, and provides the important stages that must be considered when implementing the Internet Security Information System. An implemental model of the Internet Security Information System is given

  14. An Exploration of the Implementation of Restorative Justice in an Ontario Public School

    Science.gov (United States)

    Reimer, Kristin

    2011-01-01

    This qualitative case study explores the implementation of restorative justice within one Ontario Public School. Restorative justice is a philosophy and a process for dealing with harmful behaviour, viewing such behaviour as a violation of relationships, not rules. My research seeks to present how restorative justice has been implemented in one…

  15. 28 CFR 16.132 - Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records...

    Science.gov (United States)

    2010-07-01

    ... System—Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ-006. 16.132...

  16. Implementation Of Law Number 11 Of 2012 Concerning Child Related Criminal Justice System Concept Restorative Justice

    Directory of Open Access Journals (Sweden)

    Intan Karangan

    2016-09-01

    Full Text Available This study aims to determine how the application of the concept of restorative justice in accordance with Law No. 11 of 2012 on Child Criminal Justice system. This study uses normative namely a study that discusses the problem based on the literature and legislation relating to the matter to be investigated. Law No. 11 of 2012 on the Criminal Justice System Child has provided a new concept in the criminal justice system, especially those in the juvenile justice system. Related to the concept of Restorative Justice or restorative justice is a resolution processes involving perpetrators, victims, families, and other relevant parties in a criminal act, jointly seek solutions to the offense and its implications by emphasizing restoration and not retribution

  17. Security of Nuclear Information. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance on implementing the principle of confidentiality and on the broader aspects of information security (i.e. integrity and availability). It assists States in bridging the gap between existing government and industry standards on information security, the particular concepts and considerations that apply to nuclear security and the special provisions and conditions that exist when dealing with nuclear material and other radioactive material. Specifically it seeks to assist states in the identification, classification, and assignment of appropriate security controls to information that could adversely impact nuclear security if compromised

  18. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  19. The European Union as an Area of Freedom, Security and Justice

    NARCIS (Netherlands)

    Fletcher, Maria; Herlin-Karnell, Ester; Matera, Claudio

    2016-01-01

    Europe’s area of freedom, security and justice is of increasing importance in contemporary EU law and legislation. It is worthy of special research attention because of its high-stakes content (particularly from an individual and a state perspective) and because its development to date has

  20. Best Implementation Practices: Disseminating New Assessment Technologies in a Juvenile Justice Agency

    Science.gov (United States)

    Young, Douglas; Moline, Karl; Farrell, Jill; Bierie, David

    2006-01-01

    Much has been written in recent years about advances in assessment technologies designed to aid decision making in the juvenile justice system. Adoption and implementation of this latest generation of actuarial tools, however, have lagged behind their development. Assessment in juvenile justice exemplifies the "science-practice gap" that…

  1. Working towards Justice, Security Sector Reform and Better ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... on security sector reform, constitutional reform, governance of diversity and critical dialogues in MENA societies. ... Reform will take time and one of the tests for those involved in this process is exercising patience and .... Related articles ...

  2. The Justice of Improving Security and Confronting Poverty

    DEFF Research Database (Denmark)

    Farah, Abdulkadir Osman

    2016-01-01

    Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory of such eff......Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory...

  3. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  4. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  5. Designing, Implementing, and Evaluating Secure Web Browsers

    Science.gov (United States)

    Grier, Christopher L.

    2009-01-01

    Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…

  6. Crime Victims Support System and Restorative Justice: Possible Implementation in Malaysia

    Directory of Open Access Journals (Sweden)

    Azlinda Azman, PhD

    2013-06-01

    Full Text Available Victims’ position is increasingly acknowledged in the criminal justice system across the world. Because of that, criminal justice systems in various countries slowly transform from focusing too much on the relationship between offenders and the legal system and to between the offenders and their victims. Several programs are highlighted such as victim-offender mediation, family group conferences, reparative orders and referral orders in this article. Findings from several studies support the effectiveness of the programs on both the victims and the offenders in terms of several measurements such as satisfaction and recidivism. Looking at this revolution, Malaysian academicians and professionals are beginning to recognize restorative justice as a possible revolution to its criminal justice system, but Malaysian criminal justice system first needs to strengthen or build components that support victims of crime, as this is one of the main principles of restorative justice. Currently, Malaysia still focuses on offenders and their relationship with legal system, but not much with their own victims (physical, emotional, and psychological consequences of the crime. Several possible issues before formal implementation of restorative justice are discussed. The issues (culture, training, and attitude of Malaysian people, including the victims, offenders, and those who work with them can influence the efficiency of restorative justice programs if not identified systematically. These issues can also be the possible research areas to be ventured in the future as these researches can help in implementation.

  7. Innovation in Justice and Security by Treaty of Lisbon

    Directory of Open Access Journals (Sweden)

    Myzafer ELEZI

    2013-11-01

    Full Text Available The Lisbon Treaty is a legal package which includes previous treaties, starting from the year 1957, following the Treaty of Rome and the Treaty of Nice in 2001, summarized in a single text that introduces a number of changes of the way how the European Union works, in order to make it more efficient for its citizens. This Treaty converts the European Union for the first time in a single entity, unifying pillars of its activities which are as follows: the European Communities, Common Foreign and Security Policy, and Judicial Cooperation in Criminal Matters, which so far only the European Communities had the status of judicial person. It modifies the Treaty of European Union, created by the European Union and the Treaty created by the European Community, which is in power, but do not replace them. The new Treaty gives the EU the legal framework, and necessary tools to face the future challenges and to respond to its citizen’s perspectives. The Conference will introduce all the innovations that the Treaty of Lisbon brings not only in the field of security and foreign policy of the EU, but also in those related to police and judicial cooperation regarding criminal matters.

  8. 77 FR 39117 - Equal Access to Justice Act Implementation Rule

    Science.gov (United States)

    2012-06-29

    ... regularly perform services for remuneration for the applicant, under the applicant's direction and control... Director may delegate authority to take final action on matters pertaining to the Equal Access to Justice... that the Director's final order issued pursuant to Sec. 1081.405 is final and unappealable, both within...

  9. Practices and Policies for Implementing Restorative Justice within Schools

    Science.gov (United States)

    Pavelka, Sandra

    2013-01-01

    Restorative justice models provide schools with the opportunity to improve school culture by addressing the disciplinary standards and creating a forum for peaceful resolution of conflict and misbehavior. These models seek to determine the impact of the incident and establish a mutual, prescriptive agreement for resolving and repairing the harm…

  10. Implementing Restorative Justice Practice in Schools: What Pedagogy Reveals

    Science.gov (United States)

    Vaandering, Dorothy

    2014-01-01

    In the ongoing pursuit for creating safe, nurturing and relational school cultures, educators continue to turn to restorative justice (rj) principles and practice. Predominantly, schools begin to engage with rj in an effort to address harm done, causing its discourse to be situated in literature tied to classroom management and behaviour. However,…

  11. European Court of Justice Secures Fundamental Rights from UN Security Council Resolutions

    Directory of Open Access Journals (Sweden)

    Sebastian Recker

    2009-02-01

    /msohtml1/01/clip_header.htm" fcs; mso-endnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" es; mso-endnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" ecs;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 2.0cm 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} -->

    The European Court of Justice has annulled Council Regulation (EC No 881/2002[1] freezing funds of Mr. Kadi and Al Barakaat based on Resolution 1267 (1999[2] of the United Nations Security Council[3]. In so doing, the European Court of Justice has set aside the Court of First Instance’s judgment

  12. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  13. Project IVOR - Implementing victim-oriented reform of the criminal justice system in the European Union

    NARCIS (Netherlands)

    Biffi, Emanuela; Mulder, Eva; Pemberton, Antony; Santos, Manuela; Valério, Mafalda; Vanfraechem, Inge; van der Vorm, Benny

    2016-01-01

    Project IVOR – Implementing victim-oriented reform of the criminal justice system in the European Union (2014-2016) offers an overview of current research into and with victims’ rights and services, identifying lacunas in the knowledge base and offering a model which can serve to connect experience

  14. Cultivating Safe and Supportive Schools: The Implementation and Institutionalization of Restorative Justice Practices

    Science.gov (United States)

    Anderson, Eleanor Robinson

    2017-01-01

    Mounting public concern about a school-to-prison pipeline has put schools and districts under increasing pressure to reduce their use of suspensions, expulsions and arrests. Many are turning to restorative justice practices (RJP) as a promising alternative for addressing school discipline and improving school climate. However, implementing RJP in…

  15. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  16. Governing for Enterprise Security (GES) Implementation Guide

    National Research Council Canada - National Science Library

    Westby, Jody R; Allen, Julia H

    2007-01-01

    .... If an organization's management does not establish and reinforce the business need for effective enterprise security, the organization's desired state of security will not be articulated, achieved, or sustained...

  17. Security aspects of database systems implementation

    OpenAIRE

    Pokorný, Tomáš

    2009-01-01

    The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database s...

  18. Reviewing the Justice and Security Hub Modality as Piloted in Liberia

    Directory of Open Access Journals (Sweden)

    Rory Keane

    2012-11-01

    Full Text Available ‘The Republic of Bangui’ or ‘the Republic of Monrovia’ are phrases we sometimes hear from practitioners to describe post conflict countries where very few services exist outside the capital city. This is especially the case for security – the critical public good in post conflict countries. In response to the need to bring security services closer to the citizens who often need them most, the Government of Liberia and the United Nations are piloting a new approach financed by the UN Peacebuilding Fund (PBF – the so-called ‘Justice and Security Hubs’. The donor community and the United Nations are watching closely. If this works, there is indication from UN officials that the model could potentially be replicated in other settings such as the East of the Democratic Republic of the Congo (DRC, Haiti and the northern states of South Sudan. If the hub concept is capable of being adapted and successful elsewhere, the United Nations will not only have added a new instrument to its peacekeeping toolkit but will also firmly demonstrate how the UN Peacebuilding Fund can in essence be catalytic in fostering long-term and comprehensive approaches to peacebuilding. This practice note outlines the process of developing and constructing the first hub in Liberia, which is due to be partly operational by the end of 2012, and provides a prognosis on its chances for success.

  19. Effect of Organizational Factors on Information Security Implementations

    Science.gov (United States)

    Perez, Rafael G.

    2013-01-01

    The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…

  20. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  1. Towards a Transnational Application of the Legality Principle in the EU’s Area of Freedom, Security and Justice?

    NARCIS (Netherlands)

    Luchtman, M.J.J.P.

    2013-01-01

    The Treaty of Lisbon formulates ambitious goals for the European Union. It holds that the EU shall offer its citizens an area of freedom, security and justice, in which the free movement of citizens is guaranteed in combination with appropriate measures with respect to crime control. This wording –

  2. Organisational justice, trust and perceptions of fairness in the implementation of agenda for change

    Energy Technology Data Exchange (ETDEWEB)

    Williamson, Keren, E-mail: williamsonk2@cardiff.ac.u [Department of Radiography, School of Healthcare Studies, Cardiff University, Heath Park, Cardiff CF14 4XN (United Kingdom); Williams, Kristy J. [Radiotherapy Department, Queen Elizabeth Hospital, Birmingham B15 2TH (United Kingdom)

    2011-02-15

    Background: Agenda for Change (AfC) was introduced to ensure equity of rewards for work of equal value, irrespective of professional background. Radiographer grades were evaluated and matched against job profiles and placed within the relevant pay bands of AfC. Equity theory suggests that individuals will make comparisons between themselves and others with regard to their rewards resulting in justice perceptions which may affect morale and work behaviours. This case study explored the justice perceptions and effect on co-worker relationships of a group of therapeutic radiographers in the process and outcomes of the implementation of AfC within their organisation. Method: An existential phenomenological approach was used and self administered questionnaires utilised for data collection. A sample of band 5-8a therapeutic radiographers from one regional Cancer Centre was questioned. Content analysis was applied to systematically and objectively categorise information into recurring themes. Findings: Open coding identified two main themes which were termed Recognition and Resentment. Data was analysed in terms of organisational justice theory and issues were identified in relation to recognition of extra-role behaviour and trust in those tasked with job matching and decision making. Conclusion: There appeared to be a perceived lack of justice in relation to the implementation of AfC, resulting in a lowering of staff morale and organisational commitment. However, no effect on co-worker relations was reported. Professional values appear to supersede issues of organisational justice, with staff asserting that patient care must override any matter of personal dissatisfaction.

  3. Organisational justice, trust and perceptions of fairness in the implementation of agenda for change

    International Nuclear Information System (INIS)

    Williamson, Keren; Williams, Kristy J.

    2011-01-01

    Background: Agenda for Change (AfC) was introduced to ensure equity of rewards for work of equal value, irrespective of professional background. Radiographer grades were evaluated and matched against job profiles and placed within the relevant pay bands of AfC. Equity theory suggests that individuals will make comparisons between themselves and others with regard to their rewards resulting in justice perceptions which may affect morale and work behaviours. This case study explored the justice perceptions and effect on co-worker relationships of a group of therapeutic radiographers in the process and outcomes of the implementation of AfC within their organisation. Method: An existential phenomenological approach was used and self administered questionnaires utilised for data collection. A sample of band 5-8a therapeutic radiographers from one regional Cancer Centre was questioned. Content analysis was applied to systematically and objectively categorise information into recurring themes. Findings: Open coding identified two main themes which were termed Recognition and Resentment. Data was analysed in terms of organisational justice theory and issues were identified in relation to recognition of extra-role behaviour and trust in those tasked with job matching and decision making. Conclusion: There appeared to be a perceived lack of justice in relation to the implementation of AfC, resulting in a lowering of staff morale and organisational commitment. However, no effect on co-worker relations was reported. Professional values appear to supersede issues of organisational justice, with staff asserting that patient care must override any matter of personal dissatisfaction.

  4. The Implementation of Justice Principle Within the Land Procurement for Public Utilities Construction

    OpenAIRE

    SH, Sahnan,

    2015-01-01

    The Indonesia€™s population growth and development increasing makes all parties, in the reality, need more land, especially for government. Land procurement for public utilities construction usually have a problem, because on the process we rarely meet easy process or easy getting deal between landowner and government, or other parties who needs the land. This occurs because is difficult getting deal between government and landowner about compensation. Justice principle implementation someti...

  5. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  6. Implementing healthcare information security: standards can help.

    Science.gov (United States)

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  7. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  8. LAW ENFORCEMENT PREPAREDNESS FOR THE IMPLEMENTATION OF INDONESIA’S LAW ON JUVENILE JUSTICE SYSTEM

    Directory of Open Access Journals (Sweden)

    Dani Krisnawati

    2014-03-01

    Full Text Available Paradigmatic changes stipulated in Law Number 11 of 2012 on Juvenile Justice System, including regulations concerning restorative justice and diversion require the competency and skills of the law enforcement officers. This research identifies measures that have been taken and the existing barriers in preparing for the implementation of this Law. The research demonstrates that the readiness of the investigators and child prosecutors are merely limited to the outreach of Law Number 11 of 2012, whilst knowledge of the court judges only covers the draft Law. The number of officers receiving outreach is limited and should be increased. Negative perception on the officers due to the risk of a bribery accusation is feared to hamper the implementation of diversion regulation based on a restorative justice. Perubahan paradigmatik yang termuat dalam Undang-Undang Nomor 11 Tahun 2012 tentang Sistem Peradilan Pidana Anak, termasuk diantaranya ketentuan mengenai keadilan restoratif dan diversi, memerlukan kompetensi dan keahlian aparat penegak hukum. Penelitian ini mengidentifikasi langkah yang telah dilakukan dan kendala persiapan implementasi Undang-Undang tersebut. Hasil penelitian memperlihatkan bahwa kesiapan penyidik dan penuntut umum anak masih terbatas pada partisipasi sosialisasi Undang-Undang Nomor 11 Tahun 2012, sedangkan hakim anak memiliki pengetahuan hanya pada Rancangan Undang-Undang. Jumlah aparat yang menerima sosialisasi Undang-Undangmasih terbatas dan perlu ditingkatkan jumlahnya. Pandangan negatif terhadap aparat karena bisa menimbulkan dugaan suap dikhawatirkan menjadi penghambat diterapkannya ketentuan diversi dengan pendekatan keadilan restoratif.

  9. Implementation Support of Security Design Patterns Using Test Templates

    Directory of Open Access Journals (Sweden)

    Masatoshi Yoshizawa

    2016-06-01

    Full Text Available Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an “aspect test template” to observe the internal processing and a “test case template”. Providing design information creates a test from the test template with a tool. Because our test template is reusable, it can easily perform a test to validate a security design pattern. In an experiment involving four students majoring in information sciences, we confirm that our method can realize an effective test, verify pattern applications, and support pattern implementation.

  10. Implementation of computer security at nuclear facilities in Germany

    Energy Technology Data Exchange (ETDEWEB)

    Lochthofen, Andre; Sommer, Dagmar [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Koeln (Germany)

    2013-07-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  11. Implementation of computer security at nuclear facilities in Germany

    International Nuclear Information System (INIS)

    Lochthofen, Andre; Sommer, Dagmar

    2013-01-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  12. Information security improving blocklist driven firewall implementation

    OpenAIRE

    Kylmänen, J. (Juha)

    2013-01-01

    Abstract The Internet has become a commodity and with it information security and privacy issues have appeared. Common threats against the end users include malware and phishing. Phishing is a social engineering technique used to mimic legit banking or social networking websites in an attempt to gain sensitive information from the user and malware is software with malicious intent. ...

  13. Aspects regarding the implementation of information security standards in organizations

    Directory of Open Access Journals (Sweden)

    Mihai Bârsan

    2017-03-01

    Full Text Available Information security is one of the major challenges of the information and knowledge based society. The preoccupation of organizations to ensure the security of information in the digital environment has led to the emergence of specific standards in the field. Thus, ISO 27000 brings together reference standards in the field. Starting from ISO 27001, which summarizes policies and procedures on physical, legal and technological security risks, this paper looks at the steps the organization must undertake to implement the standards.

  14. The role of Nigerian youths in effective implementation of security ...

    African Journals Online (AJOL)

    ... effective implementation of security and social development intervention in Nigeria cannot be over-emphasized. This is because youths have been deeply involved in various self-help projects in various Local and State Governments in Nigeria. Their areas of interventions cover projects involving trade, commerce, security ...

  15. Choice of forum in an area of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Michiel Luchtman

    2011-01-01

    Full Text Available This article deals with the question of which state, in the case of overlapping jurisdictions, should investigate, prosecute and try offences in the European area of freedom, security and justice (choice of forum. As binding instruments on the choice of forum currently have no priority for the European legislator, this issue is de facto left largely to the legislative and executive branches of the Member States. Yet the question of whether this Member State discretion is acceptable de iure remains unanswered. This article assesses the relevant EU instruments in light of the requirement of a 'tribunal established by law' (Article 6 ECHR; Article 47 CFR and addresses the issue of whether this requirement, in addition to its role in the national context, is also of relevance for the AFSJ as a whole. It is submitted that the choice of forum has a clear constitutional dimension, including a prominent role for the national and European judiciary as well. Only if concerns of losing national sovereignty are overcome will it be possible to start the debate on what actions must follow.

  16. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  17. Procedural (in)justice in the implementation of solar energy: The case of Charanaka solar park, Gujarat, India

    International Nuclear Information System (INIS)

    Yenneti, Komali; Day, Rosie

    2015-01-01

    Solar PV is being rolled out on a large scale in India and other emerging economies, but in the enthusiasm for solar’s promise of plentiful, low carbon energy, the social and environmental justice concerns accompanying such infrastructure development are in danger of being overlooked. In this context, this paper, using the case study of ‘Charanaka Solar Park’ in Gujarat state, qualitatively analyses the degree of provision for procedural justice in solar energy implementation in India using a framework drawn from social environmental and energy justice literatures. The case study illustrates how the failure of various aspects of procedural justice can result in unnecessarily large impacts on the livelihoods of rural communities and the further marginalisation of those of lowest status. We conclude with discussion of the aspects of procedural justice that need attention in low carbon energy developments in developing countries alongside some policy and governance suggestions for the achievement of this in India and elsewhere. - Highlights: • Procedural justice issues in Charanaka solar park implementation are examined • New insights into participation, enfranchisement, and recognition are provided • Lack of information sharing and acknowledgement of local knowledge • Lack of adequate participation and enfranchisement of the affected communities • Consideration of procedural justice important for success of National Solar Mission

  18. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  19. Access to Justice for the Wrongfully Accused in National Security Investigations

    Directory of Open Access Journals (Sweden)

    Jasminka Kalajdzic

    2009-02-01

    Full Text Available Among the casualties in the ‘war on terror’ is the presumption of innocence. It is now known that four Canadians who were the subject of investigation by the RCMP and CSIS were detained and tortured in Syria on the basis of information that originated in and was shared by Canada. None has ever been charged with a crime. On their return home, all four men called for a process that would expose the truth about the role of Canadian agencies in what happened to them, and ultimately help them clear their names and rebuild their lives. To date, in varying degrees, all four men continue to wait for that “process.” In this paper, I examine the access to justice mechanisms available to persons who are wrongfully accused of being involved in terrorist activities. Utilizing the case study of one of the four men, Abdullah Almalki, I explore the various processes available to him: (i a complaint to the relevant domestic complaints bodies, the Security Intelligence Review Committee and the Commission for Public Complaints Against the RCMP; (ii a commission of inquiry; and (iii a civil tort claim. Due in large part to the role national security confidentiality plays in these mechanisms, all three models are found to be ineffective for those seeking accountability in the national security context. Parmi les victimes de la «guerre contre le terrorisme» figure la présomption d’innocence. On sait maintenant que quatre Canadiens qui ont fait l’objet d’enquêtes par la GRC et le SCRS ont été détenus et torturés en Syrie suite à des renseignements ayant leur origine au Canada et partagés par le Canada. Nul d’entre eux n’a jamais été accusé de crime. À leur retour, tous les quatre hommes ont demandé un processus qui exposerait la vérité au sujet du rôle d’agences canadiennes dans ce qui leur est arrivé et qui éventuellement leur aiderait à rétablir leur réputation et refaire leur vie. À ce jour, à des degrés divers, tous

  20. Restorative justice in Macedonian criminal legislation and difficulties in its implementation

    Directory of Open Access Journals (Sweden)

    Bačanović Oliver

    2010-01-01

    Full Text Available The subject-matter of this paper is to provide an overview of the situation/ status within Macedonian criminal legislation as a concept whose introduction and implementation is of recent time. This issue is addressed at two levels: through the overview of the representation of restorative justice elements within the Macedonian criminal legislation and through foreseeing the difficulties considering the implementation of this concept. Regarding the second level the author especially focuses on the difficulties with which social work centers and local communities have to deal. In order to answer the posed questions the author used his own findings, as well as the findings to which he came during the direct contacts with representatives of respective institutions or on the grounds of materials that these institutions provided. In the conclusion, the author attempts to answer to the closing question: can we be satisfied with the accomplished in the area of restorative justice? The author attempts to answer on the grounds of certain indicators (political will, material assumptions, realized professional trainings and education. The author points out to the necessity of acting in the educational system as well on all levels with an aim to create indispensable critical mass within society that will have an upgraded awareness for peaceful resolution of the conflict situation.

  1. Implementation of Learning Organization Components in Ardabil Social Security Hospital

    OpenAIRE

    Azadeh Zirak

    2015-01-01

    This study aimed to investigate the implementation of learning organization characteristics based on Marquardt systematic model in Ardabil Social Security Hospital. The statistical population of this research was 234 male and female employees of Ardabil Social Security Hospital. For data collection, Marquardt questionnaire was used in the present study which its validity and reliability had been confirmed. Statistical analysis of hypotheses based on independent samples t-test showed that lear...

  2. Monitoring the Implementation of State Regulation of National Economic Security

    Directory of Open Access Journals (Sweden)

    Hubarieva Iryna O.

    2018-03-01

    Full Text Available The aim of the article is to improve the methodological tools for monitoring the implementation of state regulation of national economic security. The approaches to defining the essence of the concept of “national economic security” are generalized. Assessment of the level of national economic security is a key element in monitoring the implementation of state regulation in this area. Recommendations for improving the methodology for assessing national economic security, the calculation algorithm of which includes four interrelated components (economic, political, social, spiritual one, suggests using analysis methods (correlation and cluster analysis, and taxonomy, which allows to determine the level and disproportion of development, can serve as a basis for monitoring the implementation of state regulation of national economic security. Such an approach to assessing national economic security makes it possible to determine the place (rank that a country occupies in a totality of countries, the dynamics of changing ranks over a certain period of time, to identify problem components, and monitor the effectiveness of state regulation of the national economic security. It the course of the research it was determined that the economic sphere is the main problem component of ensuring the security of Ukraine’s economy. The analysis made it possible to identify the most problematic partial indicators in the economic sphere of Ukraine: economic globalization, uneven economic development, level of infrastructure, level of financial market development, level of economic instability, macroeconomic stability. These indicators have a stable negative dynamics and a downward trend, which requires an immediate intervention of state bodies to ensure the national economic security.

  3. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Science.gov (United States)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  4. IT Security Management Implementation Model in Iranian Bank Industry

    Directory of Open Access Journals (Sweden)

    Mona Vanaki

    2017-06-01

    Full Text Available According to the complexity and differences between Iranian banks and other developed countries the appropriate actions to implement effective security management of information technology have not been taken. The aim of this study was to create a powerful model by selecting the appropriate security controls to protect information assets in the bank. In this model, at first the principle set fort in ISO standard 27001, was extracted and then by further studies derived from best practices carried out in the world on the related subject from 2008 to 2016 using a qualitative descriptive method, points comply with information security management in the banking industry were added to it. With the study of Iranian banks in dealing with IT security management system and with help of action research tools, provisions which prevent the actual implementation of this standard was removed and finally a conceptual model with operating instructions and considering all the principles of information security management standard, as well as banking institutions focusing on the characteristics of Iran was proposed.

  5. Cyber Security in Digital I and C Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William [Doosan HF Controls, Texas (United States)

    2011-08-15

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described.

  6. Cyber Security in Digital I and C Implementation

    International Nuclear Information System (INIS)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William

    2011-01-01

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described

  7. Security of Radioactive Sources. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    There are concerns that terrorist or criminal groups could gain access to high activity radioactive sources and use these sources maliciously. The IAEA is working with Member States to increase control, accounting and security of radioactive sources to prevent their malicious use and the associated potential consequences. Based on extensive input from technical and legal experts, this implementation guide sets forth guidance on the security of sources and will serve as a useful tool for legislators and regulators, physical protection specialists and facility and transport operators, as well as for law enforcement officers.

  8. Security, justice and the energy crossroads: Assessing the implications of the nuclear phase-out in Germany

    International Nuclear Information System (INIS)

    Rehner, Robert; McCauley, Darren

    2016-01-01

    The nuclear melt-down in Fukushima resulted in diverging energy policy decisions across the world where Germany decided to opt out of nuclear electricity production. Yet, the government’s decision-making framework for energy policy decisions does not accurately reflect important drivers for the strategy change. This paper presents the Energy Crossroads framework as a more comprehensive tool to analyse the drivers and impacts of the nuclear phase-out. 20 expert interviews were performed across business participants as well as policy makers in the national and international energy context. Results show that Germany has adopted an environmental justice, rather than energy security, stance in their nuclear phase out policy, with significant long-term consequences. - Highlights: • We develop the Energy Crossroads framework as a means to analyse the Energiewende. • The strategy's short and medium term concerns focus on the security of supply. • Long term goals are driven by aspects of environmental justice. • Targeted development of national FiTs is needed alongside a functioning carbon market.

  9. A Charity/Justice Partnership for U.S. Food Security.

    Science.gov (United States)

    Whitaker, William H.

    1993-01-01

    Contends that it is imperative to end hunger in the United States and to go beyond a national perspective, taking a global perspective to fight hunger elsewhere in the world. Sees America's first response to hunger being charity and considers charity and justice. Discusses efforts of Campaign to End Childhood Hunger and Maine Coalition for Food…

  10. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.230 Maritime Security (MARSEC) Level coordination and implementation. (a) The facility owner...

  11. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  12. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  13. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  14. Design and implementation of a high performance network security processor

    Science.gov (United States)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  15. Securing a control system: experiences from ISO 27001 implementation

    International Nuclear Information System (INIS)

    Vuppala, V.; Vincent, J.; Kusler, J.; Davidson, K.

    2012-01-01

    Recent incidents of breaches, in control systems in specific and information systems in general, have emphasized the importance of security and operational continuity in achieving the quality objectives of an organization, and the safety of its personnel and infrastructure. However, security and disaster recovery are either completely ignored or given a low priority during the design and development of an accelerator control system, the underlying technologies, and the overlaid applications. This leads to an operational facility that is easy to breach, and difficult to recover. Retrofitting security into a control system becomes much more difficult during operations. In this paper we describe our experiences with implementing ISO/IEC 27001 Standard for information security at the Electronics Department of the National Superconducting Cyclotron Laboratory (NSCL) located on the campus of Michigan State University. We describe our risk assessment methodology, the identified risks, the selected controls, their implementation, and our documentation structure. We also report the current status of the project. We conclude with the challenges faced and the lessons learnt. (authors)

  16. A Methodology to Implement an Information Security Management System

    Directory of Open Access Journals (Sweden)

    Alaíde Barbosa Martins

    2005-08-01

    Full Text Available Information security has actually been a major challenge to most organizations. Indeed, information security is an ongoing risk management process that covers all of the information that needs to be protected. ISO 17799 offers what companies need in order to better manage information security. The best way to implement this standard is to ease the security management process using a methodology that will define will define guidelines, procedures and tools that will be needed along the way. Hence, this paper proposes a methodology to assist companies in assessing their compliance with BS 7799/ ISO 17799 as well as planning and implementing the actions necessary to become compliant or certified to the standard. The concepts and ideas presented here had been applied in a case study involving the Cetrel S/A - Company of Environmental Protection. For this company, responsible for treatment of industrial residues generated by the Camaçari Petrochemical Complex and adjacent areas, to assure confidentiality and integrity of customers' data is a basic requirement.

  17. Implementation of a security system in the radiotherapy process

    International Nuclear Information System (INIS)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-01-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  18. Design and Implementation of GSM Based Automated Home Security System

    Directory of Open Access Journals (Sweden)

    Love Aggarwal

    2014-05-01

    Full Text Available The Automated Home Security System aims at building a security system for common households using GSM modem, sensors and microcontroller. Since many years, impeccable security system has been the prime need of every man who owns a house. The increasing crime rate has further pressed the need for it. Our system is an initiative in this direction. The system provides security function by monitoring the surroundings at home for intruders, fire, gas leakages etc. using sensors and issue alerts to the owners and local authorities by using GSM via SMS. It provides the automation function as it can control (On/Off the various home appliances while the owners are away via SMS. Thus the Automated Home Security System is self-sufficient and can be relied upon undoubtedly. Also, it is capable of establishing two way communication with its owner so that he/she can keep a watch on his/her home via sensor information or live video streaming. A camera can be installed for continuous monitoring of the system and its surroundings. The system consists of two main parts: hardware and software. Hardware consists of Microcontroller, Sensors, Buzzer and GSM modem while software is implemented by tools using Embedded ‘C’.

  19. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  20. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  1. Towards an integrative post-2015 sustainable development goal framework: Focusing on global justice – peace, security and basic human rights

    Directory of Open Access Journals (Sweden)

    George R. Lueddeke

    2015-12-01

    To strengthen the likelihood of realizing the post-2015 Sustainable Development Goals (SDGs, particularly with regard to “planet and population” health and well-being , UN and other decision-makers are urged to consider the adoption of an integrated SDG framework that is based on (i a vision of global justice - underpinned by peace, security and basic human rights; (ii the development of interdependent and interconnected strategies for each of the eleven thematic indicators identified in the UN document The World We Want; and (iii the application of guiding principles to measure the impact of SDG strategies in terms of holism, equity, sustainability, ownership, and global obligation. While current discussions on the SDGs are making progress in a number of areas, the need for integration of these around a common global vision and purpose seems especially crucial to avoid MDG shortcomings.

  2. Key Considerations in Providing a Free Appropriate Public Education for Youth with Disabilities in Juvenile Justice Secure Care Facilities. Issue Brief

    Science.gov (United States)

    Gagnon, Joseph C.; Read, Nicholas W.; Gonsoulin, Simon

    2015-01-01

    Access to high-quality education for youth is critical to their long-term success as adults. Youth in juvenile justice secure care facilities, however, too often do not have access to the high-quality education and related supports and services that they need, particularly youth with disabilities residing in such facilities. This brief discusses…

  3. Implementation of Learning Organization Components in Ardabil Social Security Hospital

    Directory of Open Access Journals (Sweden)

    Azadeh Zirak

    2015-06-01

    Full Text Available This study aimed to investigate the implementation of learning organization characteristics based on Marquardt systematic model in Ardabil Social Security Hospital. The statistical population of this research was 234 male and female employees of Ardabil Social Security Hospital. For data collection, Marquardt questionnaire was used in the present study which its validity and reliability had been confirmed. Statistical analysis of hypotheses based on independent samples t-test showed that learning organization characteristics were used more than average level in some subsystems of Marquardt model and there was a significant difference between current position and excellent position based on learning organization characteristic application. According to the research findings, more attention should be paid to the subsystems of learning organization establishment and balanced development of these subsystems.

  4. Crime Victims Support System and Restorative Justice: Possible Implementation in Malaysia

    OpenAIRE

    Azlinda Azman, PhD; Mohd Taufik bin Mohammad

    2013-01-01

    Victims’ position is increasingly acknowledged in the criminal justice system across the world. Because of that, criminal justice systems in various countries slowly transform from focusing too much on the relationship between offenders and the legal system and to between the offenders and their victims. Several programs are highlighted such as victim-offender mediation, family group conferences, reparative orders and referral orders in this article. Findings from several studies support the ...

  5. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives as well...

  6. Implementing the Payment Card Industry (PCI Data Security Standard (DSS

    Directory of Open Access Journals (Sweden)

    John O' Raw

    2011-08-01

    Full Text Available Underpinned by the rise in online criminality, the payment card industry (PCI data security standards (DSS were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP can be applied to meet the requirement of masking the primary account number (PAN. Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.

  7. The external dimensions of the EU area of freedom, security and justice : a constitutional perspective

    NARCIS (Netherlands)

    Matera, Claudio

    2016-01-01

    During the past decade in particular the external relations of the EU have not just concerned the classic areas of international cooperation (‘external action’) of the EU such as trade (Article 205 TFEU), development cooperation (Article 208 TFEU) and foreign security and defence policy (Title V

  8. ConstitutionalJustice: Cases of Protection of Freedom and Personal Security in Colombia

    Directory of Open Access Journals (Sweden)

    Viridiana Molinares Hassan

    2014-07-01

    Full Text Available In this paper we present the results of an investigation about judicial protection of freedom and personal security granted by the Constitutional Court (cc of Colombia, with a comparative analysis between the period 1992-2001, to which governments have appointed period of postconstitucionales, which coincides with the issuance of the 1991 Constitution, and the creation of constitutional jurisdiction, and the period 2002-2010, during which it ran the Democratic Security Policy (dsp as a government policy proposal by former president Álvaro Uribe, whose aim was to achieve peace through the declaration of war to the guerrilla group Revolutionary Armed Forces of Colombia (farc. Our interest is to show that the protection of freedom and personal security as the basis of the Constitutional (ec finds in the cc his greatest guarantor, even against closing courts in other jurisdictions that are still rooted in the failed legal positivist paradigm, ignoring the postulates of neoconstitutionalism dc sufficiently developed from a process of creative interpretation and decision-making. This coupled with the importance for the branches of power and knowledge associated scope of freedom and personal security developed by the cc in the difficult context of irregular warfare that exists in Colombia, yet it is, for universal constitutionalism, an example of the development of legal guarantor in the context of current constitutionalism.

  9. 83 CHALLENGES AND PROSPECTS OF THE JUVENILE JUSTICE ...

    African Journals Online (AJOL)

    Fr. Ikenga

    Juvenile justice administration in Nigeria is weak and has been given very .... The Nigerian criminal justice system, of which the juvenile justice system is an integral part, ... as instruments of security and justice but as weapons of oppression8.

  10. A study on the development of national guide for implementing nuclear security culture in ROK

    International Nuclear Information System (INIS)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik

    2014-01-01

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs

  11. A study on the development of national guide for implementing nuclear security culture in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs.

  12. Globalization of water and food through international trade: impacts on food security, resilience and justice

    Science.gov (United States)

    D'Odorico, P.; Carr, J. A.; Seekell, D. A.; Suweis, S. S.

    2015-12-01

    The global distribution of water resources in general depends on geographic conditions but can be (virtually) modified by humans through mechanisms of globalization, such as trade, that make food commodities available to populations living far from the production regions. While trade is expected to improve access to food and (virtual) water, its impact on the global food system and its vulnerability to shocks remains poorly understood. It is also unclear who benefits from trade and whether it contributes to inequality and justice in resource redistribution. We reconstruct the global patterns of food trade and show with a simple model how the ongoing intensification of imports and exports has eroded the resilience of the global food system. Drawing on human rights theory, we investigate the relationship between inequality and injustice in access to water and food. We assess the fulfillment of positive and negative water and food rights and evaluate the obligations arising from the need to ensure that these rights are met throughout the world. We find that trade enhances the vulnerability to shocks but overall increase the number of people whose water and food rights are met.

  13. Teacher Consultation to Enhance Implementation of School-Based Restorative Justice

    Science.gov (United States)

    Mayworm, Ashley M.; Sharkey, Jill D.; Hunnicutt, Kayleigh L.; Schiedel, K. Chris

    2016-01-01

    Restorative justice (RJ) is an alternative approach to school discipline that has been gaining recognition in the public and academic spheres as a way to engage students who misbehave in school. RJ has promise to address racial/ethnic, gender, and disability disproportionality in school discipline. One aspect of school-based RJ that has received…

  14. Advancing Social Justice in Urban Schools through the Implementation of Transformative Groups for Youth of Color

    Science.gov (United States)

    Shin, Richard Q.; Rogers, Jennifer; Stanciu, Amalia; Silas, Melany; Brown-Smythe, Claudette; Austin, Brenda

    2010-01-01

    The unique challenges faced by some youth of color living in high poverty contexts necessitate the creation of innovative, culturally relevant, group interventions. Framing the work of group counselors from a social justice perspective provides a structure for emphasizing the complex intersection of economic, political, and socio-historical issues…

  15. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Fadhil Mahmood

    2013-04-01

    Full Text Available     Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.        In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.      This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications

  16. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  17. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  18. Doing Justice to Human Security: A Textbook in Tune with its Time

    Directory of Open Access Journals (Sweden)

    Deane Edward Neubauer

    2013-01-01

    Full Text Available I begin this brief review of this important volume with the confession that I have not personally pursued a teaching style that has employed a self-acclaimed textbook for many, many years, preferring to construct courses around monographs, articles and other visual materials. However, were I provided the opportunity to teach a course at the upper division undergraduate level or early gradate level in the subject of human security, this would certainly be the book I would choose (with the caveat introduced below. Alex and Sabina Lautensach have given careful and thoughtful consideration to every aspect of the text: the preface and introduction, written by the editors, lay out both the logic of the text and frame the subject matter that will locate the reader firmly in the midst of the vast challenges that consti­tute the issue of human security. They do so by em­phasizing both the multiple dimensions along which the issue of human security can be located and the inseparable nature of these as they interact with each other in complex ways. In many respects this strikes me as one of the most important contributions to the text—its steady insistence that human security as a construct is in a discursive state of constant emer­gence, such that in some important ways all its varied dimensions insistently co-vary. To make such a claim is in itself daunting—to demonstrate its validity and mutual engagements through the complex subject matters of its 20 chapters, is a tour de force. Their conclusion is sufficiently rich to stand alone as an illustrative text in other course materials.

  19. Implementation of chaotic secure communication systems based on OPA circuits

    International Nuclear Information System (INIS)

    Huang, C.-K.; Tsay, S.-C.; Wu, Y.-R.

    2005-01-01

    In this paper, we proposed a novel three-order autonomous circuit to construct a chaotic circuit with double scroll characteristic. The design idea is to use RLC elements and a nonlinear resistor. The one of salient features of the chaotic circuit is that the circuit with two flexible breakpoints of nonlinear element, and the advantage of the flexible breakpoint is that it increased complexity of the dynamical performance. Here, if we take a large and suitable breakpoint value, then the chaotic state can masking a large input signal in the circuit. Furthermore, we proposed a secure communication hyperchaotic system based on the proposed chaotic circuits, where the chaotic communication system is constituted by a chaotic transmitter and a chaotic receiver. To achieve the synchronization between the transmitter and the receiver, we are using a suitable Lyapunov function and Lyapunov theorem to design the feedback control gain. Thus, the transmitting message masked by chaotic state in the transmitter can be guaranteed to perfectly recover in the receiver. To achieve the systems performance, some basic components containing OPA, resistor and capacitor elements are used to implement the proposed communication scheme. From the viewpoints of circuit implementation, this proposed chaotic circuit is superior to the Chua chaotic circuits. Finally, the test results containing simulation and the circuit measurement are shown to demonstrate that the proposed method is correct and feasible

  20. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  1. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Science.gov (United States)

    2010-01-01

    ... 29, 2009 Implementation of the Executive Order, “Classified National Security Information” Memorandum..., “Classified National Security Information” (the “order”), which substantially advances my goals for reforming... or handles classified information shall provide the Director of the Information Security Oversight...

  2. The Strengthening Nuclear Security Implementation initiative: evolution, status and next steps

    NARCIS (Netherlands)

    Dal, B.; Herbach, J.; Luongo, K.N.

    2015-01-01

    The "Strengthening Nuclear Security Implementation" initiative broke new ground at the 2014 Nuclear Security Summit in the effort to harmonize and strengthen the global nuclear security regime. This report discusses the significance of the initiative, the importance of expanding its signatories, and

  3. Impact of Implementing VPN to Secure Wireless LAN

    OpenAIRE

    H. Bourdoucen; A. Al Naamany; A. Al Kalbani

    2009-01-01

    Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards based technologies that can be delivered by Virtual Private Networking (VPN) bein...

  4. Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2016-01-01

    Full Text Available The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices.

  5. Sandia's experience in designing and implementing integrated high security physical protection systems

    International Nuclear Information System (INIS)

    Caskey, D.L.

    1986-01-01

    As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described

  6. Information Security: USDA Needs to Implement Its Departmentwide Information Security Plan

    National Research Council Canada - National Science Library

    2000-01-01

    USDA has taken positive steps to begin improving its information security by developing its August 1999 Action Plan with recommendations to strengthen department-wide information security and hiring...

  7. Design and Implementation of a Secure Modbus Protocol

    Science.gov (United States)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  8. Security cost analysis in electricity markets based on voltage security criteria and Web-based implementation

    International Nuclear Information System (INIS)

    Chen, H.

    2003-01-01

    This paper presents an efficient and transparent method for electricity market operators to analyze transaction security costs and to quantify the correlation between market operation and power system operation. Rescheduling and take-risk strategies were proposed and discussed with reference to transaction impact computations, thermal and voltage limits and voltage stability criteria. The rescheduling method is associated with an iterative generation dispatch or load curtailment approach to minimize the amount of rescheduling. The take-risk method considered operating risks to facilitate transactions. The SATC concept was also proposed to accurately evaluate transmission congestion. The impact of transaction was calculated using a new sensitivity formula to find the most effective rescheduling direction and the most effective cost distribution. A new pricing method called Nodal Congestion Price was also proposed to determine proper price signals. The paper also presents an Artificial Neural Network (ANN) based short term load forecasting method that considers the effect of price on the load. A web-based prototype was implemented to allow all market participants access to the proposed analysis and pricing techniques. Several case studies have validated the effectiveness of the proposed method which would help independent system operators in determining congestion prices, coordinate transactions and make profitable market decisions

  9. I and C security program for nuclear facilities: implementation guide - TAFICS/IG/2

    International Nuclear Information System (INIS)

    2016-04-01

    This is the second in a series of documents being developed by TAFICS for protecting computer-based I and C systems of Indian nuclear facilities from cyber attacks. The document provides guidance to nuclear facility management to establish, implement and maintain a robust I and C security program - consisting of security plan and a set of security controls. In order to provide a firm basis for the security program, the document also identifies the fundamental security principles and foundational security requirements related to computer-based I and C systems of nuclear facilities. It is recommended that all applicable Indian nuclear facilities should implement the security program - with required adaptation - so as to provide the necessary assurance that the I and C systems are adequately protected against cyber attacks. (author)

  10. The implementation of security for microBHT

    CERN Document Server

    Purvis, J

    1997-01-01

    With the construction of LHC and the funding of up to 80% of the new experiments (ATLAS and CMS) to come from outside CERN it is important that budget responsibles have secure and instantaneous access to view their financial data which is managed by CERN. MicroBHT (BHT)is a system specifically designed to cater for these requirements. MicroBHT provides for secure web-based access for Teams (and other budget holders) to view their financial data. The security mechanism for BHT which is detailed in this paper uses the standards adopted by banks and other institutions who use the web with maximum security and confidentialy of for both their data and their customers.

  11. Achieving successful evidence-based practice implementation in juvenile justice: The importance of diagnostic and evaluative capacity.

    Science.gov (United States)

    Walker, Sarah Cusworth; Bumbarger, Brian K; Phillippi, Stephen W

    2015-10-01

    Evidence-based programs (EBPs) are an increasingly visible aspect of the treatment landscape in juvenile justice. Research demonstrates that such programs yield positive returns on investment and are replacing more expensive, less effective options. However, programs are unlikely to produce expected benefits when they are not well-matched to community needs, not sustained and do not reach sufficient reach and scale. We argue that achieving these benchmarks for successful implementation will require states and county governments to invest in data-driven decision infrastructure in order to respond in a rigorous and flexible way to shifting political and funding climates. We conceptualize this infrastructure as diagnostic capacity and evaluative capacity: Diagnostic capacity is defined as the process of selecting appropriate programing and evaluative capacity is defined as the ability to monitor and evaluate progress. Policy analyses of Washington State, Pennsylvania and Louisiana's program implementation successes are used to illustrate the benefits of diagnostic and evaluate capacity as a critical element of EBP implementation. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Simulating the implementation of the administrative justice act with ThinkLets and GroupSystems: a comparative analysis from three field studies

    CSIR Research Space (South Africa)

    Phahlamohlaka, J

    2006-09-01

    Full Text Available Presented in this paper are the results of three simulation exercises performed as part of a series of field studies whose object is the implementation of the Promotion of Administrative Justice Act. The unit of analysis of the study is the process...

  13. I and C security audit of nuclear facilities: implementation guide - TAFICS/IG/3

    International Nuclear Information System (INIS)

    2017-05-01

    This document provides guidance to I and C Security audit team to prepare, plan, and execute security audit of Instrumentation and Control (I and C) systems at DAE's nuclear facilities, including I and C system development and manufacturing organisations. The audit is expected to check efficacy of I and C security program - plan, policies, procedures and controls - implemented at a nuclear facility to protect I and C systems from potential cyber attacks. The document contains detailed audit procedures, which specify the audit objectives, audit objects and audit methods for each element of I and C security described in implementation guides promulgated by TAFICS to all DAE Units. (author)

  14. IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION

    Directory of Open Access Journals (Sweden)

    MATÚŠ HORVÁTH

    2009-12-01

    Full Text Available Information security should be today a key issue in any organization. With the implementation of information security management system (ISMS the organization can identify and reduce risks in this area. This the area of information security management covers a numbers of ISO / IEC 27000 standards, which are based on best practice solutions. However, smaller organizations are often discourages with the implementation of these systems, because of fear of high cost and complexity. Especially due to the fact that the standards does not strictly require implementation of all security controls it is possible to implement these systems in small-size organizations. In this article, we want to point on this fact through describing practical experience with ISMS implementation in small-size organization.

  15. HARDWARE IMPLEMENTATION OF SECURE AODV FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    S. Sharmila

    2010-12-01

    Full Text Available Wireless Sensor Networks are extremely vulnerable to any kind of routing attacks due to several factors such as wireless transmission and resource-constrained nodes. In this respect, securing the packets is of great importance when designing the infrastructure and protocols of sensor networks. This paper describes the hardware architecture of secure routing for wireless sensor networks. The routing path is selected using Ad-hoc on demand distance vector routing protocol (AODV. The data packets are converted into digest using hash functions. The functionality of the proposed method is modeled using Verilog HDL in MODELSIM simulator and the performance is compared with various target devices. The results show that the data packets are secured and defend against the routing attacks with minimum energy consumption.

  16. Multiple-Channel Security Architecture and its Implementation over SSL

    Directory of Open Access Journals (Sweden)

    Song Yong

    2006-01-01

    Full Text Available This paper presents multiple-channel SSL (MC-SSL, an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL enables applications to employ multiple channels, each with its own cipher suite and data-flow direction. Our approach also allows for several partially trusted application proxies. The main advantages of MC-SSL over SSL are (a support for end-to-end security in the presence of partially trusted proxies, and (b selective data protection for achieving computational efficiency important to resource-constrained clients and heavily loaded servers.

  17. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  18. The Systems Librarian: Implementing Wireless Networks without Compromising Security

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…

  19. Community Security and Justice under United Nations Governance: Lessons from Chiefs’ Courts in South Sudan’s Protection of Civilians Sites

    Directory of Open Access Journals (Sweden)

    Rachel Ibreck

    2017-12-01

    Full Text Available This article examines the public authority of chiefs’ courts within the United Nations Mission in South Sudan (UNMISS Protection of Civilians Sites (PoCs. After December 2013, UNMISS peacekeepers opened the gates of their bases to around 200,000 civilians fleeing war. This unintentionally created a legal and political anomaly. Over time, conflicts and crimes rose within the sites, and UNMISS improvised a form of administration. But while the internationals sought technical solutions, people displaced within the sites turned to familiar ‘customary’ methods to manage problems of insecurity, establishing chiefs’ courts. The PoC sites became an arena of plural authorities, with chiefs working alongside camp administrators, peacekeepers and humanitarian actors. We explore how and why the chiefs responded to insecurity within the sites and whether they engaged with, or diverged from United Nations actors and international norms. We demonstrate that justice remains central to the provision of security in contexts of war and displacement. International peace interventions are rightly wary of ‘customary’ justice processes that prioritise communities and families at the expense of individual rights, but this unique case shows that they are sources of trust and consistency that are resilient, adaptable and can contribute to human security.

  20. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  1. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

  2. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  3. Implementing Cyber Security Requirements and Mechanisms in Microgrids

    OpenAIRE

    Mohan , Apurva; Khurana , Himanshu

    2015-01-01

    Part 4: INFRASTRUCTURE SECURITY; International audience; A microgrid is a collection of distributed energy resources, storage and loads under common coordination and control that provides a single functional interface to enable its management as a single unit. Microgrids provide several advantages such as power quality control, uninterrupted power supply and integration of renewable resources. However, microgrids are increasingly connected to the Internet for remote control and management, wh...

  4. Balanced Scorecard: A Strategic Tool in Implementing Homeland Security Strategies

    OpenAIRE

    Caudle, Sharon

    2008-01-01

    This article appeared in Homeland Security Affairs (October 2008), v.4 no.3 Starting in the early 1990s, Robert S. Kaplan and David P. Norton advocated a 'balanced scorecard' translating an organization's mission and existing business strategy into specific strategic objectives that could be linked in cause and effect relationships and measured operationally. The balanced scorecard stressed drivers of future organizational performance -- capabilities, resources, and business processes -- a...

  5. 28 CFR Appendix D to Part 61 - Office of Justice Assistance, Research, and Statistics Procedures Relating to the Implementation...

    Science.gov (United States)

    2010-07-01

    ... Administrator, Law Enforcement Assistance Administration; the Director, Bureau of Justice Statistics; or the... environmental coordinator shall be designated in the Bureau of Justice Statistics, the Law Enforcement.... 1451, et seq.; and other environmental review laws and executive orders. 7. Actions planned by private...

  6. PCI compliance understand and implement effective PCI data security standard compliance

    CERN Document Server

    Williams, Branden R

    2012-01-01

    The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of

  7. Implementation of the Internet of Things on Public Security

    Science.gov (United States)

    Lu, Kesheng; Li, Xichun

    The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players. The public security as one of the key players is going to make real-time communications will be possible not only by humans but also by things at anytime and from anywhere. This research will present the advent of the Internet of Things to create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities.

  8. The externalisation of migration control in the European Union: first steps towards the external dimension of the space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ryabov Yuri

    2012-03-01

    Full Text Available The creation of an area of freedom, security and justice is one of the most rapidly developing aspects of European integration. It this paper, we take a look at the foreign policies involved in this process — aside from the internal development of the European Union, they concern a significant number of third countries, including Russia. In our view, the efforts to manage the flow of migrants and asylum seekers constitute a viable part of the external dimension within the AFSJ policies. Much of this article is based on the theoretical postulates introduced by the scholars of the Paris School, a school within the discipline of security studies that conceptualized the connection between migration, terrorism, asylum, crime and ethnic clashes, and its role as a major threat facing the European Union. Externalization of this complex threat (that is, externalization in relation to the European Union is thus seen as one of the key prerequisites to advancement of migration management activities beyond the EU (i. e. externalization of migration management. In this article, we analyze the role the EU plays at the international scene and categorize the actions it took to manage the influx of migrants and asylum seekers from the 1980s until the time when supranational administrative bodies were granted mandates in the spheres of Justice and Home Affairs (JHA of the EU Member States. We conclude that it was as early as the 1990-s that the EU launched the policy which later allowed to transfer part of its security concerns to third countries.

  9. Transitional Justice

    DEFF Research Database (Denmark)

    Gissel, Line Engbo

    This presentation builds on an earlier published article, 'Contemporary Transitional Justice: Normalising a Politics of Exception'. It argues that the field of transitional justice has undergone a shift in conceptualisation and hence practice. Transitional justice is presently understood to be th...... to be the provision of ordinary criminal justice in contexts of exceptional political transition.......This presentation builds on an earlier published article, 'Contemporary Transitional Justice: Normalising a Politics of Exception'. It argues that the field of transitional justice has undergone a shift in conceptualisation and hence practice. Transitional justice is presently understood...

  10. METHOD FOR SECURITY SPECIFICATION SOFTWARE REQUIREMENTS AS A MEANS FOR IMPLEMENTING A SOFTWARE DEVELOPMENT PROCESS SECURE - MERSEC

    Directory of Open Access Journals (Sweden)

    Castro Mecías, L.T.

    2015-06-01

    Full Text Available Often security incidents that have the object or use the software as a means of causing serious damage and legal, economic consequences, etc. Results of a survey by Kaspersky Lab reflectvulnerabilities in software are the main cause of security incidents in enterprises, the report shows that 85% of them have reported security incidents and vulnerabilities in software are the main reason is further estimated that incidents can cause significant losses estimated from 50,000 to $ 649.000. (1 In this regard academic and industry research focuses on proposals based on reducing vulnerabilities and failures of technology, with a positive influence on how the software is developed. A development process for improved safety practices and should include activities from the initial phases of the software; so that security needs are identified, manage risk and appropriate measures are implemented. This article discusses a method of analysis, acquisition and requirements specification of the software safety analysis on the basis of various proposals and deficiencies identified from participant observation in software development teams. Experiments performed using the proposed yields positive results regarding the reduction of security vulnerabilities and compliance with the safety objectives of the software.

  11. The tension between cross-border cooperation in the European Area of Freedom, Security and Justice and the fundamental rights of mentally ill offenders in detention.

    Science.gov (United States)

    Meysman, Michaël

    2016-01-01

    In two recent judgements, the European Court of Human Rights (ECtHR) has given an alarming signal regarding the placement, care and treatment of mentally disordered offenders in Belgium. This article analyses these judgements and the Court's assessment that Belgium faces a structural problem regarding the detention of people with a mental illness in prison. By exploring other recent ECtHR decisions across the EU and combining this with an analysis of international norms and standards, it contends that there is something amiss regarding the post-trial approach towards mentally disordered offenders in an EU-wide context. The potential hazards of this situation, from both an individual and an EU perspective are then presented by analysing the EU Framework Decision on the transfer of prisoners (which aims to facilitate offender rehabilitation) and the EU Court of Justice's interpretation of the relationship between instruments like the Framework Decision that are based on mutual recognition and fundamental rights. Lastly, the EU's initiative for enhancing procedural rights in criminal proceedings through the Roadmap trajectory, and the subsequent Commission Recommendation of 27 November 2013, are scrutinized. Based on this research, the article pinpoints the flaws and vacuums that currently exist for mentally disordered offenders, and the negative outcome this may have on the legitimacy and effectiveness of the European Area of Freedom, Security and Justice. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Science implementation of Forecast Mekong for food and environmental security

    Science.gov (United States)

    Turnipseed, D. Phil

    2012-01-01

    Forecast Mekong is a significant international thrust under the Delta Research and Global Observation Network (DRAGON) of the U.S. Geological Survey (USGS) and was launched in 2009 by the U.S. Department of State and the Foreign Ministers of Cambodia, Laos, Thailand, and Vietnam under U.S. Department of State Secretary Hillary R. Clinton's Lower Mekong Initiative to enhance U.S. engagement with countries of the Lower Mekong River Basin in the areas of environment, health, education, and infrastructure. Since 2009, the USGS has worked closely with the U.S. Department of State; personnel from Cambodia, Laos, Thailand, and Vietnam; nongovernmental organizations; and academia to collect and use research and data from the Lower Mekong River Basin to provide hands-on results that will help decisionmakers in future planning and design for restoration, conservation, and management efforts in the Lower Mekong River Basin. In 2012 Forecast Mekong is highlighting the increasing cooperation between the United States and Lower Mekong River Basin countries in the areas of food and environmental security. Under the DRAGON, Forecast Mekong continues work in interactive data integration, modeling, and visualization system by initiating three-dimensional bathymetry and river flow data along with a pilot study of fish distribution, population, and migratory patterns in the Lower Mekong River Basin. When fully developed by the USGS, in partnership with local governments and universities throughout the Mekong River region, Forecast Mekong will provide valuable planning tools to visualize the consequences of climate change and river management.

  13. Implementation of Safety and Security Issues in the Transport of Radioactive Material in Argentina

    International Nuclear Information System (INIS)

    López Vietri, J.; Elechosa, C.; Gerez Miranda, C.; Menossi, S.; Rodríguez Roldán, M.S.; Fernández, A.

    2016-01-01

    This paper is intended to describe implementation of safety and security issues in the transport of radioactive material by the Nuclear Regulatory Authority (in Spanish Autoridad Regulatoria Nuclear, ARN), which is the Competent Authority of Argentina in Safety, Security and Safeguards of radioactive and nuclear material. There are depicted main regulatory activities dealing with the mentioned issues, and relevant milestones of national regulatory standards and guidance applied, that are based on requirements and guides from IAEA. Interfaces between Safety and Security sections are most of the times complementary but sometimes conflictive, therefore the resolution of such conflicts and goals achieved during their implementation are also commented; as well as future joint planned activities between both sections of ARN as a way to provide safety and security without compromising one or the other. (author)

  14. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, Ahmad Salah; Jung, Jaecheon [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2016-10-15

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity.

  15. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    International Nuclear Information System (INIS)

    Ibrahim, Ahmad Salah; Jung, Jaecheon

    2016-01-01

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity

  16. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  17. On the implementation of a deterministic secure coding protocol using polarization entangled photons

    OpenAIRE

    Ostermeyer, Martin; Walenta, Nino

    2007-01-01

    We demonstrate a prototype-implementation of deterministic information encoding for quantum key distribution (QKD) following the ping-pong coding protocol [K. Bostroem, T. Felbinger, Phys. Rev. Lett. 89 (2002) 187902-1]. Due to the deterministic nature of this protocol the need for post-processing the key is distinctly reduced compared to non-deterministic protocols. In the course of our implementation we analyze the practicability of the protocol and discuss some security aspects of informat...

  18. Symmetry in Social Construction during ERP Implementation: A Systems Security Perspective

    Directory of Open Access Journals (Sweden)

    Kennedy Njenga

    2014-03-01

    Full Text Available The principle of symmetry in enterprise resource planning (ERP systems implementation holds that the researcher should deploy impartial explanation in cases of success as in cases of failure. This article examines the symmetry intrinsic in social construction within the various stages of the ERP development life cycle, from initiation to implementation. Discourse on symmetry focuses on whether social constructs are able to influence ERP implementation positively (success or negatively (failure and whether this exposes ERP systems to information security risk. The theoretical lens of social construction of technology (SCOT theory, a theory premised on social interaction between agents and technology artefacts, is applied for this purpose. The research was quantitative with a survey having been conducted on information technology (IT and information security (IS practitioners. Results of the study highlight the significant role social construction plays because of the direct linkage it has with the implementation of information security controls in ERP systems.  The research delineated five social constructs, namely positional influence, reward influence, coercive influence, expert influence and referent influence. For purposes of this research and on the sampling criteria applied, the construct ‘expert influence’, a typology of social construction, is shown to be more domineering than other typologies of social construction and is seen as providing symmetrical balance between governing ERP security (success and risk (failure. Implications of these results for theory and practice are discussed in the main article.

  19. A study on the barriers of the implementation of social security act in ...

    African Journals Online (AJOL)

    In this study, an analytical review was done on the historical process and contexts of welfare system and social security in order to analyze and evaluate the main features of this act especially in the area of medical services. It was also attempted to study the executive barriers of the appropriate implementation of social ...

  20. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  1. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  2. University Students' Perceptions of Social Justice: The Impact of Implementing a Summer Camp for Children with Disabilities

    Science.gov (United States)

    Jefferson, Ruth E.; Grant, Christina E.; Rye, Lindsay; Bassette, Laura A.; Stuve, Matt; Heneisen, Ryan

    2018-01-01

    University students who experience real-world service tend to develop a more inclusive world view and enhanced understandings outside of their personal perspectives. This project combined course objectives, community collaboration, and service provision to identify the impact of students' understanding of social justice and disability access…

  3. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Science.gov (United States)

    2011-07-06

    ... the Terrorist Screening Database System of Records relates to official DHS national security and law... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 [Docket No. DHS-2011-0060] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--030 Use of the...

  4. Equal Access to Justice Act Payments

    Data.gov (United States)

    Social Security Administration — A dataset containing payment amounts made by the Social Security Administration for court-approved Equal Access to Justice Act (EAJA) payments for fiscal year 2010...

  5. The implementation of the situational control concept of information security in automated training systems

    Directory of Open Access Journals (Sweden)

    A. M. Chernih

    2016-01-01

    Full Text Available The main approaches to ensuring security of information in the automated training systems are considered, need of application of situational management of security of information for the automated training systems is proved, the mathematical model and a problem definition of situational control is offered, the technique of situational control of security of information is developed.The purpose of the study. The aim of the study is to base the application of situational control of information security by subsystem of the control and protection of information in automated learning systems and to develop implementation methods of the situational control concept.Materials and methods. It is assumed that the automated learning system is a fragment of a larger information system that contains several information paths, each of them treats different information in the protection degree from information, containing constituting state secrets, to open access information.It is considered that the technical methods, measures and means of information protection in automated learning systems implement less than half (30% functions of subsystems of control and protection information. The main part of the functions of this subsystem are organizational measures to protect information. It is obvious that the task of ensuring the security of information in automated learning systems associated with the adoption of decisions on rational selection and proper combination of technical methods and institutional arrangements. Conditions of practical application of automated learning systems change over time and transform the situation of such a decision, and this leads to the use of situational control methods.When situational control is implementing, task of the protection of information in automated learning system is solved by the subsystem control and protection of information by distributing the processes ensuring the security of information and resources of

  6. Trading Justice for Security? UN Anti-Terrorism, Due Process Rights, and the Role of the Judiciary: Lessons for policymakers

    OpenAIRE

    Draghici, Carmen

    2009-01-01

    The purpose of this policy paper is to highlight the role\\ud of the judiciary in reconciling counter-terrorism strategies\\ud with human rights standards. Indeed, judicial assent\\ud to the excesses of policy-makers risks deepening the\\ud human rights crisis caused by the fight against apocalyptic\\ud terrorism. In the aftermath of the September 11, 2001\\ud terrorist attacks against the United States, the political\\ud climate has been dominated by security concerns. The\\ud United States has invo...

  7. Design and Implementation of Wiki Services in a Multilevel Secure Environment

    National Research Council Canada - National Science Library

    Ong, Kar L

    2007-01-01

    The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...

  8. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  9. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide

    International Nuclear Information System (INIS)

    2012-01-01

    severe consequences, depending upon the nature and quantity of the specific material involved, the mode of dispersal (violent or non-violent), the location and the population impacted. Implementing nuclear security systems and measures is, therefore, of paramount importance. This Implementing Guide may be useful to the organizers of major public events. It represents a sound basis, drawn from experience, for raising awareness about nuclear security systems and the measures to be applied for such events.

  10. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    severe consequences, depending upon the nature and quantity of the specific material involved, the mode of dispersal (violent or non-violent), the location and the population impacted. Implementing nuclear security systems and measures is, therefore, of paramount importance. This Implementing Guide may be useful to the organizers of major public events. It represents a sound basis, drawn from experience, for raising awareness about nuclear security systems and the measures to be applied for such events

  11. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  12. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  13. Tailoring NIST Security Controls for the Ground System: Selection and Implementation -- Recommendations for Information System Owners

    Science.gov (United States)

    Takamura, Eduardo; Mangum, Kevin

    2016-01-01

    . Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).

  14. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  15. Implementing Climate-Compatible Development in the Context of Power: Lessons for Encouraging Procedural Justice through Community-Based Projects

    Directory of Open Access Journals (Sweden)

    Benjamin T. Wood

    2018-05-01

    Full Text Available Climate-compatible development (CCD is being operationalised across the developing world through projects that integrate development, adaptation and mitigation using community-based approaches—community-based CCD (CB-CCD. By incorporating and considering local people’s concerns, these projects are positioned as more effective, efficient and sustainable than ‘top-down’ climate and development solutions. However, the literature pays little attention to whether and how these projects achieve procedural justice by recognising local people’s identities, cultures and values; and providing local people with meaningful participatory opportunities. We address this gap through an analysis of two donor-funded CB-CCD projects in Malawi, drawing on household surveys, semi-structured interviews and documentary materials. Our findings show that the projects had only limited success in facilitating procedural justice for the target populations. Households’ meaningful engagement in project activities and decision-making was often curtailed because power asymmetries went unchallenged. While many households were well engaged in projects, the recognition and participation of others—including many of the most vulnerable households—was limited. Building on our findings, we present a six-step approach to help CB-CCD project staff understand, manage and challenge power asymmetries; and create widespread recognition of, and meaningful participatory opportunities for, local people.

  16. Organizational Justice

    Science.gov (United States)

    Burns, Travis

    2013-01-01

    Helping principals understand the importance of organizational justice is the first step in enhancing learning outcomes for all learners, regardless of their social class, race, abilities, sex, or gender. In schools, organizational justice may be defined as teachers' perceptions of fairness, respect, and equity that relate to their interactions…

  17. Justice Globalism

    NARCIS (Netherlands)

    Wilson, Erin; Steger, Manfred; Siracusa, Joseph; Battersby, Paul

    2014-01-01

    The pursuit of a global order founded on universal rules extends beyond economics into the normative spheres of law, politics and justice. Justice globalists claim universal principles applicable to all societies irrespective of religion or ideology. This view privileges human rights, democracy and

  18. Gendered Justice Gaps in Bosnia-Herzegovina

    DEFF Research Database (Denmark)

    Björkdahl, Annika; Mannergren Selimovic, Johanna

    2014-01-01

    , and reparations gaps-this article examines structural constraints for women to engage in shaping and implementing transitional justice, and unmasks transitional justice as a site for the long-term construction of the gendered post-conflict order. Thus, the gendered dynamics of peacebuilding and transitional...... justice have produced a post-conflict order characterized by gendered peace and justice gaps. Yet, we conclude that women are doing justice within the Bosnian-Herzegovina transitional justice project, and that their presence and participation is complex, multilayered, and constrained yet critical....

  19. Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

    Directory of Open Access Journals (Sweden)

    Khaing Mar Htwe

    2015-07-01

    Full Text Available Abstract The main goal of this system is to design a locker security system using RFID and Fingerprint. In this system only authenticated person can open the door. A security system is implemented containing door locking system using passive type of RFID which can activate authenticate and validate the user and unlock the door in real time for secure access. The advantage of using passive RFID is that it functions without a battery and passive tags are lighter and are less expensive than the active tags. This system consists of fingerprint reader microcontroller RFID reader and PC. The RFID reader reads the id number from passive. The fingerprint sensor will check incoming image with enrolled data and it will send confirming signal for C program. If both RFID check and fingerprint image confirmation are matched the microcontroller will drive door motor according to sensors at door edges. This system is more secure than other systems because two codes protection method used.

  20. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    Directory of Open Access Journals (Sweden)

    Li Xiong

    Full Text Available In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  1. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    Science.gov (United States)

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  2. Software Implementation of Secure Firmware Update in IoT Concept

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2017-01-01

    Full Text Available This paper focuses on a survey of secure firmware update in the Internet of Things, design and description of safe and secure bootloader implementation on RFID UHF reader, encryption with AES-CCM and versioning with use of external backup flash memory device. In the case of problems with HW compatibility or other unexpected errors with new FW version, it is possible to downgrade to previous FW image, including the factory image. Authentication is provided by the UHF RFID service tag used to extract unique initialization vector of the encryption algorithm for each update session. The results show slower update speed with this new upgrade method of approximately 27% compared to older one, using the only AES-CBC algorithm.

  3. Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network

    Science.gov (United States)

    Malasri, Kriangsiri; Wang, Lan

    2009-01-01

    A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility. PMID:22454585

  4. Security in the transport of radioactive material: Implementing guide. Spanish edition

    International Nuclear Information System (INIS)

    2013-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks

  5. Security in the Transport of Radioactive Material. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  6. Security in the Transport of Radioactive Material. Implementing Guide (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  7. Implementing Information Security Management System as a part of business processes : Where to gain competitive advantage for ISMS?

    OpenAIRE

    Flyktman, Jari

    2016-01-01

    The Idea and background to the study subject lies in the interest in security, leadership and organizational development. The research question was how to provide best practices to fit these all together in harmony. The objective was to help small and medium sized organizations to understand the multifaceted nature of cybersecurity and requirements for successful implementation of information security management system (ISMS). ISMS help companies to form the needed security structures in pra...

  8. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-08-23

    ... regulations to exempt portions of a Department of Homeland Security/United States Citizenship and Immigration system of records entitled the ``United States Citizenship and Immigration Services--009 Compliance... of 1974: Implementation of Exemptions; Department of Homeland Security/United States Citizenship and...

  9. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  10. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  11. 75 FR 5491 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... addressing privacy concerns. The fifteen- year retention period will allow CBP to access the data when needed... security, law enforcement and counterterrorism missions, while addressing privacy concerns. Legal or...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs and Border...

  12. Risk Informed Approach for Nuclear Security Measures for Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to States for developing a risk informed approach and for conducting threat and risk assessments as the basis for the design and implementation of sustainable nuclear security systems and measures for prevention of, detection of, and response to criminal and intentional unauthorised acts involving nuclear and other radioactive material out of regulatory control. It describes concepts and methodologies for a risk informed approach, including identification and assessment of threats, targets, and potential consequences; threat and risk assessment methodologies, and the use of risk informed approaches as the basis for informing the development and implementation of nuclear security systems and measures. The publication is an Implementing Guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, law enforcement agencies and experts from competent authorities and other relevant organizations involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures related to nuclear and other radioactive material out of regulatory control

  13. Design, implementation and security of a typical educational laboratory computer network

    Directory of Open Access Journals (Sweden)

    Martin Pokorný

    2013-01-01

    Full Text Available Computer network used for laboratory training and for different types of network and security experiments represents a special environment where hazardous activities take place, which may not affect any production system or network. It is common that students need to have administrator privileges in this case which makes the overall security and maintenance of such a network a difficult task. We present our solution which has proved its usability for more than three years. First of all, four user requirements on the laboratory network are defined (access to educational network devices, to laboratory services, to the Internet, and administrator privileges of the end hosts, and four essential security rules are stipulated (enforceable end host security, controlled network access, level of network access according to the user privilege level, and rules for hazardous experiments, which protect the rest of the laboratory infrastructure as well as the outer university network and the Internet. The main part of the paper is dedicated to a design and implementation of these usability and security rules. We present a physical diagram of a typical laboratory network based on multiple circuits connecting end hosts to different networks, and a layout of rack devices. After that, a topological diagram of the network is described which is based on different VLANs and port-based access control using the IEEE 802.1x/EAP-TLS/RADIUS authentication to achieve defined level of network access. In the second part of the paper, the latest innovation of our network is presented that covers a transition to the system virtualization at the end host devices – inspiration came from a similar solution deployed at the Department of Telecommunications at Brno University of Technology. This improvement enables a greater flexibility in the end hosts maintenance and a simultaneous network access to the educational devices as well as to the Internet. In the end, a vision of a

  14. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  15. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

    Directory of Open Access Journals (Sweden)

    Mario E. Cueva Hurtado

    2017-02-01

    Full Text Available Security in the application layer (SSL, provides the confidentiality, integrity, and authenticity of the data, between two applications that communicate with each other. This article is the result of having implemented Free SSL / TLS Certificates in application servers, determining the relevant characteristics that must have a SSL/TLS certificate, the Certifying Authority generate it. A vulnerability analysis is developed in application servers and encrypted communications channel is established to protect against attacks such as man in the middle, phishing and maintaining the integrity of information that is transmitted between the client and server.

  16. Implementation guidance for industrial-level security systems using radio frequency alarm links

    Energy Technology Data Exchange (ETDEWEB)

    Swank, R.G.

    1996-07-12

    Spread spectrum (SS) RF transmission technologies have properties that make the transmitted signal difficult to intercept, interpret, and jam. The digital code used in the modulation process results in a signal that has high reception reliability and supports multiple use of frequency bands and selective addressing. These attributes and the relatively low installation cost of RF systems make SSRF technologies candidate for communications links in security systems used for industrial sites, remote locations, and where trenching or other disturbances of soil or structures may not be desirable or may be costly. This guide provides a description of such a system and presents implementation methods that may be of engineering benefit.

  17. PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance

    CERN Document Server

    Chuvakin, Anton

    2010-01-01

    Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant?. Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the curre

  18. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC) Level...

  19. Juvenile Justice

    OpenAIRE

    International Child Development Centre

    1998-01-01

    The third Innocenti Digest deals with the main issues connected with children and young people coming into conflict with the law and contact with the justice system. It looks at standards and problems from arrest through to the court hearing and sentencing, use of custodial measures and ways of avoiding the child’s unnecessary and counter-productive involvement with the formal justice system. It also covers prevention questions. Like previous publications in the series, it contains practical ...

  20. Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    Nuclear material accounting and control (NMAC) works in a complementary fashion with the international safeguards programme and physical protection systems to help prevent, deter or detect the unauthorized acquisition and use of nuclear materials. These three methodologies are employed by Member States to defend against external threats, internal threats and both state actors and non-state actors. This publication offers guidance for implementing NMAC measures for nuclear security at the nuclear facility level. It focuses on measures to mitigate the risk posed by insider threats and describes elements of a programme that can be implemented at a nuclear facility in coordination with the physical protection system for the purpose of deterring and detecting unauthorized removal of nuclear material

  1. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  2. Super-Encryption Implementation Using Monoalphabetic Algorithm and XOR Algorithm for Data Security

    Science.gov (United States)

    Rachmawati, Dian; Andri Budiman, Mohammad; Aulia, Indra

    2018-03-01

    The exchange of data that occurs offline and online is very vulnerable to the threat of data theft. In general, cryptography is a science and art to maintain data secrecy. An encryption is a cryptography algorithm in which data is transformed into cipher text, which is something that is unreadable and meaningless so it cannot be read or understood by other parties. In super-encryption, two or more encryption algorithms are combined to make it more secure. In this work, Monoalphabetic algorithm and XOR algorithm are combined to form a super- encryption. Monoalphabetic algorithm works by changing a particular letter into a new letter based on existing keywords while the XOR algorithm works by using logic operation XOR Since Monoalphabetic algorithm is a classical cryptographic algorithm and XOR algorithm is a modern cryptographic algorithm, this scheme is expected to be both easy-to-implement and more secure. The combination of the two algorithms is capable of securing the data and restoring it back to its original form (plaintext), so the data integrity is still ensured.

  3. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    International Nuclear Information System (INIS)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca; Martin, Anthony; Zbinden, Hugo; Houlmann, Raphael; Lim, Charles Ci Wen

    2016-01-01

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find that DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.

  4. [Child protection network and the intersector implementation of the circle of security as alternatives to medication].

    Science.gov (United States)

    Becker, Ana Laura Martins M M; de Souza, Paulo Haddad; de Oliveira, Mônica Martins; Paraguay, Nestor Luiz Bruzzi B

    2014-09-01

    To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child. Copyright © 2014 Sociedade de Pediatria de São Paulo. Publicado por Elsevier Editora Ltda. All rights reserved.

  5. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part

  6. 6 CFR 11.13 - Referrals to the Department of Justice.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Referrals to the Department of Justice. 11.13 Section 11.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.13 Referrals to the Department of Justice. Referrals of debts to the Department of Justice for collection will...

  7. Health Law as Social Justice.

    Science.gov (United States)

    Wiley, Lindsay F

    2014-01-01

    Health law is in the midst of a dramatic transformation. From a relatively narrow discipline focused on regulating relationships among individual patients, health care providers, and third-party payers, it is expanding into a far broader field with a burgeoning commitment to access to health care and assurance of healthy living conditions as matters of social justice. Through a series of incremental reform efforts stretching back decades before the Affordable Care Act and encompassing public health law as well as the law of health care financing and delivery, reducing health disparities has become a central focus of American health law and policy. This Article labels, describes, and furthers a nascent "health justice" movement by examining what it means to view health law as an instrument of social justice. Drawing on the experiences of the reproductive justice, environmental justice, and food justice movements, and on the writings of political philosophers and ethicists on health justice, I propose that health justice offers an alternative to the market competition and patient rights paradigms that currently dominate health law scholarship, advocacy, and reform. I then examine the role of law in reducing health disparities through the health justice lens. I argue that the nascent health justice framework suggests three commitments for the use of law to reduce health disparities. First, to a broader inquiry that views access to health care as one among many social determinants of health deserving of public attention and resources. Second, to probing inquiry into the effects of class, racial, and other forms of social and cultural bias on the design and implementation of measures to reduce health disparities. And third, to collective action grounded in community engagement and participatory parity. In exploring these commitments, I highlight tensions within the social justice framework and between the social justice framework and the nascent health justice movement

  8. AES Cardless Automatic Teller Machine (ATM) Biometric Security System Design Using FPGA Implementation

    Science.gov (United States)

    Ahmad, Nabihah; Rifen, A. Aminurdin M.; Helmy Abd Wahab, Mohd

    2016-11-01

    Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.

  9. Hardware implementation of adaptive filtering using charge-coupled devices. [For perimeter security sensors

    Energy Technology Data Exchange (ETDEWEB)

    Donohoe, G.W.

    1977-01-01

    Sandia Laboratories' Digital Systems Division/1734, as part of its work on the Base and Installation Security Systems (BISS) program has been making use of adaptive digital filters to improve the signal-to-noise ratio of perimeter sensor signals. In particular, the Widrow-Hoff least-mean-squares algorithm has been used extensively. This non-recursive linear predictor has been successful in extracting aperiodic signals from periodic noise. The adaptive filter generates a predictor signal which is subtracted from the input signal to produce an error signal. The value of this error is fed back to the filter to improve the quality of the next prediction. Implementation of the Widrow adaptive filter using a Charge-Coupled Device tapped analog delay line, analog voltage multipliers and operational amplifiers is described. The resulting filter adapts to signals with frequency components as high as several megahertz.

  10. Global health justice and governance.

    Science.gov (United States)

    Ruger, Jennifer Prah

    2012-01-01

    While there is a growing body of work on moral issues and global governance in the fields of global justice and international relations, little work has connected principles of global health justice with those of global health governance for a theory of global health. Such a theory would enable analysis and evaluation of the current global health system and would ethically and empirically ground proposals for reforming it to more closely align with moral values. Global health governance has been framed as an issue of national security, human security, human rights, and global public goods. The global health governance literature is essentially untethered to a theorized framework to illuminate or evaluate governance. This article ties global health justice and ethics to principles for governing the global health realm, developing a theoretical framework for global and domestic institutions and actors.

  11. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... of the Executive Order, ``Classified National Security Information'' Memorandum for the Heads of... Security Information'' (the ``order''), which substantially advances my goals for reforming the security... classified information shall provide the Director of the Information Security Oversight Office (ISOO) a copy...

  12. Water Justice

    NARCIS (Netherlands)

    Boelens, R.A.; Perreault, T.; Vos, J.M.C.

    2018-01-01

    Water justice is becoming an ever-more pressing issue in times of increasing water-based inequalities and discrimination. Megacities, mining, forestry, industry and agribusiness claim an increasingly large share of available surface and groundwater reserves. Water grabbing and pollution generate

  13. Jeksternalizacija migracionnogo kontrolja v Evropejskom sojuze: pervye shagi po formirovaniju vneshnepoliticheskogo izmerenija prostranstva svobody, bezopasnosti i pravosudija [The externalisation of migration control in the European Union: first steps towards the external dimension of the space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ryabov Yury

    2012-01-01

    Full Text Available The creation of an area of freedom, security and justice is one of the most rapidly developing aspects of European integration. It this paper, we take a look at the foreign policies involved in this process — aside from the internal development of the European Union, they concern a significant number of third countries, including Russia. In our view, the efforts to manage the flow of migrants and asylum seekers constitute a viable part of the external dimension within the AFSJ policies. Much of this article is based on the theoretical postulates introduced by the scholars of the Paris School, a school within the discipline of security studies that conceptualized the connection between migration, terrorism, asylum, crime and ethnic clashes, and its role as a major threat facing the European Union. Externalization of this complex threat (that is, externalization in relation to the European Union is thus seen as one of the key prerequisites to advancement of migration management activities beyond the EU (i. e. externalization of migration management. In this article, we analyze the role the EU plays at the international scene and categorize the actions it took to manage the influx of migrants and asylum seekers from the 1980s until the time when supranational administrative bodies were granted mandates in the spheres of Justice and Home Affairs (JHA of the EU Member States. We conclude that it was as early as the 1990-s that th

  14. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2013-01-01

    Nuclear terrorism and the illicit trafficking of nuclear and other radioactive material threaten the security of all States. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The possibility that nuclear and other radioactive material may be used for terrorist acts cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material, and to establish capabilities for detection and response to nuclear and other radioactive material out of regulatory control. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This approach recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in nuclear and other radioactive material; national response plans; and contingency measures. Within its nuclear security programme, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking; and to detect and respond to nuclear security events. This is an Implementing Guide on nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control. The objective of the publication is to provide guidance to Member States for the

  15. Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection

    Science.gov (United States)

    Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang

    Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.

  16. Security for the digital information age of medicine: Issues, applications, and implementation

    OpenAIRE

    Epstein, Michael A.; Pasieka, Michael S.; Lord, William P.; Mankovich, Nicholas J.

    1997-01-01

    Privacy and integrity of medical records is expected by patients. This privacy and integrity is often mandated by regulations. Traditionally, the security of medical records has been based on physical lock and key. As the storage of patient record information shifts from paper to digital, we find new security concerns. Digital cryptographic methods provide solutions to many of these new concerns. In this paper we discuss the new security concerns, new legislation mandating secure medical reco...

  17. Urban land acquisition and social justice in Ethiopia

    African Journals Online (AJOL)

    Keywords: access to land, land lease, social justice, tenure security, urban land policy. I. INTRODUCTION ... As Mattew Robinson put it correctly, social justice embraces virtues including “share of common humanity .... But such tenure security will not, by its own, reduce poverty and bring about sustainable development.10.

  18. Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

    Directory of Open Access Journals (Sweden)

    Imen Bouabidi

    2017-01-01

    Full Text Available To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation and are interested specifically in only one layer. Consequently, the originality of this work consists to combine together the two features using a crossing between three layers: physical layer, data link layer and network layer. Our proposition consists firstly in developing a new network deployment in hierarchical areas. This model takes place at the network layer. Secondly, implementing an energy efficient and secure MAC protocol providing a secure authentication, data privacy and integrity in a mobile WSN. Finally, implementing an intrusion detection system protecting the physical layer from malware and viruses that threaten it. We have been used OMNet++ for simulation .Our proposed protocol SXMachiavel offered the best performances and more reliability at the mobility rate (can reach 99% compared with XMachiavel, which doesn’t exceed 35%, loss packets rate (0.05% for a small network size and energy consumption (decreases by 0.01% for each exchanged packet.

  19. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Science.gov (United States)

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  20. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... questions and privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0034] Privacy Act of 1974: Implementation of Exemptions...: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security...

  1. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  2. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    DEFF Research Database (Denmark)

    Gehring, Tobias; Haendchen, Vitus; Duhme, Joerg

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State......-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our...... with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components....

  3. Retributive and restorative justice.

    Science.gov (United States)

    Wenzel, Michael; Okimoto, Tyler G; Feather, Norman T; Platow, Michael J

    2008-10-01

    The emergence of restorative justice as an alternative model to Western, court-based criminal justice may have important implications for the psychology of justice. It is proposed that two different notions of justice affect responses to rule-breaking: restorative and retributive justice. Retributive justice essentially refers to the repair of justice through unilateral imposition of punishment, whereas restorative justice means the repair of justice through reaffirming a shared value-consensus in a bilateral process. Among the symbolic implications of transgressions, concerns about status and power are primarily related to retributive justice and concerns about shared values are primarily related to restorative justice. At the core of these processes, however, lies the parties' construal of their identity relation, specifically whether or not respondents perceive to share an identity with the offender. The specific case of intergroup transgressions is discussed, as are implications for future research on restoring a sense of justice after rule-breaking.

  4. Design and Implementation of Corporate Actions on a Decentralized Securities Depository

    OpenAIRE

    Hedin, Jonas

    2017-01-01

    Trading securities is a process that requires multiple trusted intermediaries to ensure that the trade is done correctly. The securities industry is therefore very slow and expensive; the central securities depository (CSD) being one of the main contributors to the disruption. In an effort to fix this, financial institutions has recently started looking into the blockchain technology; the innovation behind the cryptocurrency Bitcoin. Bitcoin is a digital currency that can be traded peer-to-pe...

  5. An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.

    2018-03-01

    MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.

  6. Design and implementation of a secure workflow system based on PKI/PMI

    Science.gov (United States)

    Yan, Kai; Jiang, Chao-hui

    2013-03-01

    As the traditional workflow system in privilege management has the following weaknesses: low privilege management efficiency, overburdened for administrator, lack of trust authority etc. A secure workflow model based on PKI/PMI is proposed after studying security requirements of the workflow systems in-depth. This model can achieve static and dynamic authorization after verifying user's ID through PKC and validating user's privilege information by using AC in workflow system. Practice shows that this system can meet the security requirements of WfMS. Moreover, it can not only improve system security, but also ensures integrity, confidentiality, availability and non-repudiation of the data in the system.

  7. Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

    Directory of Open Access Journals (Sweden)

    Hongsong Chen

    2015-01-01

    Full Text Available Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system. Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system.

  8. Restorative Justice: Principles, Practices, and Application

    Science.gov (United States)

    O'Brien, Sandra Pavelka

    2007-01-01

    A modern-day movement is transforming the way that communities and justice systems think about and respond to crime and wrongful occurrences. This response implements a holistic continuum of services, providing for prevention, intervention, diversion, commitment, probation, reentry, and aftercare. This approach--known as restorative justice--seeks…

  9. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  10. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-10-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  11. Role and participation of women in the establishment and implementation of international security policies

    Directory of Open Access Journals (Sweden)

    Marigonë Vrajolli

    2018-03-01

    The purpose of this paper is to explain the different roles that women have in creating security policies. Further, this paper explains the role of women in initiatives, peacekeeping and peace-building. The paper also explains the international mechanisms that promote the involvement of women in peace and security processes.

  12. 76 FR 34616 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/National...

    Science.gov (United States)

    2011-06-14

    ... business practices. Information will be submitted to DHS/NPPD through the Chemical Security Assessment Tool... programs. DHS/ TSA/TTAC will compare the information of affected individuals collected by DHS (via CSAT) to... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses...

  13. Implementation of a security system in the radiotherapy process; Implantacion de un sistema de seguridad en el proceso radioterapico

    Energy Technology Data Exchange (ETDEWEB)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-07-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  14. Tailoring ISO/IEC 27001 for SMEs: A Guide to Implement an Information Security Management System in Small Settings

    Science.gov (United States)

    Valdevit, Thierry; Mayer, Nicolas; Barafort, Béatrix

    While Information Security Management Systems (ISMS) are being adopted by the biggest IT companies, it remains quite difficult for smaller entities to implement and maintain all the requirements of ISO/IEC 27001. In order to increase information security in Luxembourg, the Public Research Centre Henri Tudor has been charged by the Luxembourg Ministry of Economy and Foreign Trade to find solutions to facilitate ISMS deployment for SMEs. After an initial experiment aiming at assisting a SME in getting the first national ISO/IEC 27001 certification for a private company, an implementation guide for deploying an ISMS, validated by local experts and experimented in SMEs, has been released and is presented in this paper.

  15. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  16. The study and implementation of the wireless network data security model

    Science.gov (United States)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  17. Experience of the pilot implementation of the european information sharing and alerting system in the field of information security

    Directory of Open Access Journals (Sweden)

    Anatoly A. Malyuk

    2018-03-01

    Full Text Available The formation of a global information society poses a particular challenge to the development of an information security culture. In the Doctrine of Information Security of the Russian Federation, adopted in December 2016, one of the main threats is the low awareness of citizens in matters of ensuring personal information security. One of the most important mechanisms for increasing competence and forming an in-formation security culture, in addition to mass training of people, are methods of propaganda and creation of "hot lines". They allow the general public to take the initiative in monitoring and reporting computer incidents. The development of such approaches should be carried out taking into account the international experience accumulated today. To this end, the article examines the European experience of creating a system of information and advisory assistance in the field of preventing threats to the security of public and corporate information systems, primarily information and telecommunications networks, as well as eliminating the consequences of threats in the information sphere. The analysis of the experience of implementing the pilot project of the European Information Sharing and Alert System has revealed the advisability of designing such systems on the basis of a management model with four players that unites network operators, information producers (who are IT product suppliers or IT security specialists; local information intermediaries and consumers of information. As a model of the information flow, a node can be selected that runs a local web portal that provides information to end users, generates new information, adapts information to the constraints of various distribution channels, and to the characteristics of end-user target groups. The methodology of the pilot project can be used in the design and deployment of a notification and information exchange system aimed at end-users of several regions or countries

  18. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide (Arabic Edition)

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to Member States for the development, or improvement of nuclear security systems and measures for the detection of criminal or unauthorized acts with nuclear security implications involving nuclear and other radioactive material out of regulatory control. It describes the elements of an effective nuclear security detection architecture which is composed of an integrated set of nuclear security systems and measures, and is based on an appropriate legal and regulatory framework for the implementation of the national detection strategy. The publication is an implementing guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, legislative bodies, competent authorities, institutions, and individuals involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control

  19. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  20. Mathematics education for social justice

    Science.gov (United States)

    Suhendra

    2016-02-01

    Mathematics often perceived as a difficult subject with many students failing to understand why they learn mathematics. This situation has been further aggravated by the teaching and learning processes used, which is mechanistic without considering students' needs. The learning of mathematics tends to be just a compulsory subject, in which all students have to attend its classes. Social justice framework facilitates individuals or groups as a whole and provides equitable approaches to achieving equitable outcomes by recognising disadvantage. Applying social justice principles in educational context is related to how the teachers treat their students, dictates that all students the right to equal treatment regardless of their background and completed with applying social justice issues integrated with the content of the subject in order to internalise the principles of social justice simultaneously the concepts of the subject. The study examined the usefulness of implementing the social justice framework as a means of improving the quality of mathematics teaching in Indonesia involved four teacher-participants and their mathematics classes. The study used action research as the research methodology in which the teachers implemented and evaluated their use of social justice framework in their teaching. The data were collected using multiple research methods while analysis and interpretation of the data were carried out throughout the study. The findings of the study indicated that there were a number of challengesrelated to the implementation of the social justice framework. The findings also indicated that, the teachers were provided with a comprehensive guide that they could draw on to make decisions about how they could improve their lessons. The interactions among students and between the teachers and the students improved, they became more involved in teaching and learning process. Using social justice framework helped the teachers to make mathematics more

  1. Implementation of Abuja II Accord and Post-Conflict Security in Liberia

    National Research Council Canada - National Science Library

    Ikomi, Emmanuel O

    2007-01-01

    In this thesis, the author shows that ECOWAS and the international community, in a bid to secure an end to Liberia's intractable civil war, acceded to a power-sharing arrangement among the warlords...

  2. Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    OpenAIRE

    Luhach, Ashish Kr.; Dwivedi, Sanjay K; Jha, C K

    2014-01-01

    Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the emin...

  3. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  4. Sanitary justice in scarcity

    Directory of Open Access Journals (Sweden)

    Miguel Kottow

    Full Text Available Justice in health care and the allocation of scarce medical resources must be analyzed differently in affluent as compared to economically weaker societies. The protective functions of the state must be extended to cover basic needs for those too poor to meet them on their own. Medical needs are a high priority, since poor health hampers the ability to secure other basic needs. The state may operate as either a health care provider or supervisor, guaranteeing that citizens be treated fairly by nongovernmental institutions. Two-tiered systems with a vigorous private health care sector are compatible with the explicit right to health care, provided the private tier operates without directly or indirectly draining public funds.

  5. Design and implementation of modular home security system with short messaging system

    Directory of Open Access Journals (Sweden)

    Budijono Santoso

    2014-03-01

    Full Text Available Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile mobile device using SMS (Short Messaging System and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  6. The design and implementation of web mining in web sites security

    Science.gov (United States)

    Li, Jian; Zhang, Guo-Yin; Gu, Guo-Chang; Li, Jian-Li

    2003-06-01

    The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information, so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.

  7. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    Science.gov (United States)

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  8. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    Directory of Open Access Journals (Sweden)

    Leandro Marin

    2015-08-01

    Full Text Available The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  9. Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication

    Science.gov (United States)

    Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn

    2014-11-01

    Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.

  10. 6 CFR 13.40 - Stays ordered by the Department of Justice.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Stays ordered by the Department of Justice. 13.40 Section 13.40 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.40 Stays ordered by the Department of Justice. If at any time the Attorney...

  11. Systematic implementation of spectral CT with a photon counting detector for liquid security inspection

    Science.gov (United States)

    Xu, Xiaofei; Xing, Yuxiang; Wang, Sen; Zhang, Li

    2018-06-01

    X-ray liquid security inspection system plays an important role in homeland security, while the conventional dual-energy CT (DECT) system may have a big deviation in extracting the atomic number and the electron density of materials in various conditions. Photon counting detectors (PCDs) have the capability of discriminating the incident photons of different energy. The technique becomes more and more mature in nowadays. In this work, we explore the performance of a multi-energy CT imaging system with a PCD for liquid security inspection in material discrimination. We used a maximum-likelihood (ML) decomposition method with scatter correction based on a cross-energy response model (CERM) for PCDs so that to improve the accuracy of atomic number and electronic density imaging. Experimental study was carried to examine the effectiveness and robustness of the proposed system. Our results show that the concentration of different solutions in physical phantoms can be reconstructed accurately, which could improve the material identification compared to current available dual-energy liquid security inspection systems. The CERM-base decomposition and reconstruction method can be easily used to different applications such as medical diagnosis.

  12. 76 FR 44452 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Science.gov (United States)

    2011-07-26

    ..., including 5 U.S.C. 552a(c)(3), which entitles individuals to an accounting of disclosures of their records... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who...

  13. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-09-29

    ...)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the... recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also...

  14. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... preamble, DHS amends Chapter I of Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF...

  15. 75 FR 9085 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Immigration...

    Science.gov (United States)

    2010-03-01

    ... subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could... information. Disclosure of the accounting would therefore present a serious impediment to ICE's Visa Security... individuals under certain circumstances, such as where the access or disclosure of such information would...

  16. 77 FR 1387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/Federal...

    Science.gov (United States)

    2012-01-10

    ... request is made, for the following reasons: (a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual... national security. Disclosure of the accounting would also permit the individual who is the subject of a...

  17. 76 FR 42005 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The...

  18. Collective Security Treaty Organization: Origins of the Multidimensional Mandate and Modern Means for its Implementation

    Directory of Open Access Journals (Sweden)

    Golub K.

    2018-03-01

    Full Text Available This article examines the historically contradictory development of the Collective Security Treaty Organization (CSTO following its 15th anniversary, and evaluates its political potential from the point of view of its assigned mandate. The evolution of international stability at the beginning of the century forced the contracting parties of the CSTO to formalize their mainly declarative interactions through the creation of a valid regional security organization. This new collective security forum enriched the cooperation mandate by establishing additional areas for mutual coordination including counterterrorism activities, measures to combat illegal migration and drug trafficking, strategies to respond to natural disasters and cybersecurity. The creation of the multitasking Collective Rapid Reaction Forces was the first significant step on the way to the practical realization of the CSTO. The Collective Security Strategy for the period ending in 2025 organizes the CSTO instruments of international cooperation within the CSTO crisis management framework and thus works to reduce the fragmentary nature of the CSTO. Despite the availability of the Collective Rapid Reaction Forces and the Collective Peace-Keeping Forces, the CSTO’s crisis management approach gives priority to political approaches and negotiation. Consequently, the multifunctional mandate of the CSTO predetermines its strategic role in Eurasia and allows it to achieve its political goals related to conservation of the common military and strategic area, the creation of a constraining effect, the facilitation of cooperation among law enforcement and intelligence agencies and the ability to contribute to the settlement of regional and local conflicts.

  19. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and

  20. GUI implementation of image encryption and decryption using Open CV-Python script on secured TFTP protocol

    Science.gov (United States)

    Reddy, K. Rasool; Rao, Ch. Madhava

    2018-04-01

    Currently safety is one of the primary concerns in the transmission of images due to increasing the use of images within the industrial applications. So it's necessary to secure the image facts from unauthorized individuals. There are various strategies are investigated to secure the facts. In that encryption is certainly one of maximum distinguished method. This paper gives a sophisticated Rijndael (AES) algorithm to shield the facts from unauthorized humans. Here Exponential Key Change (EKE) concept is also introduced to exchange the key between client and server. The things are exchange in a network among client and server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded servers to transfer the data and also provide protection to the data if protection capabilities are integrated. In this paper, implementing a GUI environment for image encryption and decryption. All these experiments carried out on Linux environment the usage of Open CV-Python script.

  1. Analysis of factors that inhibiting implementation of Information Security Management System (ISMS) based on ISO 27001

    Science.gov (United States)

    Tatiara, R.; Fajar, A. N.; Siregar, B.; Gunawan, W.

    2018-03-01

    The purpose of this research is to determine multi factors that inhibiting the implementation of the ISMS based on ISO 2700. It is also to propose a follow-up recommendation on the factors that inhibit the implementation of the ISMS. Data collection is derived from questionnaires to 182 respondents from users in data center operation (DCO) at bca, Indonesian telecommunication international (telin), and data centre division at Indonesian Ministry of Health. We analysing data collection with multiple linear regression analysis and paired t-test. The results are multiple factors which inhibiting the implementation of the ISMS from the three organizations which has implement and operate the ISMS, ISMS documentation management, and continual improvement. From this research, we concluded that the processes of implementation in ISMS is the necessity of the role of all parties in succeeding the implementation of the ISMS continuously.

  2. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  3. Implementation of a RPS Cyber Security Test-bed with Two PLCs

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Hanseong; An, Yongkyu; Rizwan, Uddin

    2015-01-01

    Our research team proposed the methodology to evaluate cyber security with Bayesian network (BN) as a cyber security evaluation model and help operator, licensee, licensor or regulator in granting evaluation priorities. The methodology allowed for overall evaluation of cyber security by considering architectural aspect of facility and management aspect of cyber security at the same time. In order to emphasize reality of this model by inserting true data, it is necessary to conduct a penetration test that pretends an actual cyber-attack. Through the collaboration with University of Illinois at Urbana-Champaign, which possesses the Tricon a safety programmable logic controller (PLC) used at nuclear power plants and develops a test-bed for nuclear power plant, a test-bed for reactor protection system (RPS) is being developed with the PLCs. Two PLCs are used to construct a simple test-bed for RPS, bi-stable processor (BP) and coincidence processor (CP). By using two PLCs, it is possible to examine cyber-attack against devices such as PLC, cyber-attack against communication between devices, and the effects of a PLC on the other PLC. Two PLCs were used to construct a test-bed for penetration test in this study. Advantages of using two or more PLCs instead of single PLC are as follows. 1) Results of cyber-attack reflecting characteristics among PLCs can be obtained. 2) Cyber-attack can be attempted using a method of attacking communication between PLCs. True data obtained can be applied to existing cyber security evaluation model to emphasize reality of the model

  4. Implementation of a RPS Cyber Security Test-bed with Two PLCs

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of); An, Yongkyu; Rizwan, Uddin [University of Illinois at Urbana-Champaign, Urbana (United States)

    2015-10-15

    Our research team proposed the methodology to evaluate cyber security with Bayesian network (BN) as a cyber security evaluation model and help operator, licensee, licensor or regulator in granting evaluation priorities. The methodology allowed for overall evaluation of cyber security by considering architectural aspect of facility and management aspect of cyber security at the same time. In order to emphasize reality of this model by inserting true data, it is necessary to conduct a penetration test that pretends an actual cyber-attack. Through the collaboration with University of Illinois at Urbana-Champaign, which possesses the Tricon a safety programmable logic controller (PLC) used at nuclear power plants and develops a test-bed for nuclear power plant, a test-bed for reactor protection system (RPS) is being developed with the PLCs. Two PLCs are used to construct a simple test-bed for RPS, bi-stable processor (BP) and coincidence processor (CP). By using two PLCs, it is possible to examine cyber-attack against devices such as PLC, cyber-attack against communication between devices, and the effects of a PLC on the other PLC. Two PLCs were used to construct a test-bed for penetration test in this study. Advantages of using two or more PLCs instead of single PLC are as follows. 1) Results of cyber-attack reflecting characteristics among PLCs can be obtained. 2) Cyber-attack can be attempted using a method of attacking communication between PLCs. True data obtained can be applied to existing cyber security evaluation model to emphasize reality of the model.

  5. Securing ad hoc wireless sensor networks under Byzantine attacks by implementing non-cryptographic method

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad Sofi

    2017-05-01

    Full Text Available Ad Hoc wireless sensor network (WSN is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.

  6. Implementation and Optimization of GPU-Based Static State Security Analysis in Power Systems

    Directory of Open Access Journals (Sweden)

    Yong Chen

    2017-01-01

    Full Text Available Static state security analysis (SSSA is one of the most important computations to check whether a power system is in normal and secure operating state. It is a challenge to satisfy real-time requirements with CPU-based concurrent methods due to the intensive computations. A sensitivity analysis-based method with Graphics processing unit (GPU is proposed for power systems, which can reduce calculation time by 40% compared to the execution on a 4-core CPU. The proposed method involves load flow analysis and sensitivity analysis. In load flow analysis, a multifrontal method for sparse LU factorization is explored on GPU through dynamic frontal task scheduling between CPU and GPU. The varying matrix operations during sensitivity analysis on GPU are highly optimized in this study. The results of performance evaluations show that the proposed GPU-based SSSA with optimized matrix operations can achieve a significant reduction in computation time.

  7. Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Jessica

    2018-03-01

    This study aims to combine the trithemus algorithm and double transposition cipher in file security that will be implemented to be an Android-based application. The parameters being examined are the real running time, and the complexity value. The type of file to be used is a file in PDF format. The overall result shows that the complexity of the two algorithms with duper encryption method is reported as Θ (n 2). However, the processing time required in the encryption process uses the Trithemius algorithm much faster than using the Double Transposition Cipher. With the length of plaintext and password linearly proportional to the processing time.

  8. Implementation and Utilization of Security Assistance: A Multi-Country Analysis

    Science.gov (United States)

    2015-09-01

    drug, prohibition or restriction of U.S. humanitarian assistance, severing of diplomatic relations, tax on U.S. assistance, recruitment or use of...and Myanmar /Burma (SIPRI, 2015), where no FMS or FMF engagement took place (DSCA, 2013). Indonesia, a key partner in maritime security and...were India, China, Algeria, Venezuela, Vietnam, Syria, Azerbaijan, Malaysia, Egypt Myanmar /Burma, Indonesia, Iran, UAE, Uganda, Iraq, and Turkey. The

  9. Controls-based approach for evaluation of information security standards implementation costs

    OpenAIRE

    OLIFER, Dmitrij; GORANIN, Nikolaj; KACENIAUSKAS, Arnas; CENYS, Antanas

    2017-01-01

    According to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomwar...

  10. Comparative study on economic security of enterprises depending on implemented business activities quantity

    OpenAIRE

    Shkarina Tatyana; Chudnova Olga; Mokhova Olga

    2017-01-01

    The results of a comparative study on economic security of enterprises depending on the quantity of business activities are published in the article. The sampling for analysis was conducted based on statistic data of Primorsky Region of the Russian Federation. The control points are the years of the most thorough data collection on the business activities of one-field and diversified enterprises: 2005, 2009, 2013, 2015.

  11. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  12. Hardware implementation of Lorenz circuit systems for secure chaotic communication applications.

    Science.gov (United States)

    Chen, Hsin-Chieh; Liau, Ben-Yi; Hou, Yi-You

    2013-02-18

    This paper presents the synchronization between the master and slave Lorenz chaotic systems by slide mode controller (SMC)-based technique. A proportional-integral (PI) switching surface is proposed to simplify the task of assigning the performance of the closed-loop error system in sliding mode. Then, extending the concept of equivalent control and using some basic electronic components, a secure communication system is constructed. Experimental results show the feasibility of synchronizing two Lorenz circuits via the proposed SMC. 

  13. The Case-Law of the Court of Justice of the European Communities Concerning the Law of the World Trade Organization and the Autonomy of the European Community in the Implementation of Its Common Commercial Policy

    Directory of Open Access Journals (Sweden)

    Miguel Ángel Cepillo Galvín

    2009-12-01

    Full Text Available In the last years some authors have questioned the autonomy of the European Community when implementing its commercial policy, due to the amount of trade agreements signed by it and especially because of the commitments acquired in the WTO. There is no doubt that the compulsory fulfilment of these commitments is a conditioning factor with regard to the implementation of the Common Commercial Policy, but that doesn’t make the autonomy of the EU disappear in order to put its model of commercial policy into practice. In this respect, it’s necessary to underline the ample discretionary margin in the management of the commercial policy that the Court of Justice of the European Communities recognizes in favour of the EU institutions within the framework of its case-law related to the denial of the direct effect of the WTO agreements, as we analyze in this paper.

  14. Promoting Human Rights and Justice from the Perspective of the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As the economic and political clout of new and emerging powers such as China, ... These tools will help guide IDRC's Governance, Security, and Justice ... of its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  15. Justice and medical ethics.

    Science.gov (United States)

    Gillon, R

    1985-07-20

    Justice, in the sense of fair adjudication between conflicting claims, is held to be relevant to a wide range of issues in medical ethics. Several differing concepts of justice are briefly described, including Aristotle's formal principle of justice, libertarian theories, utilitarian theories, Marxist theories, the theory of John Rawls, and the view--held, for example, by W.D. Ross--that justice is essentially a matter of reward for individual merit.

  16. Hardware Implementation of Lorenz Circuit Systems for Secure Chaotic Communication Applications

    Directory of Open Access Journals (Sweden)

    Yi-You Hou

    2013-02-01

    Full Text Available This paper presents the synchronization between the master and slave Lorenz chaotic systems by slide mode controller (SMC-based technique. A proportional-integral (PI switching surface is proposed to simplify the task of assigning the performance of the closed-loop error system in sliding mode. Then, extending the concept of equivalent control and using some basic electronic components, a secure communication system is constructed. Experimental results show the feasibility of synchronizing two Lorenz circuits via the proposed SMC.

  17. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  18. Implementation of safeguards and security for fissile materials disposition reactor alternative facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Duggan, R.A.; Tolk, K.M.

    1995-01-01

    A number of different disposition alternatives are being considered and include facilities which provide for long-ten-n and interim storage, convert and stabilize fissile materials for other disposition alternatives, immobilize fissile material in glass and/or ceramic material, fabricate fissile material into mixed oxide (MOX) fuel for reactors, use reactor based technologies to convert material into spent fuel, and dispose of fissile material using a number of geologic alternatives. Particular attention will be given to the reactor alternatives which include existing, partially completed, advanced or evolutionary LWRs and CANDU reactors. The various reactor alternatives are all very similar and include processing which converts Pu to a usable form for fuel fabrication, a MOX fuel fab facility located in either the US or in Europe, US LWRs or the CANDU reactors and ultimate disposal of spent fuel in a geologic repository. This paper focuses on how the objectives of reducing security risks and strengthening arms reduction and nonproliferation will be accomplished and the possible impacts of meeting these objectives on facility operations and design. Some of the areas in this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threat, and (4) potential proliferation risks, the impacts on the facilities, and safeguards and security issues unique to the presence of Category 1 or strategic special nuclear material

  19. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  20. From distributive to procedural justice. Justice as a constitutive value of public administration

    Directory of Open Access Journals (Sweden)

    Antonio SANDU

    2016-07-01

    Full Text Available The justice as an ethical value can be considered constitutive for contemporary administrative systems. These ones are asked to transpose into practice the ideal of justice in the community. The functioning of a modern state cannot be conceived without a series of institutions that would guarantee the achievement of justice. The legal system was established specifically to administer justice. Modern democratic systems felt the need for certain courts and extrajudicial procedures to create justice. The institutions required to implement the extrajudicial distribution of justice are part of the public administration, representing a central element of it. The model of a political system based on justice is a minimalist one; the role of the state is limited to making it possible for individuals to follow their own ideal of welfare. Opposed to justice, the ideal of welfare requests the state, and implicitly the administration, to ensure the individual the minimum conditions to live in that community. The minimal state centered on justice is the result of a modern paradigm with post-Kantian reverberations, which emphasize the rationality of human action. If the individual is rational, he only needs fair conditions in order to pursue his own welfare. The role of the administration is to ensure those conditions and to oversee the distribution of goods and services, as well as the distribution and redistribution of added value.

  1. Transitional Justice and Peacebuilding : International Center for ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Currently, the United Nations and other agencies advance a broad set of empirical claims concerning the power of transitional justice to promote peace in post-conflict situations. One of the most important is that prosecutions, reparations, official truth-telling, apologies, memorials and reform of abusive security institutions ...

  2. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  3. ECONOMIC EQUALITY OR JUSTICE

    Directory of Open Access Journals (Sweden)

    Ekrem Tufan

    2017-12-01

    Full Text Available From the beginning of economic life, equality has been a matter for human. Intrinsically human has two legs: Selfish and Groupish. Our selfish side does not care equality while Groupish side cares. What about the justice? Does human wants justice more than equalities in economic life? In this research, we have applied a questionnaire to find these two questions answer. As a result we can report that respondents prefer equality rather than justice in negative outcomes. On the other hand, they tend to prefer justice if there is possibility for positive outcomes. We cannot give evidence about gender, education and age differences effect on equality and justice preference.

  4. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0051] Privacy Act of 1974: Implementation of Exemptions... Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  5. 75 FR 69603 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Science.gov (United States)

    2010-11-15

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0085] Privacy Act of 1974: Implementation of Exemptions... Coordinating Center Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed...

  6. Distributive principles of economic justice: an Islamic perspective

    Directory of Open Access Journals (Sweden)

    Zakiyuddin Baidhawy

    2012-12-01

    Full Text Available Poverty and impoverishment in the world currently continue to increase as aresult of distributive justice systems and its principles that became the basis ofcontemporary economics did not succeed in allocating and distributing resourcesjustly. Based on this problem, this study aimed at describing the Islamic responseto the problem of distributive injustice, and how necessarily the state played arole in upholding distributive justice. Through the thematic-induction method andthe synthetic analysis, the study finds out several findings as follows. Firstly,Islam formulated three principles of distributive justice as follows: 1 the Distributionof natural and the environmental resources was in the framework of participation;2 the Redistribution of the wealth and the income were joint responsibilityof ascertaining social security, the increase in the capacity and the authorityfor them who were disadvantage; and 3 the Role of the state was certaintythat was complementary for the ethical market in order to guarantees the senseof justice and the achievement of public welfare. Secondly, according to Islam,the process of the redistribution of the wealth and the income aimed at givingsocial security on the fulfillment of basic needs for the poor; strove for the increasein the capacity through education and skills; and increased the poor’sbargaining position through their participation in decision making that was linkedwith their interests and the control on its implementation. Thirdly, the intention of establishing justice was to gain both individual and public welfare and the happiness(al-fala>h}.Kemiskinan dan pemiskinan di dunia kontemporer terus meningkat sebagai akibatsistem keadilan distributif dan prinsip-prinsipnya yang menjadi basis ekonomisaat ini tidak berhasil dalam mengalokasikan dan memeratakan sumber dayasecara adil. Berdasarkan masalah ini, kajian ini bertujuan untuk menjelaskanrespon Islam atas problem ketidakadilan distributif, dan

  7. Privacy in confidential administrative micro data: implementing statistical disclosure control in a secure computing environment.

    Science.gov (United States)

    Hochfellner, Daniela; Müller, Dana; Schmucker, Alexandra

    2014-12-01

    The demand for comprehensive and innovative data is constantly growing in social science. In particular, micro data from various social security agencies become more and more attractive. In contrast to survey data, administrative data offer a census with highly reliable information but are restricted in their usage. To make them accessible for researchers, data or research output either have to be anonymized or released after disclosure review procedures have been used. This article discusses the trade-off between maintaining a high capability of research potential while protecting private information, by exploiting the data disclosure portfolio and the adopted disclosure strategies of the Research Data Center of the German Federal Employment Agency. © The Author(s) 2014.

  8. CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK

    Directory of Open Access Journals (Sweden)

    V. S. Kolomoitcev

    2016-01-01

    Full Text Available We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls. The scheme is considered in view of the fact that the system has got common areas of removing threats in the channel for different means of protection. Parameters of average residence time of request in the system and its reliability were obtained for each variant of access scheme. Based on the results, comparison of the ways of design for access scheme was carried out between themselves and with the standard access scheme (with onefirewall. It was found out that design of access scheme with a single group of routers for the whole system has better performance and reliability than the other variants of "Direct Connection" access scheme.

  9. Implementing the millennium development food security goals Challenges of the southern African context

    Science.gov (United States)

    Love, David; Twomlow, Steve; Mupangwa, Walter; van der Zaag, Pieter; Gumbo, Bekithemba

    The Millennium Development Goals’ target to halve the proportion of people who suffer from hunger is extremely important in southern Africa, where food security has become increasingly problematic over the last 20 years. One “quick-win” proposal is replenishment of soil nutrients for smallholder farmers, through free or subsidised chemical fertilisers. Other proposals include appropriate irrigation technology, improved inputs and interventions targeted at women. Analysis of over 10 years of agro-hydrological and agro-economic studies from southern African show that a different approach is required to interventions proposed. There are sustainability problems with free chemical fertiliser due to transport costs and ancillary costs. Furthermore, recent studies in Zimbabwe and Mozambique show that significant increases in yield can only be obtained when soil fertility management is combined with good crop husbandry, e.g. timely planting and weeding. Ongoing replenishment of fertility would be dependent on a continued free or subsidised fertiliser supply, and transport system. Increasing access to irrigation will help, but is not the only solution and cannot reach even a majority of farmers. It has been determined that short dryspells are often the major cause of low yields in sub-Saharan Africa. Soil-water conservation approaches, e.g. winter weeding and conservation tillage, can reduce risk and increase yield. The following specific recommendations are made for urgent interventions to contribute sustainably to food security in southern Africa: (i) To increases access to fertiliser, consider development of strong input markets at end-user level. (ii) Intensification of technology transfer, focusing on capacity building for transfer of existing technologies and much closer collaboration between state and NGO sectors, agronomists and water engineers. (iii) Increasing the uptake of soil-water conservation methods, including conservation tillage and weeding, and

  10. The European Arrest Warrant in the Italian legal system. Between mutual recognition and mutual fear within the European area of Freedom, Security and Justice

    Directory of Open Access Journals (Sweden)

    Franco Impalà

    2005-12-01

    Full Text Available Italy was the last Member State to transpose the Framework Decision on the European Arrest Warrant. The Italian law entered into full force on 14 May 2005, a full sixteen months later than the appointed date. Conversely, whilst the Framework Decision aimed to speed up extradition between Member States, the Italian implementation law seems to complicate things, providing for dozens of new legal obstacles to surrender. In fact, the execution of an EAW in Italy threatens to become something highly unpredictable. The responsibility for this outcome is shared by the national and the European legislator. Perhaps the latter underestimated the seriousness of the conflict between Third Pillar law and domestic constitutional systems which aim to protect their acquis in the field of fundamental rights. Considering that many Member States seem to be struggling with similar problems, the first part of this article is devoted to describing the current scenario and analysing possible solutions at the supranational level, such as the establishment of a coherent system regulating the allocation of penal competences among Member States. In the next part, the problem of the Framework Decision’s incompatibility with the Italian Constitution will be discussed, and in the final part the Italian implementation law is analysed in more detail.

  11. Justice In Granting Remission For Corruption Prisoners A Review Of Indonesian Criminal Justice System

    Directory of Open Access Journals (Sweden)

    Mispansyah

    2015-08-01

    Full Text Available Abstract Prisoners are entitled to have a reduction in criminal past remission as stipulated in the Indonesian Criminal Justice System still being debated to this day. This research reviews the essence of the implementation of the substantive law in granting remission against inmate corruption cases from the perspective of public and individual interests. The type of research used in this paper is socio-legal research reviewing remission policy from the perspective of the criminal law system with philosophical and statute approach. The outcomes of the research indicate that the implementation of granting remission for corruption prisoners does not provide justice both procedural and substantive does not provide legal expediency and arising imbalance of justice for individuals communities and countries. The need to implement remissions with impartial justice for corruption prisoners in granting remission to be useful for individuals communities and countries.

  12. Relationships are building blocks to social justice: Cases of biblical justice and African Ubuntu

    Directory of Open Access Journals (Sweden)

    Selaelo T. Kgatla

    2016-10-01

    Full Text Available The entire Bible is full of themes calling humans to live justly with one another and fear God who is the author of justice. The first book of the Bible, Genesis, carries the story of God’s relationship with his people. Their relationship is bound by social justice and mutual love in reciprocity. This article argues that African Ubuntu has an affinity with the Bible’s message of justice and mutual caring for one another. Ubuntu presupposes that humans were created in God’s image and indicates that characteristics such as kindness, charity, equality, love of one’s neighbours and voluntarily dispensing justice to others are present in human life. God created humans to be bound to one another in caring love, coexistence and total dependence. In today’s world, social justice requires good judgement from those who are in privileged positions to implement it.

  13. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0003] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  14. A critical analysis of the implementation of social networking as an e-recruitment tool within a security enterprise

    Directory of Open Access Journals (Sweden)

    Anthony Lewis

    2015-12-01

    Full Text Available Many enterprises are operating in complex and competitive environments, and changes in the internal and external environment have prompted them to engage in better ways of doing business. In order to respond to these changes, and survive in today’s volatile business environment, enterprises need to change their strategies. Human Resource departments are under pressure to keep operating costs low whilst also ensuring they are attracting, recruiting, and retaining talent within the enterprise. To achieve this, an increasing number of enterprises have adopted social networking into their recruitment strategy. This research aims to critically analyze the implementation of social networking as an e-recruitment tool within a Security Enterprise. The research key objective is to examine the importance of attracting Generation Y through the use of social networking sites and also to develop an understanding of the advantages and disadvantages of using social networking as an e-recruitment tool. The research also looks at contemporary examples of enterprises that have implemented social networking into their recruitment strategy. A further objective of the research is to gain an understanding of the attitudes and perceptions of the use of social networking as an e-recruitment tool. To achieve this, the research has taken a mixed-methods approach whilst focusing on an interpretivist stance. Data was gathered through an interview with the HR Manager at the Security Enterprise and a questionnaire was distributed to 22 employees within the enterprise and 84 respondents on social networking sites. The overall attitudes and perceptions of respondents showed that social networking can be effectively used as an e-recruitment tool as long as a traditional recruitment method is also used.

  15. The design of a medical school social justice curriculum.

    Science.gov (United States)

    Coria, Alexandra; McKelvey, T Greg; Charlton, Paul; Woodworth, Michael; Lahey, Timothy

    2013-10-01

    The acquisition of skills to recognize and redress adverse social determinants of disease is an important component of undergraduate medical education. In this article, the authors justify and define "social justice curriculum" and then describe the medical school social justice curriculum designed by the multidisciplinary Social Justice Vertical Integration Group (SJVIG) at the Geisel School of Medicine at Dartmouth. The SJVIG addressed five goals: (1) to define core competencies in social justice education, (2) to identify key topics that a social justice curriculum should cover, (3) to assess social justice curricula at other institutions, (4) to catalog institutionally affiliated community outreach sites at which teaching could be paired with hands-on service work, and (5) to provide examples of the integration of social justice teaching into the core (i.e., basic science) curriculum. The SJVIG felt a social justice curriculum should cover the scope of health disparities, reasons to address health disparities, and means of addressing these disparities. The group recommended competency-based student evaluations and advocated assessing the impact of medical students' social justice work on communities. The group identified the use of class discussion of physicians' obligation to participate in social justice work as an educational tool, and they emphasized the importance of a mandatory, longitudinal, immersive, mentored community outreach practicum. Faculty and administrators are implementing these changes as part of an overall curriculum redesign (2012-2015). A well-designed medical school social justice curriculum should improve student recognition and rectification of adverse social determinants of disease.

  16. Juvenile Justice Paradigms and Improvement of Realization of the Constitutional Rights and Freedoms of Man and Citizen in Russiay

    OpenAIRE

    Arpentieva M. R.

    2015-01-01

    The article is devoted to the problems of implementation and procedures of reconstructing model of juvenile justice system, it considers foreign and domestic experience (problems) of juvenile justice. The author compares the doctrines of juvenile justice, including the doctrine of punitive and understanding justice.

  17. Juvenile Justice Paradigms and Improvement of Realization of the Constitutional Rights and Freedoms of Man and Citizen in Russiay

    Directory of Open Access Journals (Sweden)

    Arpentieva M. R.

    2015-07-01

    Full Text Available The article is devoted to the problems of implementation and procedures of reconstructing model of juvenile justice system, it considers foreign and domestic experience (problems of juvenile justice. The author compares the doctrines of juvenile justice, including the doctrine of punitive and understanding justice.

  18. Justice and Negotiation.

    Science.gov (United States)

    Druckman, Daniel; Wagner, Lynn M

    2016-01-01

    This review article examines the literature regarding the role played by principles of justice in negotiation. Laboratory experiments and high-stakes negotiations reveal that justice is a complex concept, both in relation to attaining just outcomes and to establishing just processes. We focus on how justice preferences guide the process and outcome of negotiated exchanges. Focusing primarily on the two types of principles that have received the most attention, distributive justice (outcomes of negotiation) and procedural justice (process of negotiation), we introduce the topic by reviewing the most relevant experimental and field or archival research on the roles played by these justice principles in negotiation. A discussion of the methods used in these studies precedes a review organized in terms of a framework that highlights the concept of negotiating stages. We also develop hypotheses based on the existing literature to point the way forward for further research on this topic.

  19. Contemporary Transitional Justice

    DEFF Research Database (Denmark)

    Gissel, Line Engbo

    2017-01-01

    This article studies the contemporary expression of transitional justice, a field of practice through which global governance is exercised. It argues that transitional justice is being normalised, given the normative and empirical de-legitimisation of its premise of exceptionalism. The article...... theorises exceptionalism and normalcy in transitional justice and identifies three macro-level causes of normalisation: the legalisation, internationalisation, and professionalization of the field. This argument is illustrated by a study of Uganda’s trajectory of transitional justice since 1986. Across five...... phases of transitional justice, processes of legalisation, internationalisation, and professionalization have contributed to the gradual dismantling of the country’s exceptional justice. The case demonstrates, further, that normalization is a contested and incomplete process....

  20. The implementation of nuclear security program and the improvement of physical protection in Indonesia: progress and challenges

    International Nuclear Information System (INIS)

    Khairul

    2009-01-01

    facilities. The nuclear material and its installation is potential target in the facilities so that they needed physical protection measures in prevention and protection of nuclear material and radioactive source against theft and sabotage. The implementation of physical protection of nuclear material and radioactive sources in Indonesia complied with the international instruments such as the Convention of the Physical Protection on Nuclear Material and Facilities, amended on July 2005, and INFCIRC/225/Rev. 4, (corrected), the physical protection of nuclear material and nuclear facilities, June 1999. The application of nuclear energy for power program generation involve in the management of nuclear materials and other radioactive substance. According to international regulation and convention, an effective physical protection system is needed to protect nuclear materials and its facilities against theft and sabotage for both non-proliferation and radiation safety purpose. Further to implementation of the IAEA nuclear security program in the region, Indonesia received two nuclear security services, IPPAS and INSServ mission. Based on the expert mission recommendation, therefore Indonesia improved their physical protection system on nuclear material and facilities against theft and sabotage. One thing that should be considered by the Government of Indonesia is human resource development programmes. So far, some effort has developed to enhance the knowledge of the employee who deals with nuclear material and radioactive substances. It still needed to increase the awareness in particular to personal and other related agencies as well. The Department of Energy's National Nuclear Security Administration discussed security assistance with Indonesia's National Nuclear Energy Agency, BATAN. These upgrades not only reduced the threat of theft at the three research reactors, but also provided local physical protection expertise to use during the concept, design, and operation of

  1. Psychology and criminal justice

    OpenAIRE

    Adler, Joanna R.

    2013-01-01

    This chapter is designed to give the reader a flavour of a few areas in which psychology has been applied to criminal justice. It begins by providing some historical context and showing the development of some applications of psychology to criminal justice. The chapter is broadly split into 3 sections: Pre Trial; Trial; and Post Trial. In most of this chapter, the areas considered assess how psychology has had an influence on the law and how psychologists work within criminal justice settings...

  2. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  3. An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security

    Science.gov (United States)

    Rachmawati, Dian; Andri Budiman, Mohammad; Saffiera, Cut Amalia

    2018-01-01

    In data transmission such as transferring an image, confidentiality, integrity, and efficiency of data storage aspects are highly needed. To maintain the confidentiality and integrity of data, one of the techniques used is ElGamal. The strength of this algorithm is found on the difficulty of calculating discrete logs in a large prime modulus. ElGamal belongs to the class of Asymmetric Key Algorithm and resulted in enlargement of the file size, therefore data compression is required. Elias Delta Code is one of the compression algorithms that use delta code table. The image was first compressed using Elias Delta Code Algorithm, then the result of the compression was encrypted by using ElGamal algorithm. Prime test was implemented using Agrawal Biswas Algorithm. The result showed that ElGamal method could maintain the confidentiality and integrity of data with MSE and PSNR values 0 and infinity. The Elias Delta Code method generated compression ratio and space-saving each with average values of 62.49%, and 37.51%.

  4. RESTORATIVE JUSTICE DALAM SISTEM PERADILAN PIDANA ANAK / Restorative Justice In Juvenile Justice System

    Directory of Open Access Journals (Sweden)

    Randy Pradityo

    2016-11-01

    Full Text Available Anak sebagai generasi penerus bangsa sudah selayaknya mendapatkan perhatian khusus. Hal tersebut bertujuan dalam rangka pembinaan anak untuk mewujudkan sumber daya manusia yang berkualitas. Maka dari itu, diperlukan pula sarana dan prasarana hukum yang mengantisipasi segala permasalahan yang timbul. Sarana hukum ini bertujuan untuk mengantisipasi stigma atau cap jahat yang ditimbulkan ketika anak berhadapan dengan hukum, sekaligus memulihkan dan memasyarakatkan kembali anak tersebut. Salah satu solusinya adalah dengan mengalihkan atau menempatkan pelaku tindak pidana anak keluar dari sistem peradilan pidana serta memberikan alternatif bagi penyelesaian dengan pendekatan keadilan demi kepentingan terbaik bagi anak, yang kemudian dikenal dengan pendekatan restorative justice. Restorative justice yang merupakan implementasi konsep dari diversi telah dirumuskan dalam sistem peradilan pidana anak, namun sistem yang baik haruslah diiringi dengan suatu sikap yang dijiwai kehendak untuk memandang dan berkeyakinan bahwa dunia ini selalu menjadi lebih baik. Selain itu, hendaknya prinsip the best interest of the children selalu diutamakan ketika menangani anak yang berhadapan dengan hukum.   Children as the nation's next generation is already deserve special attention. It aims in order to develop the child to realize the quality of human resources. Therefore, it is also necessary legal infrastructure to anticipate any problems that arise. The legal means to anticipate stigma or stamp evil inflicted when the child against the law, as well as restoring and re-socialize the child. One solution is to divert or placing the offender children out of the criminal justice system as well as providing an alternative to the settlement with justice approach in the best interests of the child, who was then known as restorative justice approach. Restorative justice which is the implementation of the concept of diversion has been formulated in the juvenile justice system

  5. An Examination of an Information Security Framework Implementation Based on Agile Values to Achieve Health Insurance Portability and Accountability Act Security Rule Compliance in an Academic Medical Center: The Thomas Jefferson University Case Study

    Science.gov (United States)

    Reis, David W.

    2012-01-01

    Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information…

  6. IMPLEMENTING THE ORGANIZATIONAL-ECONOMIC MECHANISM OF ENERGY SECURITY IN IVANO-FRANKIVSK

    Directory of Open Access Journals (Sweden)

    И. М. Мазур

    2014-04-01

    Full Text Available Purpose is to explore the practical experience of forming of organizationally economic mechanism to ensure energy safety based on principles of energy conservation and efficiency of fuel and energy resources use in Ivano-Francovsk city.Methodology includes мethods of synthesis, induction, deduction, analogy, wich used in the study.Results. The active policy of energy efficiency and conservation provides the increase of power safety of city's economy due to reduction of dependence on the consumption of separate types of non-renewable fuel and energy resources. The involvement of international organizations increased the possibility of financing the development and implementation of energy saving measures and improvement of the energy ensuring of the city.Conclusions. A number of organizational and economic problems to ensure power safety are solved by joining the «Agreement of Mayors on sustainable development and climate protection» and the development of Sustainable Energy Programme for 2013 - 2020 years, which includes measures to reduce carbon dioxide emissions by 20 % and local production and consumption of energy. However the efficiency of energy-saving measures and technologies of renewable energy by lowering the price of natural gas is significantly reduced, which leads to increase the payback period almost doubled. Therefore it is necessary to provide administrative and financial leverage to introduce energy-saving technologies: renewable energy in the construction of housing, financial sanctions for excessive fuel consumption and  energy and for production of energy-intensive equipment, environmental penalties for exceeding norms of greenhouse gases and others.Practical implications. The introduction of the mentioned incentives needs the development of the legislative and regulatory support and study the experience of the European countries in  their use.Purchase on Elibrary.ru > Buy now

  7. Electronic Data Exchange within European Justice: A Good Opportunity?

    Directory of Open Access Journals (Sweden)

    Nadia Carboni

    2012-12-01

    Full Text Available This paper analyses one of the most debated and controversial issues regarding the changes which are taking place in the Justice domain: the complexity of developing and implementing ITC systems that ‘actually work’, and doing so with a reasonable budget and in a reasonable time. While the number of studies on National experiences is slowly growing (see for example Fabri & Contini 2001, Fabri 2007, Contini & Lanzara 2009, Reiling 2012, filling an often-mentioned gap in justice sector literature, building on the European project e-CODEX case study, the authors point the attention to a somewhat new and unexplored phenomenon, the concrete attempt to build cross-border electronic data exchange within the European justice field. e-CODEX (e-Justice Communication via Online Data Exchange is the first European Large Scale Pilot in the domain of e-Justice. The project is carried out by 19 partners either being or representing their national ministries of justice of 15 European countries, plus the Council of Bars and Law Societies of Europe (CCBE, the Conseil des Notariats de l'Union Européenne (CNUE and the National Research Council of Italy (through two of its institutes - IRSIG-CNR and ITTIG-CNR. To provide a better grasp of the project scale, its overall budget is over 14 M euro and about 14 hundred person-months are committed to it. The project aims at improving cross-border access of citizens and businesses to legal means in Europe, as well as to improve the interoperability between legal authorities of different Member States. With a case based approach, e-CODEX is developing and will be soon implementing an interoperability layer to connect existing National Systems in order to provide cross border e-justice services. The project commitment includes running a live pilot in a ‘production environment’ for a duration of twelve months. The electronic services that have been so far selected are: European Payment Order (EPO, European Small

  8. The Nagoya Protocol – Justice in the Making?- Comment

    Directory of Open Access Journals (Sweden)

    Doris Schroeder

    2013-09-01

    Full Text Available Ratification of the Nagoya Protocol seems to be a long drawn out process for many parties to the Convention on Biological Diversity, delaying the Protocol's entering into force. This short paper suggests that four innovative elements of the Protocol may require time-consuming consideration prior to implementation: the Global Multilateral Benefit-Sharing Mechanism and the encouragement of Transboundary Co-operation; the reference to human pathogens, the reference to food security and affordable access to treatments and finally the demand to accommodate customary laws of indigenous peoples. At the same time, these four elements are essential to achieving global justice in access and benefit sharing regulations and therefore highly welcome.

  9. Relational Restorative Justice Pedagogy in Educator Professional Development

    Science.gov (United States)

    Vaandering, Dorothy

    2014-01-01

    What would a professional development experience rooted in the philosophy, principles, and practices of restorative justice look and feel like? This article describes how such a professional development project was designed to implement restorative justice principles and practices into schools in a proactive, relational and sustainable manner by…

  10. social justice in nigeria: the dialectics of ideas and reality

    African Journals Online (AJOL)

    This paper set out to critically look into the gap that has existed between ideas and reality in the realm of social justice in Nigeria. To realize this objective, the paper examined the dynamics of the Nigerian political economy and how this impinges on the practice and implementation of social justice. The paper subsequently ...

  11. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  12. Emancipatory Nursing Praxis: A Theory of Social Justice in Nursing.

    Science.gov (United States)

    Walter, Robin R

    Emancipatory nursing praxis (ENP) is a middle-range nursing theory of social justice developed from an international, grounded theory study of the critical factors influencing nurses' perceptions of their role in social justice. The ENPs implementing processes (becoming, awakening, engaging, and transforming) and 2 conditional contexts (relational and reflexive) provide an in-depth understanding of the transformative learning process that determines nurse engagement in social justice. Interpretive findings include the voice of Privilege primarily informed ENP theory, the lack of nursing educational and organizational support in social justice role development, and the advocate role should expand to include the role of an ally.

  13. Restorative justice and victimology

    African Journals Online (AJOL)

    The growth of restorative justice has sparked debate over the future of the criminal justice system, which has historically adopted a retributive, punitive philosophy and advocated for an individualistic, treatment-orientated approach. This approach has over time failed to address the needs of crime victims, communities and.

  14. Military Justice Study Guide

    Science.gov (United States)

    1990-07-01

    statute within the military system, persons unfamiliar with the military justice system may find the procedure something of a paradox at first blush...Manual for Courts-Martial) Is RM Nemitafinuestlitimelf.(er- V. GRAD*: c. ORGANIZATION dDT FRPR ast eiRO t: fII) EPR LCDR/ Naval Justice School

  15. Justice as Europe's Signifier

    NARCIS (Netherlands)

    Roy, Suryapratim; Kochenov, Dimitry; de Burca, Grainne; Williams, Andrew

    2015-01-01

    Drawing on the fact that justice is never explained in European legal discourse, but is used in conjunction with other principles and institutional decisions, this contribution argues that justice is used as a rhetorical tool to provide legitimacy to such principles and decisions. An analogous

  16. The notion and basic principles of restorative justice

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2007-01-01

    Full Text Available One of the most important achievements of the contemporary criminal justice system and criminal policy is development of the concept of restorative justice. Contemporary concept of restorative justice was developed in 1970s on the basis of the criticism of the traditional criminal law and criminal justice system. Since that time, it has been developing through different programs in many countries. Reform of the criminal justice system in Serbia staring from 2002 went into direction of entering elements of restorative justice into existing criminal justice system. In that sense, development of restorative justice is still at the beginning in our country. However, it can be noticed that there is a low level of awareness on the nature and importance of restorative forms of response to crime among our professionals, as well as a lack of understanding of the concept itself. Due to that, the aim of the paper is to enable better understanding of restorative concept in general through defining restorative justice and basic principles it relies on. That may put a basis for further recognition of restorative elements in our criminal justice system, which may provide adequate implementation of relevant provisions of restorative character in practice. .

  17. Restoring rape survivors: justice, advocacy, and a call to action.

    Science.gov (United States)

    Koss, Mary P

    2006-11-01

    Rape results in mental and physical health, social, and legal consequences. For the latter, restorative justice-based programs might augment community response, but they generate controversy among advocates and policy makers. This article identifies survivors' needs and existing community responses to them. Survivors feel their legal needs are most poorly met due to justice system problems that can be summarized as attrition, retraumatization, and disparate treatment across gender, class, and ethnic lines. Empirical data support each problem and the conclusion that present justice options are inadequate. The article concludes by identifying common ground in advocacy and restorative justice goals and calls for a holistic approach to the needs of rape survivors that includes advocating for expanded justice alternatives. A call to action is issued to implement restorative alternatives to expand survivor choice and offender accountability. Conventional and restorative justice are often viewed as mutually exclusive whereas the author argues they are complementary.

  18. Research Award: Governance, Security, and Justice

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    and marginalized groups have difficulty claiming their right to live in a safe and prosperous environment. ... Applicants should clearly outline their qualifications for this position, and explain how this opportunity will advance their career goals.

  19. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  20. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  1. Incorporating environmental justice into environmental decision making

    Energy Technology Data Exchange (ETDEWEB)

    Wolfe, A.K.; Vogt, D.P.; Hwang, Ho-Ling [Oak Ridge National Lab., TN (United States)] [and others

    1995-07-01

    Executive Order 12898, signed on February 11, 1994, broadly states that federal activities, programs, and policies should not produce disproportionately high and adverse impacts on minority and low-income populations. Moreover, the Order indicates that these populations should not be denied the benefits of, or excluded from participation in, these activities, programs, and policies. Because a presidential memorandum accompanying the order said that National Environmental Policy Act (NEPA) documents should begin to address environmental justice immediately, much attention has been paid to assessment-related issues. Also important, a topic that appears to have received relatively little attention, is how decision makers should be expected to use information about environmental justice in their decision making. This paper discusses issues surrounding the use of environmental justice information in the decision-making process by focusing on the following five main topics: (1) the importance, or weight, attached to environmental justice within larger decision-making contexts; (2) the potential tension between localized environmental justice issues and regional or national issues and needs; (3) the use of environmental justice information to develop (perhaps in concert with affected minority and low-income communities) appropriate mitigation strategies, or to establish conditions under which activities, programs, and policies may be accepted locally; (4) the general implications of shifting the distribution of broadly defined risks, costs, and benefits among different population groups; and (5) the implications of implementing environmental justice on an individual, ad hoc basis rather than within a larger environmental justice framework. This paper raises the issues and discusses the implications of alternative approaches to them.

  2. Informal Justice Systems: Charting a Course for Human Rights-Based Engagement

    DEFF Research Database (Denmark)

    Kerrigan, Fergus; McKay, Anne Louise; Kristiansen, Annali

    engagement with informal justice systems can build greater respect and protection for human rights. It highlights the considerations that development partners should have when assessing whether to implement programmes involving informal justice systems, the primary consideration being that engagement......Providing accessible justice is a state obligation under international human rights standards, but this obligation does not require that all justice be provided through formal justice systems. If done in ways to respect and uphold human rights, the provision of justice through informal justice...... systems is not against human rights standards and can be a mechanism to enhance the fulfilment of human rights obligations by delivering accessible justice to individuals and communities where the formal justice system does not have the capacity or geographical reach. This study seeks to identify how...

  3. Automation in airport security X-ray screening of cabin baggage: Examining benefits and possible implementations of automated explosives detection.

    Science.gov (United States)

    Hättenschwiler, Nicole; Sterchi, Yanik; Mendes, Marcia; Schwaninger, Adrian

    2018-10-01

    Bomb attacks on civil aviation make detecting improvised explosive devices and explosive material in passenger baggage a major concern. In the last few years, explosive detection systems for cabin baggage screening (EDSCB) have become available. Although used by a number of airports, most countries have not yet implemented these systems on a wide scale. We investigated the benefits of EDSCB with two different levels of automation currently being discussed by regulators and airport operators: automation as a diagnostic aid with an on-screen alarm resolution by the airport security officer (screener) or EDSCB with an automated decision by the machine. The two experiments reported here tested and compared both scenarios and a condition without automation as baseline. Participants were screeners at two international airports who differed in both years of work experience and familiarity with automation aids. Results showed that experienced screeners were good at detecting improvised explosive devices even without EDSCB. EDSCB increased only their detection of bare explosives. In contrast, screeners with less experience (tenure automated decision provided better human-machine detection performance than on-screen alarm resolution and no automation. This came at the cost of slightly higher false alarm rates on the human-machine system level, which would still be acceptable from an operational point of view. Results indicate that a wide-scale implementation of EDSCB would increase the detection of explosives in passenger bags and automated decision instead of automation as diagnostic aid with on screen alarm resolution should be considered. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  4. What Is "Policy" and What Is "Policy Response"? An Illustrative Study of the Implementation of the Leadership Standards for Social Justice in Scotland

    Science.gov (United States)

    Ward, S. C.; Bagley, C.; Lumby, J.; Hamilton, T.; Woods, P.; Roberts, A.

    2016-01-01

    This article examines "policy" and "policy response" through documentary analysis and an illustrative study of policy implementation. Our approach is informed by Foucault's (2009) theory that power relations in society are conditioned by a culturally generated set of ideas, and that these relations contain the space for both…

  5. Implementing Security Sector Reform

    National Research Council Canada - National Science Library

    Kramer, Franklin D; Gaffney, Jr., Henry H; Megahan, Richard; Dempsey, Thomas A

    2008-01-01

    .... Panel One: The Police and Law Enforcement Components of SSR, focused on the police component of SSR, identifying methodologies and strategies for police capacity building and exploring the linkages between law...

  6. Exploring barriers to effective youth curriculum implementation in the Trans-Orange Conference of the Seventh Day Adventist Church / Justice Mavanyisi Mongwe

    OpenAIRE

    Mongwe, Justice Mavanyisi

    2014-01-01

    This research sought to establish the hindrances/barriers to the effective implementation of the Adventist youth ministry curriculum in the congregations of the Trans-Orange Conference. The theological and Biblical foundations that underpin the church’s youth ministry and its curriculum ought to provide the church with a cutting edge in its youth ministry, and ought to assist tremendously in achieving the major twin goals of its youth ministry, i.e. salvation and service. Its detailed curricu...

  7. Mobilising for environmental justice in China

    OpenAIRE

    Balme, Richard

    2014-01-01

    This article assesses the situation of environmental rights in China in terms of political interactions and their implications for Chinese politics. Environmental justice is primarily conceived as equity in access to environmental goods and fairness in social processes dealing with market or government failures to provide environmental security. The argument is that environmental deterioration has a significant influence on the pattern of inequalities in the PRC, occasionally creating situati...

  8. Resistance, Justice, and Commitment to Change

    Science.gov (United States)

    Foster, Rex D.

    2010-01-01

    This research focused on individual responses to organizational change by exploring the relationships among individual resistance, organizational justice, and commitment to change following organizational change implementations in three organizations. To accomplish this, Web-based questionnaires were used to gather individual-level quantitative…

  9. Crippling Sexual Justice

    DEFF Research Database (Denmark)

    Stormhøj, Christel

    2015-01-01

    Exploring homosexuals' citizenship in Denmark from a justice perspective, this article critically interrogates society's supposed gay-friendliness by asking how far it has moved in achieving sexual justice, and inquiring into the gains and pains of the existing modes of achieving this end...... and representation within family law, civil society, and in the labour market. In conclusion, I suggest the possibility of different evaluations of the level of sexual justice reached, a mainly positive, partially negative one. Additionally, I discuss the gains and pains of the existing normalizing politics....

  10. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  11. 76 FR 60385 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2011-09-29

    ... for Disclosures) because release of the accounting of disclosures could alert the subject of an... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... ongoing law enforcement, national security or fraud investigation; to avoid disclosure of investigative...

  12. EUROPEAN UNION SUPPORT AND TRANSITIONAL JUSTICE PROCESSES IN KOSOVO

    Directory of Open Access Journals (Sweden)

    Remzije Istrefi

    2017-12-01

    Full Text Available The legacy of systematic human rights violations committed during 1999 violent conflict and the previous repressive rule still impact the everyday life of Kosovo citizens. That is why transitional justice processes are a necessary component in Kosovo’s state building efforts. With the end of the 1999 conflict, Kosovo has been administered by the United Nations Mission in Kosovo (UNMIK and also supported by European Union (EU presences: the EU Special Representative in Kosovo, and European Union Rule of Law Mission known as EULEX. In the course of implementation of their mandates transitional justice processes were not a priority for UNMIK and EU presences. With the signing of the Stabilization and Association Agreement (SAA the EU made transitional justice part of the Kosovo accession demands. In December 2015, the Government of Kosovo approved its National Action Plan for the Implementation of the Stabilization and Association Agreement (NAPISAA. The General Principles of the SAA, included within the NAPISAA oblige Kosovo Government to approve a National Transitional Justice Strategy. This paper analyses EU peace and institution-building support and their impact in transitional justice processes in Kosovo. Through analysing the mandate and actions on the ground it draws conclusions if EU is an active participant in transitional justice process in Kosovo or transitional justice policies are promoted by EU only as part of its enlargement strategy. Finally, the paper gives recommendations as a basis for future elaboration of an EU approach to transitional justice.

  13. Improving ward environments and developing skills for discharge with the implementation of self-catering on a low secure forensic unit.

    Science.gov (United States)

    O'Reilly, Alison

    2016-01-01

    The opportunities for service users to develop skills for more independent living and take control of their environments are limited in secure mental health units. This paper will outline a quality improvement project that changed how the catering services were delivered in a low secure unit in East London NHS Foundation Trust (ELFT). A Quality Improvement methodology was adopted incorporating the Plan, Do, Study, Act (PDSA) cycle which included the trial of service users preparing their own meals on a daily basis. The participation rates were measured and functional daily living skills were recorded. Following success of the trial, long-term implementation of self-catering was agreed, with service users being supported to prepare a shared evening meal every day on the ward with an average of 60% participation. Functional living skills indicated an improvement in the area of process skills. The project aligned with ELFT's aims of service users working in collaboration with staff to implement changes in service delivery.

  14. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    Science.gov (United States)

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  15. Nigeria; Publication of Financial Sector Assessment Program Documentation––Detailed Assessment of Implementation of IOSCO Objectives and Principles of Securities Regulation

    OpenAIRE

    International Monetary Fund

    2013-01-01

    An assessment of the level of implementation of the International Organization of Securities Commissions (IOSCO) Principles in Nigeria was conducted as part of the International Monetary Fund (IMF)-World Bank Financial Sector Assessment Program (FSAP). The ongoing global financial crisis has reinforced the need for assessors to make a judgment about supervisory practices and to determine whether they are sufficiently effective. The assessment methodology provides a set of assessment criteria ...

  16. Presentation of various types of electronic business available on the Internet, Advantages, Disadvantages, Key Requirements and Security, Implementation Model of an Electronic Business

    OpenAIRE

    Andreea A.S. Ionescu; Raul Serban

    2012-01-01

    This paper speaks about the advantages, disadvantages, key requirements necessary of an electronic business, the infrastructure of the Internet, the existing main networks on the Internet, standards used to develop electronic business and the security of an e-business environment. As we know in an organization the information is an asset that has value and should be protected and diversified. We also propose an implementation model of an electronic business that interconnects two concepts: ER...

  17. The Space for Restorative Justice in the Ethiopian Criminal Justice System

    Directory of Open Access Journals (Sweden)

    Endalew Lijalem Enyew

    2014-12-01

    Full Text Available Restorative Justice (RJ is an alternative way of apprehending crime and justice which views crime as a violation of a relationship among victims, offenders and community, and which allows the active participation of the crime’s stakeholders. It has the objective of ‘putting right’ the wrong done, to restore the broken relationship and to reintegrate the offender back into society. The Ethiopian criminal justice system views crime primarily as a violation of the state’s criminal laws, either in the form of a commission or omission. It excludes the community from participation, and gives no opportunity to the victim to fully participate in the process. Nor is there a satisfactory legal procedure which enables the public prosecutor to adequately protect the victim’s interest. The focus of the public prosecutor is to have the accused convicted and punished, instead of encouraging them to take responsibility to undo the wrong they have committed. This article thus examines whether restorative justice has a place in the formal legal framework of the existing Ethiopian criminal justice system; and analyses the prospects for, and the challenges that may hinder, the implementation of restorative justice practice in this framework.

  18. Environmental justice: a criminological perspective

    Science.gov (United States)

    Lynch, Michael J.; Stretesky, Paul B.; Long, Michael A.

    2015-08-01

    This article examines studies related to environmental justice in the criminological literature and from a criminological perspective. Criminologists have long been concerned with injustices in the criminal justice system related to the enforcement of criminal law. In the 1990s, following the emergence of green criminology, a handful of criminologists have drawn attention to environmental justice as an extension of more traditional criminological studies of justice and injustice. Relevant criminological studies of environmental justice are reviewed, and suggestions for future environmental justice research are offered.

  19. 75 FR 45151 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  20. Measuring Intergenerational Justice

    Directory of Open Access Journals (Sweden)

    Laurence J. Kotlikoff

    2017-12-01

    Full Text Available Concern with intergenerational justice has long been a focus of economics. This essay considers the effort, over the last three decades, to quantify generational fiscal burdens using label-free fiscal gap and generational accounting. It also points out that government debt -- the conventional metric for assessing generational fiscal justice,– has no grounding in economic theory. Instead, official debt is the result of economically arbitrary government labelling decisions: whether to call receipts “taxes” rather than “borrowing” and whether to call payments “transfer payments” rather than “debt service”. Via their choice of words, governments decide which obligations to put on, and which to keep off, the books. The essay also looks to the future of generational fiscal-justice analysis. Rapid computational advances are permitting economists to understand not just direct government intergenerational redistribution, but also how such policies impact the economy that future generations will inherit.

  1. Civilisation of Criminal Justice: Restorative Justice amongst other strategies

    NARCIS (Netherlands)

    J.R. Blad (John)

    2013-01-01

    markdownabstract__Abstract__ Is criminal justice becoming more and uncivilised if so, how could this be explained? Could Is criminal justice becoming more and uncivilised if so, how could this be explained? Could Is criminal justice becoming more and uncivilised if so, how could this be

  2. Special Justice for Peace: A Transitional Justice Model According to Modern Tendencies and Orientations of Law and Justice

    Directory of Open Access Journals (Sweden)

    Carlos Arturo Gómez Pavajeau

    2016-06-01

    Full Text Available The article analyses the constitutional implications of the peace agreement about Colombia’s armed conflict. It examines constitutional rules and international instruments about human rights, confronting the agreement with justice criteria in the national and international context, to underline the role of justice for the definitive solution of the conflict. By using the methodology of opposing concepts, it reviews the implications of formal justice and material justice, to establish the superiority of the last one and it’s relation with social justice; it analyses the differences between individual justice and global justice, to demonstrate the need to obtain an integral justice; it contrasts alternative justice and traditional justice, to propose an integrated justice; it explains that justice based upon the formal syllogism should be overcome by a justice based upon equity, to obtain a justice anchored in the Constitution, universal and concentrated in the human rights; it hypothesizes that justice supported in the atonement and retribution should be overcome by a justice that is preventive and restorative, that allows the construction of a justice focused in the future, without ignoring the past; it clarifies that justice with one jurisdiction and special justice are the components of a integrative transitional justice; it explains the presence of justice in different institutions with different functions and justice concentrated in one institution, although with different functions, because there is a search for an integrative justice; it exposes the search for a constitutional and political justice, discussing the vision of justice as a triumph of the force or the scandalous concession of benefits; it exalts that it is a justice in search of a positive discrimination, not a negative discrimination, overcoming the discussion between justice for the powerful and justice for the weak; finally, it considers that it is a justice

  3. Empowering Energy Justice

    Science.gov (United States)

    Finley-Brook, Mary; Holloman, Erica L.

    2016-01-01

    The U.S. is experiencing unprecedented movement away from coal and, to a lesser degree, oil. Burdened low-income communities and people of color could experience health benefits from reductions in air and water pollution, yet these same groups could suffer harm if transitions lack broad public input or if policies prioritize elite or corporate interests. This paper highlights how U.S. energy transitions build from, and contribute to, environmental injustices. Energy justice requires not only ending disproportionate harm, it also entails involvement in the design of solutions and fair distribution of benefits, such as green jobs and clean air. To what extent does the confluence of state, civic, and market processes assure “just” transitions to clean, low-carbon energy production involving equitable distribution of costs, benefits, and decision-making power? To explore this question we assess trends with (1) fossil fuel divestment; (2) carbon taxes and social cost of carbon measurements; (3) cap-and-trade; (4) renewable energy; and (5) energy efficiency. Current research demonstrates opportunities and pitfalls in each area with mixed or partial energy justice consequences, leading to our call for greater attention to the specifics of distributive justice, procedural justice, and recognition justice in research, policy, and action. Illustrative energy transition case studies suggest the feasibility and benefit of empowering approaches, but also indicate there can be conflict between “green” and “just”, as evident though stark inequities in clean energy initiatives. To identify positive pathways forward, we compile priorities for an energy justice research agenda based on interactive and participatory practices aligning advocacy, activism, and academics. PMID:27657101

  4. Empowering Energy Justice

    Directory of Open Access Journals (Sweden)

    Mary Finley-Brook

    2016-09-01

    Full Text Available The U.S. is experiencing unprecedented movement away from coal and, to a lesser degree, oil. Burdened low-income communities and people of color could experience health benefits from reductions in air and water pollution, yet these same groups could suffer harm if transitions lack broad public input or if policies prioritize elite or corporate interests. This paper highlights how U.S. energy transitions build from, and contribute to, environmental injustices. Energy justice requires not only ending disproportionate harm, it also entails involvement in the design of solutions and fair distribution of benefits, such as green jobs and clean air. To what extent does the confluence of state, civic, and market processes assure “just” transitions to clean, low-carbon energy production involving equitable distribution of costs, benefits, and decision-making power? To explore this question we assess trends with (1 fossil fuel divestment; (2 carbon taxes and social cost of carbon measurements; (3 cap-and-trade; (4 renewable energy; and (5 energy efficiency. Current research demonstrates opportunities and pitfalls in each area with mixed or partial energy justice consequences, leading to our call for greater attention to the specifics of distributive justice, procedural justice, and recognition justice in research, policy, and action. Illustrative energy transition case studies suggest the feasibility and benefit of empowering approaches, but also indicate there can be conflict between “green” and “just”, as evident though stark inequities in clean energy initiatives. To identify positive pathways forward, we compile priorities for an energy justice research agenda based on interactive and participatory practices aligning advocacy, activism, and academics.

  5. Juvenile Justice in Mexico

    Directory of Open Access Journals (Sweden)

    Martha Frías Armenta

    2014-08-01

    Full Text Available The first tribunal in Mexico was established in the central state of San Luis Potosi in 1926. The Law Regarding Social Prevention and Juvenile Delinquency for the Federal District and Mexican territories was promulgated in 1928. In 2005, Article 18 of the Mexican Constitution was modified to establish a comprehensive system (“Sistema Integral de justicia” in Spanish of justice for juveniles between 12 and 18 years old who had committed a crime punishable under criminal law. Its objective was to guarantee juveniles all the due process rights established for adults, in addition to the special ones recognized for minors. The constitutional reform also provides a framework that includes special tribunals as well as alternative justice options for juveniles. With these reforms, institutionalization of minors was to be considered an extreme measure applicable only to felonies and to juveniles older than 14. In 2006, all states within the Mexican federation enacted the “Law of justice for adolescents”. This system, at both the federal and state levels, formalizes a new global paradigm with regard to the triangular relationship between children, the State and the Law. It recognizes that children are also bearers of the inherent human rights recognized for all individuals, instead of simply objects in need of protection. However, despite formally aligning Mexican juvenile justice law with the Convention on the Rights of the Child (CRC, issues of actual substantive rights remained and new ones have appeared. For example, juveniles younger than 14 who have not committed a felony are released from institutions without any rehabilitation or treatment options, and alternative forms of justice were included without evaluating their possibilities of application or their conditions for success. In addition, the economic status of most juvenile detainees continues to be one of the most important determining factors in the administration of justice

  6. Reflexivity and social justice

    DEFF Research Database (Denmark)

    Maksimovic, Tijana; Jakobsen, Helle Nordentoft

    2017-01-01

    Career practitioners’ reflexive understanding of their professional role as change agents in career guidance and counselling practices has a major impact on how social justice can be achieved. This entitles an awareness of the way in which guidance and counselling practices are embedded in the co......Career practitioners’ reflexive understanding of their professional role as change agents in career guidance and counselling practices has a major impact on how social justice can be achieved. This entitles an awareness of the way in which guidance and counselling practices are embedded...

  7. Access to Justice for Communications Surveillance and Interception : Scrutinising Intelligence Gathering Reform Legislation

    NARCIS (Netherlands)

    Quirine Eijkman

    2018-01-01

    By analysing intelligence-gathering reform legislation this article discusses access to justice for communications interception by the intelligence and security services. In the aftermath of the Snowden revelations, sophisticated oversight systems for bulk communications surveillance are being

  8. Corrective justice and contract law

    Directory of Open Access Journals (Sweden)

    Martín Hevia

    2010-06-01

    Full Text Available This article suggests that the central aspects of contract law in various jurisdictions can be explained within the idea of corrective justice. The article is divided into three parts. The first part distinguishes between corrective justice and distributive justice. The second part describes contract law. The third part focuses on actions for breach of contract and within that context reflects upon the idea of corrective justice.

  9. Corrective justice and contract law

    OpenAIRE

    Martín Hevia

    2010-01-01

    This article suggests that the central aspects of contract law in various jurisdictions can be explained within the idea of corrective justice. The article is divided into three parts. The first part distinguishes between corrective justice and distributive justice. The second part describes contract law. The third part focuses on actions for breach of contract and within that context reflects upon the idea of corrective justice.

  10. The relationship between organizational justice and workplace aggression.

    Science.gov (United States)

    St-Pierre, Isabelle; Holmes, Dave

    2010-05-01

    This paper is a discussion of the links between organizational justice and workplace aggression. Managers have been identified as key players in implementing and maintaining an organizational culture of trust and justice. Employees who perceive themselves to be victims of injustice may rebel, using various means to 'punish' the source of the injustice. Literature review of publications in English and French from the early 1960 to 2009, including books, was conducted. Bibliographic databases searched for journal articles were Cumulative Index to Nursing and Allied Health Literature, Current Content, EMBASE, Medline, PsycINFO and Web of Science. The work environment and roles of nursing managers have changed considerably in the last 20 years, resulting in challenging working conditions for nursing managers. These can have an impact on their ability to create a trusting and fair culture, and can mean that they themselves be considered victims of organizational injustice. The failure of many re-engineering projects has been linked to a lack of consideration of the impact of perception of justice when implementing change. In addition, perception of organizational justice has the potential to influence many organizational outcomes, such as perception of respect and trust. As justice is a founding principle of biomedical ethics, principles of justice, equity and fairness must be upheld in practice in accordance with the requirements of professional codes of ethics. The concept of justice is linked to the founding principles of biomedical ethics, and these must be upheld in order to practise in accordance with professional codes of ethics and conduct.

  11. Understanding Education for Social Justice

    Science.gov (United States)

    Hytten, Kathy; Bettez, Silvia C.

    2011-01-01

    It has become increasingly common for education scholars to claim a social justice orientation in their work. At the same time, education programs seem to be adding statements about the importance of social justice to their mission, and a growing number of teacher education programs are fundamentally oriented around a vision of social justice.…

  12. Corrective Justice vs. Social Justice in the Aftermath of War

    Directory of Open Access Journals (Sweden)

    Pablo Kalmanovitz

    2010-11-01

    Full Text Available How do we justify the practice of corrective justice for losses suffered during armed conflicts? This article seeks to show the force and relevance of this question, and to argue that, in cases of massively destructive wars, social justice should gain priority over corrective justice. Starting from a liberal Rawlsian conception of the relationship between corrective and social justice, it is argued that, paradoxically, the more destructive a war is, the less normative force corrective rights have and the higher priority policies of social justice, which guarantee basic rights to all citizens, should have.

  13. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  14. Criminal Justice in America.

    Science.gov (United States)

    Croddy, Marshall; And Others

    An introduction to criminal law, processes, and justice is provided in this high school level text. Content is divided into six chapters, each treating a particular aspect of criminal procedure and the social and political issues surrounding it. Chapter 1 considers the criminal, the effects of crime on its victims, and legislation to aid victims.…

  15. The Social Justice Perspective

    Science.gov (United States)

    Loewen, Gladys; Pollard, William

    2010-01-01

    This article shines an important light on the continuing struggle of disabled people for dignity, citizenship rights, and access to the marketplace. Common threads bind the struggle for basic human rights among disenfranchised groups, offer experience and approaches to facilitate change, and move society towards social justice. The philosophy…

  16. Criminal Justice Web Sites.

    Science.gov (United States)

    Dodge, Timothy

    1998-01-01

    Evaluates 15 criminal justice Web sites that have been selected according to the following criteria: authority, currency, purpose, objectivity, and potential usefulness to researchers. The sites provide narrative and statistical information concerning crime, law enforcement, the judicial system, and corrections. Searching techniques are also…

  17. Publicity and Egalitarian Justice

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2008-01-01

    Recently, the issue of publicity has surfaced in discussions of the correct interpretation of the Rawlsian principles of justice. In an intriguing critique of G.A. Cohen's preferred interpretation of the difference principle as a principle that is incompatible with incentive-based inequalities...

  18. The Child Justice Act

    African Journals Online (AJOL)

    Stephan

    1995-06-16

    Jun 16, 1995 ... Gallinetti "Child Justice" 648; Le Roux-Kemp 2008 Annual Survey of South African Law 298 (the. Act contains a "separate, but parallel, ... The various aspects of section 68 are then evaluated. The greatest challenges lie in the ... See also, eg, Picardi Hotels v Thekwini. Properties 2009 1 SA 493 (SCA) para ...

  19. 75 FR 79947 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Science.gov (United States)

    2010-12-21

    ... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... particularly to any potential plans to collect cybersecurity information from private entities regarding cyber... security threats and would not include the Bank Secrecy Act (BSA) related SARs filed with FinCEN. The ISE...

  20. Implementing Network Video for Traditional Security and Innovative Applications: Best Practices and Uses for Network Video in K-12 Schools

    Science.gov (United States)

    Wren, Andrew

    2008-01-01

    Administrators are constantly seeking ways to cost-effectively and adequately increase security and improve efficiency in K-12 schools. While video is not a new tool to schools, the shift from analog to network technology has increased the accessibility and usability in a variety of applications. Properly installed and used, video is a powerful…

  1. Qualitative Case Study Exploring Operational Barriers Impeding Small and Private, Nonprofit Higher Education Institutions from Implementing Information Security Controls

    Science.gov (United States)

    Liesen, Joseph J.

    2017-01-01

    The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…

  2. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    Science.gov (United States)

    Mohammadi, Hadi

    2014-01-01

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…

  3. 76 FR 70638 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S...

    Science.gov (United States)

    2011-11-15

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The authority...

  4. 78 FR 69983 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2013-11-22

    ...) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... relating to DHS activities from disclosure to subjects or others related to these activities. Specifically...

  5. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-12-28

    ...)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the... recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting could also...

  6. 78 FR 58254 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2013-09-23

    ...)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert... the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also...

  7. 77 FR 47767 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2012-08-10

    ... subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could... as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting...

  8. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... Flexibility Act, 5 U.S.C. 605(b), as amended by the Small Business Regulatory Enforcement and Fairness Act of... Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS). ACTION: Final... consolidate all Federal regulations on drug-free workplace requirements for financial assistance into one...

  9. Implementing Virtual Private Networking for Enabling Lower Cost, More Secure Wide Area Communications at Sandia National Laboratories; TOPICAL

    International Nuclear Information System (INIS)

    MILLER, MARC M.; YONEK JR., GEORGE A.

    2001-01-01

    Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access

  10. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  11. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  12. Security in the transport of radioactive material: Implementing guide. Spanish edition; La seguridad fisica en el transporte de materiales radiactivos. Guia de aplicacion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  13. Failing to Fulfill Tasks of Social Justice Weakens Country.

    Science.gov (United States)

    USA Today, 1981

    1981-01-01

    Presents excerpts from an interview with Walter Mondale in which the former vice president expressed fears that the United States will be weakened by current policies of removing government from the tasks of social justice. Topics discussed include social security cuts, reduction of student loans, and elimination of the legal aid program. (DB)

  14. Global Information Justice: Rights, Responsibilities, and Caring Connections.

    Science.gov (United States)

    Smith, Martha

    2001-01-01

    Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)

  15. Urban land acquisition and social justice in Ethiopia | Mengie ...

    African Journals Online (AJOL)

    In this work, the author argues that the existing urban land acquisition system of Ethiopia has resulted in social injustice by denying the poor from access to urban land; and creating discriminatory environment while enforcing the new lease system. Keywords: access to land, land lease, social justice, tenure security, urban ...

  16. Transitional Justice as Elite Justice? Compromise Justice and Transition in Tunisia

    NARCIS (Netherlands)

    Lamont, Christopher; Pannwitz, Hannah

    2016-01-01

    This article reflects upon the ways in which transitional justice debates and processes impacted Tunisia's transition. It explores key questions such as what demands for justice emerged in the aftermath of the Tunisian revolution? Did Tunisia's transitional justice process reflect these demands?

  17. Setting standards of restorative justice

    Directory of Open Access Journals (Sweden)

    Kostić Miomira

    2007-01-01

    Full Text Available In the article the author deals with the basic theoretical statements and discussions about the practical use of restorative justice. She discusses the questions of introducing and application of restorative justice in order to reach the balance of interests between a victim, society and a delinquent. There is no unique statement about the restorative justice concept, so the authors make this concept by listing certain activities with rispect of standards and principles. Also she emphasizes the values of restorative justice process. A part of the article is dedicated to the standards for restorative justice that are harmonized with the international documents of human rights. .

  18. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...

  19. 75 FR 45152 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0004] National Security Division: Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the... write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National Security Division...

  20. Ending Sexual Violence Through Transformative Justice

    Directory of Open Access Journals (Sweden)

    Judith Armatta

    2018-02-01

    Full Text Available Sexual violence is used to maintain what Dr. Riane Eisler (1990 conceptualizes as the dominator model of society. The early days of the feminist anti-violence movement focused on changing the dominator model, but, in part, this focus was co-opted by seeking criminal justice solutions, contributing to punitive responses and mass incarceration that have been ineffective in ending sexual violence. The racist history of the rape charge and its disproportionate effect on people of color, an effect that continues today. Legislators have passed draconian laws that uniquely apply to anyone convicted of a sex offense, the definition of which has been broadened to encompass harmless behavior. A separate legal regime for sex offenders that isolates them from society and marks them for life as monsters obfuscates the causes of sexual violence and contributes to the problem. The feminist anti-violence movement remains influential, though little recognized, in today’s efforts to respond to sexual violence through restorative justice and transformative justice. A number of groups have adopted the RJ/TJ model, in particular women of color. The article provides examples of successful and unsuccessful implementation of RJ/TJ and discusses impediments to wider adoption of this approach. RJ/TJ is a promising alternative to the current criminal justice response to sexual assault, one that will bring us closer to a partnership culture.

  1. Measuring the Perception of Travel Security – Comparative Analysis of Students in Two Different Fields: Tourism and Security

    Directory of Open Access Journals (Sweden)

    Sebastjan Repnik

    2015-01-01

    Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as

  2. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

    Directory of Open Access Journals (Sweden)

    Nishaal J. Parmar

    2017-01-01

    Full Text Available This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure router-to-router communication system, first proposed by El Rifai and Verma. The original proposal utilizes a discrete logarithm-based encryption solution, which will be compared in this paper to RSA, AES, and ECC encryption algorithms. RSA certificates are widely used within the industry but require a trusted key generation and distribution architecture. AES and ECC provide advantages in key length, processing requirements, and storage space, also maintaining an arbitrarily high level of security. This paper modifies each of the four algorithms for use within the self-contained router-to-router environment system and then compares them in terms of features offered, storage space and data transmission needed, encryption/decryption efficiency, and key generation requirements.

  3. Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2010-01-01

    Full Text Available In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.

  4. Implementing a memristive Van der Pol oscillator coupled to a linear oscillator: synchronization and application to secure communication

    International Nuclear Information System (INIS)

    Megam Ngouonkadi, E B; Fotsin, H B; Louodop Fotso, P

    2014-01-01

    This paper investigates the dynamics of a memristor-based Van der Pol oscillator coupled to a linear circuit (VDPCL). This chaotic oscillator is a modification of the classical Van der Pol coupled to a linear circuit, and is obtained by replacing the classical cubic nonlinearity by the memristive one. The memristive VDPCL oscillator, in addition to having a very special stability property, exhibits interesting spectral characteristics, which makes it suitable for chaos-based secure communication applications. The memristor is realized by using off-the-shelf components. The basic properties of the circuit are analyzed by means of bifurcation analysis. Chaotic attractors from numerical and experimental analysis are presented, followed by a comparison of results obtained from the modified VDPCL oscillator and those from the classical VDPCL oscillator. An application to synchronization and chaos secure communication is also presented. (paper)

  5. Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment

    OpenAIRE

    Schreuders, ZC; Ardern, L

    2015-01-01

    Computer security students benefit from having hands-on experience with hacking tools and with access to vulnerable systems that they can attack and defend. However, vulnerable VMs are static; once they have been exploited by a student there is no repeatable challenge as the vulnerable boxes never change. A new novel solution, SecGen, has been created and deployed. SecGen solves the issue by creating vulnerable machines with randomised vulnerabilities and services, with constraints that ensur...

  6. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  7. Equality in the Framework of Justice

    OpenAIRE

    Aşik, Kübra

    2015-01-01

    This thesis assesses the relation between equality and justice by exploring and identifying the relation between equality and justice in Rawls's theory of justice, Sandel's communitarian account of Justice and Sen's capability approach. And these accounts of justice are evaluated from an egalitarian point of view. The main argument defended in the thesis is that justice requires equality. Accordingly, these three accounts of justice are evaluated by taking their understanding of equality into...

  8. Emerging Environmental Justice Issues in Nuclear Power and Radioactive Contamination

    Directory of Open Access Journals (Sweden)

    Dean Kyne

    2016-07-01

    Full Text Available Nuclear hazards, linked to both U.S. weapons programs and civilian nuclear power, pose substantial environment justice issues. Nuclear power plant (NPP reactors produce low-level ionizing radiation, high level nuclear waste, and are subject to catastrophic contamination events. Justice concerns include plant locations and the large potentially exposed populations, as well as issues in siting, nuclear safety, and barriers to public participation. Other justice issues relate to extensive contamination in the U.S. nuclear weapons complex, and the mining and processing industries that have supported it. To approach the topic, first we discuss distributional justice issues of NPP sites in the U.S. and related procedural injustices in siting, operation, and emergency preparedness. Then we discuss justice concerns involving the U.S. nuclear weapons complex and the ways that uranium mining, processing, and weapons development have affected those living downwind, including a substantial American Indian population. Next we examine the problem of high-level nuclear waste and the risk implications of the lack of secure long-term storage. The handling and deposition of toxic nuclear wastes pose new transgenerational justice issues of unprecedented duration, in comparison to any other industry. Finally, we discuss the persistent risks of nuclear technologies and renewable energy alternatives.

  9. Emerging Environmental Justice Issues in Nuclear Power and Radioactive Contamination.

    Science.gov (United States)

    Kyne, Dean; Bolin, Bob

    2016-07-12

    Nuclear hazards, linked to both U.S. weapons programs and civilian nuclear power, pose substantial environment justice issues. Nuclear power plant (NPP) reactors produce low-level ionizing radiation, high level nuclear waste, and are subject to catastrophic contamination events. Justice concerns include plant locations and the large potentially exposed populations, as well as issues in siting, nuclear safety, and barriers to public participation. Other justice issues relate to extensive contamination in the U.S. nuclear weapons complex, and the mining and processing industries that have supported it. To approach the topic, first we discuss distributional justice issues of NPP sites in the U.S. and related procedural injustices in siting, operation, and emergency preparedness. Then we discuss justice concerns involving the U.S. nuclear weapons complex and the ways that uranium mining, processing, and weapons development have affected those living downwind, including a substantial American Indian population. Next we examine the problem of high-level nuclear waste and the risk implications of the lack of secure long-term storage. The handling and deposition of toxic nuclear wastes pose new transgenerational justice issues of unprecedented duration, in comparison to any other industry. Finally, we discuss the persistent risks of nuclear technologies and renewable energy alternatives.

  10. Choosing children: intergenerational justice?

    Science.gov (United States)

    Doyal, Len; McLean, Sheila

    2005-03-01

    In this discussion, we argue that the concept of intergenerational justice, usually used in environmental matters, is applicable to reproductive decisions also. Additionally, we propose that this permits certain reproductive choices to be made prior to conception or during the pregnancy, and that these choices should not be confined to clinical concerns. In particular, we argue that consideration of the interests of future children should be viewed from the perspective of objective well-being. That being the case, decisions about the sex of future offspring can, in terms of intergenerational justice, be legitimate. We do not argue that every reproductive choice is legitimate; for example it would not be legitimate deliberately to choose characteristics that prevent future children from potentially successful participation in social life.

  11. Criminal Justice Transitions

    OpenAIRE

    McAra, Lesley; McVie, Susan

    2007-01-01

    This report explores transitions into the adult criminal justice system amongst a large cohort of young people who were involved in the Edinburgh Study of Youth Transitions and Crime. It includes: a description of patterns of criminal convictions and disposals for young people up to age 19 (on average); an examination of the characteristics and institutional histories of cohort members with a criminal record as compared with youngsters with no such record; and an exploration of the profile of...

  12. Climate Change Justice

    OpenAIRE

    Sunstein, Cass R.; Posner, Eric A.

    2007-01-01

    Greenhouse gas reductions would cost some nations much more than others and benefit some nations far less than others. Significant reductions would impose especially large costs on the United States, and recent projections suggest that the United States has relatively less to lose from climate change. In these circumstances, what does justice require the United States to do? Many people believe that the United States is required to reduce its greenhouse gas emissions beyond the point that is ...

  13. Promoting nuclear security: What the IAEA is doing. The Agency is implementing a comprehensive programme aimed at stemming the threat of nuclear terrorism

    International Nuclear Information System (INIS)

    2003-01-01

    The threat to public safety and security posed by some form of nuclear terrorism is not new. But in the wake of recent highly organized terrorist attacks in Kenya, Tanzania, the US, Indonesia, Saudi Arabia, Morocco and numerous other nations, the international community has come to recognize that new and stronger measures must be taken to protect against and prepare for a diverse range of terrorist scenarios. Given the multiplicity of targets and scenarios for terrorists, States must consider a comprehensive approach to combating nuclear terrorism. Among the key priorities: Adequate physical protection of all nuclear materials, radioactive materials and facilities plus transport systems; Proper regulatory control of nuclear and radioactive material; Effective detection and interdiction of illicit trafficking in nuclear and radioactive materials; Integration of nuclear safety and security systems for maximum benefits; and Readiness for implementing emergency response plans. The IAEA is assisting its Member States with these challenges in many ways. Through well-established activities, the Agency has been heavily involved in providing assistance and technical support to States in all these areas. The IAEA has established several advisory services to help Member States to assess the effectiveness and the need for improvement of their national physical oversight systems. The IAEA provides peer reviews in related areas such as regulatory or control infrastructures, and also supplies expert technical advice on the required upgrades. Several of these specialized services aim directly at protecting against terrorist threats. The International Nuclear Security Advisory Service is a new initiative that is providing specialized services promoting enhanced nuclear security. The International SSAC Advisory Service (ISSAS) is another new initiative providing advice to Member States in strengthening their SSAC. The IAEA also offers the EPREV (Emergency Preparedness REView

  14. An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

    Science.gov (United States)

    Budiman, M. A.; Amalia; Chayanie, N. I.

    2018-03-01

    Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4+ Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n2 ), while the complexity of Zig-zag Cipher and RC4+ Cipher are θ(n2 ) and θ(n), respectively.

  15. Access to Justice and Labor Law Reform in Asia

    Directory of Open Access Journals (Sweden)

    Asri Wijayanti

    2016-06-01

    Full Text Available The existence of national labor law system guarantees fair is one of legal reform to achieve access to justice. This study aims to analyze whether the system of labor law has given capacity to achieve access to justice as the basis for implementing international labor relations in Asia. The method of this study is a normative legal research with statute approach. The findings support that there was an inconsistency on the substance of the legal structures that affect the low legal culture. The substance of the national labor law systems have not adapted the comprehensive International Labor Organization (ILO conventions. Less robust system of national labor laws affect access to justice in the weak field of labor in the region. How To Cite: Wijayanti, A. (2016. Access to Justice and Labor Law Reform in Asia. Rechtsidee, 3(1, 17-26. doi:http://dx.doi.org/10.21070/jihr.v3i1.144

  16. Environmental justice at the Savannah River Site

    International Nuclear Information System (INIS)

    Flemming, R.; Hooker, K.L.

    1995-01-01

    Environmental justice is the conscious commitment to ensure that poor and/or minority communities are not disproportionately bearing adverse human health and environmental effects from the production, processing, or disposal of hazardous or toxic waste. To focus federal attention on assessing the environmental and human health conditions in minority and/or low-income communities surrounding federal facilities, on February 11, 1994, President Clinton signed Executive Order (EO) 12898. As part of the strategy to comply with EO 12898, the President required all federal agencies to develop localized strategies to ensure that their programs and policies are consistent with EO 12898. This would incorporate mechanisms for increasing public participation opportunities for involvement in the decision making, easier access to information, and the collection and analysis of economic, demographic, and food consumption data in surrounding communities. The U.S. Department of Energy (DOE) responded by issuing its Environmental Justice Strategy 2 (April 1995), although many of its field offices had been actively implementing activities in support of the executive order since its issuance. One DOE facility, the Savannah River Site (SRS), which is located in west central South Carolina, is making great strides toward implementing a successful public participation program, which includes environmental justice initiatives

  17. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  18. 78 FR 4347 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security; U.S. Customs...

    Science.gov (United States)

    2013-01-22

    ... Secretary 6 CFR Part 5 [Docket No. DHS-2012-0035] Privacy Act of 1974: Implementation of Exemptions... trademark or copyright. This information allows retailers, consumers, and other businesses to contact the..., law enforcement, or intelligence agencies (federal, state, local, foreign, international or tribal) in...

  19. We Are Here to Serve You! Public Security, Police Reform and Human Rights Implementation in Costa Rica

    NARCIS (Netherlands)

    Eijkman, Q.A.M.

    2007-01-01

    This empirical study discusses how the police of a non-transitional society in Latin America responded to the implementation of human rights? On the basis of qualitative and quantitative data that was collected during fieldwork periods between 2003 and 2006, it evaluates the effect of police human

  20. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2011-11-02

    ...., Washington, DC 20229. For privacy issues please contact: Mary Ellen Callahan (703) 235-0780), Chief Privacy... Secretary 6 CFR Part 5 [Docket No. DHS-2011-0103] Privacy Act of 1974: Implementation of Exemptions... of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  1. 78 FR 4079 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-01-18

    ... Ninth Street NW., Washington, DC 20229. For privacy issues please contact: Jonathan R. Cantor (202-343... Secretary 6 CFR Part 5 [Docket No. DHS 2012-0076] Privacy Act of 1974: Implementation of Exemptions...), System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  2. Transformative Justice as a Way of Permitting Women's Perspectives in Liberian Transitional Justice

    DEFF Research Database (Denmark)

    Ammann, Theresa

    In recent years, the field of transitional justice—originally rooted within the area of law—has gained recognition and input from a growing number of different disciplines (e.g., anthropology, politics, psychology). While this expansion has allowed the field to become more holistic it has also...... in Liberia’s transitional justice efforts—namely, women and particularly female ex-combatants. The paper will, therefore, be based on a literature review which will draw its conclusions from existing research within the fields of anthropology, human security, peace & conflict studies, political sciences......, and psychology. With regards to Liberian peacebuilding; this paper will argue for the necessity to balance juridical, political, cultural, social, and psychological needs in peacebuilding to achieve transformative justice—rather than transitional justice. Questions such as, “How were women neglected...

  3. Women, truth, justice and reparation in Colombia

    Directory of Open Access Journals (Sweden)

    María Eugenia Ibarra Melo

    2011-07-01

    Full Text Available This paper account for the main collective actions undertaken by two women networks in Colombia: Women’s Peace Route and the Colombian Women Initiative for Peace, during transition justice process and the implementation of the Justice and Peace Law (2004-2009. From a sociological approach to the political process and the gender category, this paper discusses how gender ideologies inform new ways of mobilization affecting discourses, purposes and repertoires of those claiming identities and defending human rights. The main conclusion here is that the feminist influence in redistribution and acknowledgement claims for victims from the armed conflict have encouraged collective actions that begin to modify their relationship to the State. This is proved by their achievements at Court and social acknowledgement victims have gained as social actors.

  4. Social justice in pandemic preparedness.

    Science.gov (United States)

    DeBruin, Debra; Liaschenko, Joan; Marshall, Mary Faith

    2012-04-01

    Pandemic influenza planning in the United States violates the demands of social justice in 2 fundamental respects: it embraces the neutrality of procedural justice at the expense of more substantive concern with health disparities, thus perpetuating a predictable and preventable social injustice, and it fails to move beyond lament to practical planning for alleviating barriers to accessing care. A pragmatic social justice approach, addressing both health disparities and access barriers, should inform pandemic preparedness. Achieving social justice goals in pandemic response is challenging, but strategies are available to overcome the obstacles. The public engagement process of one state's pandemic ethics project influenced the development of these strategies.

  5. Justice and feelings: Toward a new era in justice research

    NARCIS (Netherlands)

    D. de Cremer (David); K. van den Bos (Kees)

    2007-01-01

    textabstractIn this special issue, the relationship between feelings and justice and its consequences are highlighted. Five articles discuss the role that affect, feelings, and emotions play in justice processes across a variety of social settings. In the present introductory article, the position

  6. Justice and Feelings: Toward a New Era in Justice Research

    NARCIS (Netherlands)

    Cremer, D. de; Bos, K. van den

    2007-01-01

    In this special issue, the relationship between feelings and justice and its consequences are highlighted. Five articles discuss the role that affect, feelings, and emotions play in justice processes across a variety of social settings. In the present introductory article, the position of past

  7. Applying Social Justice Principles through School-Based Restorative Justice

    Science.gov (United States)

    von der Embse, Nathan; von der Embse, Daniel; von der Embse Meghan; Levine, Ian

    2009-01-01

    Social justice has recently received attention within the school psychology community. Yet, social justice is a nebulous term, as opined by Connelly (2009), who cautioned against searching for what is wrong and instead striving for the highest standards and recognizing needs of every unique child. Shriberg and colleagues (2008) have sought to…

  8. Doing justice to social justice in South African higher education ...

    African Journals Online (AJOL)

    This paper attempts to develop a conceptualisation of social justice in higher education based on a close reading of the current literature in the field. An important assumption we make is that higher education is a valuable mechanism for social justice. We set the literature against policy documents that detail South African ...

  9. Student Perceptions of Social Justice and Social Justice Activities

    Science.gov (United States)

    Torres-Harding, Susan R.; Steele, Cheronda; Schulz, Erica; Taha, Farah; Pico, Chantal

    2014-01-01

    Encouraging students to engage in activities that actively seek to promote social justice is a goal of many educators. This study analyzed college student perceptions around social justice and related activities in a medium-sized, urban university in the United States. Students' open-ended responses to questions assessing their perceptions of…

  10. Justice delayed is justice denied: Protecting Miners against ...

    African Journals Online (AJOL)

    Justice delayed is justice denied: Protecting Miners against Occupational ... of section 35 of Compensation for Occupational Injuries and Diseases Act 130 of ... of the Mankayi case for the system of occupational health and safety in South Africa. ... KEYWORDS: Occupational health; diseases; injuries; employees; protection; ...

  11. Justice on Both Sides: Transforming Education through Restorative Justice

    Science.gov (United States)

    Winn, Maisha T.

    2018-01-01

    Restorative justice represents "a paradigm shift in the way Americans conceptualize and administer punishment," says author Maisha T. Winn, from a focus on crime to a focus on harm, including the needs of both those who were harmed and those who caused it. Her book, "Justice on Both Sides," provides an urgently needed,…

  12. Justice in Cyberwar

    Directory of Open Access Journals (Sweden)

    Klaus-Gerd Giesen

    2014-06-01

    Full Text Available http://dx.doi.org/10.5007/1677-2954.2014v13n1p27 The text aims at providing an ethical framework for cyber warfare. The latter is changing our understanding of war (and peace as well as the relationship between the human being and the machine. Rejecting Heidegger’s fatalistic stance towards technology it is argued that norms of international justice should be formulated in order to attempt to regulate this new military dimension. The potentially considerable destructive force of cyberweapon systems for civilian infrastructure is emphasized, especially as far as the « Internet of Things » (all physical objects connected to the Internet is concerned. In a foreseeable future cyberwar operations may kill many civilians. After defining the concept of cyberwar and explainig why it is a new and important moral issue, the paper heavily relies on just war ethics in order to reach norms for justice in cyberwar. It is shown that Immanuel Kant has not just been a philosopher of (perpetual peace, but (in the Metaphysics of Morals also a just war theorist who developed his normative framework in a fruitful dialog with Aquinas (against Vitoria and Suarez. His norms for jus ad bellum and jus in bello are carefully and critically applied to cyberwar. However, Kant’s major innovation in just war theory has been the concept of jus post bellum. The paper demonstrates how important this dimension of justice is in cyberwar, and how to apply it, including through recommendations for a treaty in international law.

  13. Restorative Justice in Children.

    Science.gov (United States)

    Riedl, Katrin; Jensen, Keith; Call, Josep; Tomasello, Michael

    2015-06-29

    An important, and perhaps uniquely human, mechanism for maintaining cooperation against free riders is third-party punishment. Our closest living relatives, chimpanzees, will not punish third parties even though they will do so when personally affected. Until recently, little attention has been paid to how punishment and a sense of justice develop in children. Children respond to norm violations. They are more likely to share with a puppet that helped another individual as opposed to one who behaved harmfully, and they show a preference for seeing a harmful doll rather than a victim punished. By 6 years of age, children will pay a cost to punish fictional and real peers, and the threat of punishment will lead preschoolers to behave more generously. However, little is known about what motivates a sense of justice in children. We gave 3- and 5-year-old children--the youngest ages yet tested--the opportunity to remove items and prevent a puppet from gaining a reward for second- and third-party violations (experiment 1), and we gave 3-year-olds the opportunity to restore items (experiment 2). Children were as likely to engage in third-party interventions as they were when personally affected, yet they did not discriminate among the different sources of harm for the victim. When given a range of options, 3-year-olds chose restoration over removal. It appears that a sense of justice centered on harm caused to victims emerges early in childhood and highlights the value of third-party interventions for human cooperation. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Biomedical enhancements as justice.

    Science.gov (United States)

    Nam, Jeesoo

    2015-02-01

    Biomedical enhancements, the applications of medical technology to make better those who are neither ill nor deficient, have made great strides in the past few decades. Using Amartya Sen's capability approach as my framework, I argue in this article that far from being simply permissible, we have a prima facie moral obligation to use these new developments for the end goal of promoting social justice. In terms of both range and magnitude, the use of biomedical enhancements will mark a radical advance in how we compensate the most disadvantaged members of society. © 2013 John Wiley & Sons Ltd.

  15. Information Technology: DoD FY 2004 Implementation of the Federal Information Security Management Act for Information Technology Training and Awareness

    National Research Council Canada - National Science Library

    Davis, Sarah; Mitchell, James; Palmer, Kevin A; Riggins, Liyang; Truex, Kathryn; Williams, Zac

    2004-01-01

    ...). Specifically, we evaluated whether all agency employees, including contractors, received IT security training and awareness and whether employees with significant IT security responsibilities...

  16. Islamic Political Thought between Justice Value and the State Structure

    Directory of Open Access Journals (Sweden)

    Ahmed As-Sirri

    2013-06-01

    Full Text Available The paper discusses the relationship between state structure and the implementing of justice in the Islamic society. The shift from caliphate system to the system of royal system starting from the Umayyad Dynasty (41-132 AH / 661-750 AD made the issue of social justice highly urgent. The main question discussed was : Is there a relationship between state structure and achieving social justice? To answer this question the paper reviews the relationship between religious authorities and political authorities in the main periods of Islamic history. Based on these relations as well as the intellectual product known as the “Heritage of Islamic Political Thought”, we concluded that the classical structure of Islamic state didn’t assure the implementing of justice. In light of the forgoing idea we could also conclude that the political islamic thought used today in context of “Arab spring” does not support the aspirations of building a modern state that assures the implementing of justice as well as variety of social, cultural and political rights.

  17. [Design and implementation of supply security monitoring and analysis system for Chinese patent medicines supply in national essential medicines].

    Science.gov (United States)

    Wang, Hui; Zhang, Xiao-Bo; Huang, Lu-Qi; Guo, Lan-Ping; Wang, Ling; Zhao, Yu-Ping; Yang, Guang

    2017-11-01

    The supply of Chinese patent medicine is influenced by the price of raw materials (Chinese herbal medicines) and the stock of resources. On the one hand, raw material prices show cyclical volatility or even irreversible soaring, making the price of Chinese patent medicine is not stable or even the highest cost of hanging upside down. On the other hand, due to lack of resources or disable some of the proprietary Chinese medicine was forced to stop production. Based on the micro-service architecture and Redis cluster deployment Based on the micro-service architecture and Redis cluster deployment, the supply security monitoring and analysis system for Chinese patent medicines in national essential medicines has realized the dynamic monitoring and intelligence warning of herbs and Chinese patent medicine by connecting and integrating the database of Chinese medicine resources, the dynamic monitoring system of traditional Chinese medicine resources and the basic medicine database of Chinese patent medicine. Copyright© by the Chinese Pharmaceutical Association.

  18. 28 CFR 71.40 - Stays ordered by the Department of Justice.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Stays ordered by the Department of Justice. 71.40 Section 71.40 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) IMPLEMENTATION OF... finding that continuation of the administrative process described in this part with respect to a claim or...

  19. Measuring Practices of Teaching for Social Justice in Elementary Mathematics Classrooms

    Science.gov (United States)

    Reagan, Emilie Mitescu; Pedulla, Joseph J.; Jong, Cindy; Cannady, Mac; Cochran-Smith, Marilyn

    2011-01-01

    This study used the Teaching for Social Justice Observation Scale (TSJOS) of the Reformed Teaching Observation Protocol-Plus (RTOP+) to examine the extent to which twenty-two novice elementary teachers implemented practices related to teaching for social justice in their mathematics instruction. In addition, this study sought to examine the extent…

  20. 22 CFR 521.40 - Stays ordered by the Department of Justice.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Stays ordered by the Department of Justice. 521.40 Section 521.40 Foreign Relations BROADCASTING BOARD OF GOVERNORS IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT § 521.40 Stays ordered by the Department of Justice. If at any time the...

  1. 22 CFR 224.40 - Stays ordered by the Department of Justice.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Stays ordered by the Department of Justice. 224.40 Section 224.40 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT § 224.40 Stays ordered by the Department of Justice. If at any time the...

  2. Participatory Action Research as a Social-Justice Framework for Assessment in Student Affairs

    Science.gov (United States)

    Zerquera, Desiree D.; Berumen, Juan G.; Pender, Jason T.

    2017-01-01

    While sufficient methodological training and effective implementation of assessment approaches are essential for successful evaluation in student affairs, those with an interest and passion for social justice may be conflicted. Many of the assessment approaches employed today are misaligned with social justice agendas, lack theoretical grounding…

  3. A Phenomenological Study of the Experience of Respondents in Campus-Based Restorative Justice Programs

    Science.gov (United States)

    Meagher, Peter J.

    2009-01-01

    The focus of this dissertation was the use of restorative justice practices in the collegiate setting. Some have expressed concern with the legal nature of campus conduct processes. Restorative practices have been implemented in criminal justice and K-12 settings and are seen by some as an antidote to overly legalistic campus conduct processes.…

  4. Middle School Science Teachers' Perceptions of Social Justice: A Study of Two Female Teachers

    Science.gov (United States)

    Upadhyay, Bhaskar

    2010-01-01

    The focus of this qualitative study is to document two middle school science teachers' perceptions of social justice and how these teachers implement various aspects of social justice in their science instruction. The two teachers teach science in an urban school that serves students from low-income, immigrant, and ethnic minority families. The…

  5. Transformation toward a Secure and Precaution-Oriented Energy System with the Guiding Concept of Resilience—Implementation of Low-Exergy Solutions in Northwestern Germany

    Directory of Open Access Journals (Sweden)

    Urte Brand

    2015-07-01

    Full Text Available Climate changes, incidents like nuclear disasters, and associated political objectives call for significant changes to the current energy system. Despite these far-reaching transformation processes, within the intended changes security of supply and precautions against the possible consequences of climate change must be ensured. Consequently, the question arises how to direct energy systems. In this context the processes of guiding orientations with the help of the guiding concept of “resilient systems” and feasible and addressee-oriented guiding design principles can be an option to provide guidance in transformation processes. However, it is questionable whether and how such processes are effective in the long term and if they are able to give direction by doing so. Within the framework of empirical studies of a regional guiding orientation process for the energy system of Northwestern Germany, the long-term effectiveness of the process and its spread resilient guiding design principles of “low-exergy solutions” and “climate-adapted and energy-efficient refrigeration” has been confirmed. Such effectiveness requires the implementation of a four-phase guiding orientation process which takes content-related and process-related effectiveness factors into account. Therefore, the study shows how regional energy systems can be designed toward the major challenges of ensuring security and precaution.

  6. Social welfare and restorative justice

    OpenAIRE

    Fox, Darrell

    2009-01-01

    "This paper explores the links and connections between social work and restorative justice. After a brief description of social work, restorative justice and family group conferencing, I will explore some the complementary theoretical links and practice applications, critically examining the potential implications and opportunities for social work practitioners and academics in relation to practice." [author's abstract

  7. Educational Administration and Social Justice

    Science.gov (United States)

    Bates, Richard

    2006-01-01

    After observing that texts in educational administration have largely failed to address the problem of the justice and fairness of social and educational arrangements, this article goes on to examine the necessary relationships between ethical leadership, community and the notion of social justice. Such relationships are argued to be necessarily…

  8. Experiential Social Justice Judgment Processes

    NARCIS (Netherlands)

    Maas, M.

    2008-01-01

    Social justice can be thought of as an idea that exists within the minds of individuals and that concerns issues like what is right and wrong, what ought to be or not to be, and what is fair or unfair. This subjective quality of the justice judgment process makes it rather unpredictable how people

  9. Corporate accountability and transitional justice

    Directory of Open Access Journals (Sweden)

    Sabine Michalowski

    2015-10-01

    Full Text Available Traditionally, transitional justice processes do not address the role of corporations in dictatorships or in armed conflicts that give rise to the need for dealing with grave and systematic human rights violations. However, there is a growing awareness that in many contexts corporations contribute to these violations, often in the form of corporate complicity with the principal violators. An argument can therefore be made that to achieve the aims of transitional justice and establish a holistic narrative of the past as well as obtain justice and reparations for victims requires investigating and addressing the role of corporate actors. This article uses the example of Colombia’s Justice and Peace process to show some of the complexities, opportunities and challenges that arise if transitional justice measures focus primarily on criminal law and create a specific legal framework, outside of the ordinary justice systems, only for a limited group of primary perpetrators, in the Colombian case for members of the armed groups who demobilised. It is argued that the exclusion of corporate actors in contexts where their role is regarded as significant leads to victims seeking alternatives ways to obtain justice and that both victims and corporations would benefit if transitional justice mechanisms addressed the role of corporations.

  10. Educational Justice and Big Data

    Science.gov (United States)

    Ben Shahar, Tammy Harel

    2017-01-01

    This article examines the effects of incorporating information and communication technologies in schools in terms of distributive justice. To do so, four issues that are central to educational justice are discussed: scarcity of resources, the positional nature of education, peer effects, and biases in educational decision-making. The discussion…

  11. Gender Justice and School Education

    Science.gov (United States)

    Gao, Desheng

    2009-01-01

    Gender justice includes three basic dimensions: gender equality, respect for difference, and free choice. In reality, schools construct and reproduce the gender injustice of the social culture through multiple dimensions that include the visible and the invisible curriculum, and the teacher's behaviour. In terms of gender justice, the social…

  12. Design and implementation of a secure and user-friendly broker platform supporting the end-to-end provisioning of e-homecare services.

    Science.gov (United States)

    Van Hoecke, Sofie; Steurbaut, Kristof; Taveirne, Kristof; De Turck, Filip; Dhoedt, Bart

    2010-01-01

    We designed a broker platform for e-homecare services using web service technology. The broker allows efficient data communication and guarantees quality requirements such as security, availability and cost-efficiency by dynamic selection of services, minimizing user interactions and simplifying authentication through a single user sign-on. A prototype was implemented, with several e-homecare services (alarm, telemonitoring, audio diary and video-chat). It was evaluated by patients with diabetes and multiple sclerosis. The patients found that the start-up time and overhead imposed by the platform was satisfactory. Having all e-homecare services integrated into a single application, which required only one login, resulted in a high quality of experience for the patients.

  13. Comparative Supreme Justice

    Directory of Open Access Journals (Sweden)

    Ditlev Tamm

    2011-12-01

    Full Text Available This article deals with the great variety of Supreme Courts in the world today and presents some selected courts. Supreme Courts are found in most countries both as only apex courts or in a courts’ system where also supreme administrative courts or constitutional courts are found. The starting point is the variation of supreme justice in the Nordic countries where one apex court is the system of Denmark and Norway whereas administrative courts are found in Sweden and Finland. Constitutional courts stem from the European tradition and are most abundant in Europe and in countries with a civil law system but especially in Africa they are also found in common law countries. Mexico is mentioned as a specific example of a Supreme Court that has taken upon itself to be a main player in the endeavour to communicate the law to a general audience. The article is a presentation with samples of what is going to be a project on comparative supreme justice in which the position of supreme courts in the various states, the recruitment scheme and competence of the courts and other such factors will be analyzed on a global basis.

  14. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  15. Justice-based social assistance

    Science.gov (United States)

    Barrientos, Armando

    2016-01-01

    What are the main objectives of social protection institutions in developing countries? What should be their scope and reach? What is the source of their legitimacy? Finding appropriate answers to these questions is essential to understanding, and shaping, the emergence of welfare institutions in low- and middle-income countries. Most available answers rely on instrumental arguments. Few make reference to normative principles. This article draws on three concepts from Rawls – social justice as regulating cooperation, the social minimum, and the need for a freestanding political notion of social justice – to develop a coherent argument for grounding social assistance on social justice. In line with this argument, it identifies some parameters for a justice-based social assistance. This article then discusses, with examples, the tensions existing between a social justice-based social minimum and ‘real’ social assistance institutions emerging in developing countries. PMID:27708544

  16. REDD+ on the rocks? Conflict Over Forest and Politics of Justice in Vietnam.

    Science.gov (United States)

    Sikor, Thomas; Cầm, Hoàng

    In Vietnam, villagers involved in a REDD+ (reduced emissions from deforestation and forest degradation) pilot protect areas with rocks which have barely a tree on them. The apparent paradox indicates how actual practices differ from general ideas about REDD+ due to ongoing conflict over forest, and how contestations over the meaning of justice are a core element in negotiations over REDD+. We explore these politics of justice by examining how the actors involved in the REDD+ pilot negotiate the particular subjects, dimensions, and authority of justice considered relevant, and show how politics of justice are implicit to practical decisions in project implementation. Contestations over the meaning of justice are an important element in the practices and processes constituting REDD+ at global, national and local levels, challenging uniform definitions of forest justice and how forests ought to be managed.

  17. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  18. Changes in quality of care and costs induced by implementation of a diabetes program in a social security entity of Argentina

    Directory of Open Access Journals (Sweden)

    González L

    2013-07-01

    Full Text Available Lorena González,1 Jorge F Elgart,1 Héctor Calvo,2 Juan J Gagliardino11Center of Experimental and Applied Endocrinology, National University of La Plata, La Plata, Argentina; 2School of Economics and Management of Healthcare Organizations, National University of La Plata, La Plata, ArgentinaPurpose: To measure the impact of a diabetes and cardiovascular risk factors program implemented in a social security institution upon short- and long-term clinical/metabolic outcomes and costs of care.Methods: Observational longitudinal cohort analysis of clinical/metabolic data and resource use of 300 adult male and female program participants with diabetes before (baseline and 1 and 3 years after implementation of the program. Data were obtained from clinical records (Qualidiab and the administration's database.Results: The implementation of the program in "real world" conditions resulted in an immediate and sustainable improvement of the quality of care provided to people with diabetes incorporated therein. We also recorded a more appropriate oral therapy prescription for hyperglycemia and cardiovascular risk factors (CVRFs, as well as a decrease of events related to chronic complications. This improvement was associated with an increased use of diagnostic and therapeutic resources, particularly those related to pharmacy prescriptions, not specifically used for the control of hyperglycemia and other CVRFs.Conclusion: The implementation of a diabetes program in real-world conditions results in a significant short- and long-term improvement of the quality of care provided to people with diabetes and other CVRFs, but simultaneously increased the use of resources and the cost of diagnostic and therapeutic practices. Since controlled studies have shown improvement in quality of care without increasing costs, our results suggest the need to include management-control strategies in these programs for appropriate medical and administrative feedback to ensure the

  19. A Study of Various Electronic Security Sensors Devices and Technology at Various Application Field Accompanied With Real Time Project Implementation of Sensor

    OpenAIRE

    Vijay Laxmi Kalyani; Parmeet Kour; Peram Navya

    2016-01-01

    Abstract: Nowadays electronics is everywhere and we are surrounded with electronic gazettes many of them are helping us in maintaining security at various places, there are many security problems faced by banks, homes etc. Without proper and strong security a vault can be penetrated. A security system is used in residential, commercial, industrial, Medical and Militaries as well as personal protection. In this paper we are discussing about the various electronic security sensor devices and te...

  20. THE COURT OF JUSTICE OF THE EUROPEAN UNION AND INTERNATIONAL LEGAL ORDER

    Directory of Open Access Journals (Sweden)

    TETYANA KOMAROVA

    2017-01-01

    Full Text Available The author discusses the relationship between two legal orders: international law and European Union (EU law. The main provisions of this relationship have been established through the precedential practice of the Court of Justice of the European Union – the EU’s main judicial body. This kind of research seems important because of the gap in the theory of international law caused by the immutable dogma of the supremacy of international law. However, modern legal practice demonstrates a certain fragmentation of the international legal order because of the impact of the existence and development of regional supranational legal orders. The EU legal order, with its own special nature (sui generis, is undoubtedly one of the most developed among them. The Court of Justice of the European Union performs a crucial role in the EU legal system concerning application and interpretation of EU law. It provides a uniform interpretation of this law for the purposes of development of supranational integration. In this context the Court of Justice the European Union establishes the status of European law and its relationship with the national legal systems and international law. The Court acts as protector of the EU legal order against the influence of other legal orders. The Court’s precedential practice reveals EU law’s tendency towards its constitutionalization and the development of its autonomy. The latest practice indicates the Court’s powers to review the EU institutions’ acts in relation to the implementation of UN Security Council resolutions. This proves the Court’s ability to establish indirect control even over UN acts.

  1. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  2. Enhancement of DRPE performance with a novel scheme based on new RAC: Principle, security analysis and FPGA implementation

    Science.gov (United States)

    Neji, N.; Jridi, M.; Alfalou, A.; Masmoudi, N.

    2016-02-01

    The double random phase encryption (DRPE) method is a well-known all-optical architecture which has many advantages especially in terms of encryption efficiency. However, the method presents some vulnerabilities against attacks and requires a large quantity of information to encode the complex output plane. In this paper, we present an innovative hybrid technique to enhance the performance of DRPE method in terms of compression and encryption. An optimized simultaneous compression and encryption method is applied simultaneously on the real and imaginary components of the DRPE output plane. The compression and encryption technique consists in using an innovative randomized arithmetic coder (RAC) that can well compress the DRPE output planes and at the same time enhance the encryption. The RAC is obtained by an appropriate selection of some conditions in the binary arithmetic coding (BAC) process and by using a pseudo-random number to encrypt the corresponding outputs. The proposed technique has the capabilities to process video content and to be standard compliant with modern video coding standards such as H264 and HEVC. Simulations demonstrate that the proposed crypto-compression system has presented the drawbacks of the DRPE method. The cryptographic properties of DRPE have been enhanced while a compression rate of one-sixth can be achieved. FPGA implementation results show the high performance of the proposed method in terms of maximum operating frequency, hardware occupation, and dynamic power consumption.

  3. Organising Data Exchange in the Dutch Criminal Justice Chain

    Directory of Open Access Journals (Sweden)

    Philip LANGBROEK

    2009-12-01

    Full Text Available Effective exchange of information in the criminal justice chain is crucial for effective law enforcement, but difficult to achieve. This article describes the case of the development and introduction of electronic data exchange in the Dutch Criminal Justice chain. Basic theories on the introduction of IT in justice organizations are tested by means of qualitative empirical research. Case flow management automation is technically feasible in the criminal justice chain but presupposes willingness of different organizations attached to that chain to adapt working processes for that purpose. The Dutch case shows a relative failure of the development and implementation of an integrated case flow management system for the entire chain (from the police via the public prosecutions office and the courts up to the prison service. It also shows a relative success of connecting xml-based data files to different reference indexes using intelligent agent software. Compared to the intended integrated case flow management system this solution for inter-organizational data exchange is much more simple and flexible because it does not demand a far reaching adaptation of internal organizational routines. It avoids the complexities of justice organizations and simplifies tasks related to data exchange. The data therefore are more accurate and are faster available. The most important advantage however is that risks of failure of development and implementation are reduced.

  4. Organization, relational justice and absenteeism.

    Science.gov (United States)

    Stoetzer, Ulrich; Åborg, Carl; Johansson, Gun; Svartengren, Magnus

    2014-01-01

    There is a need for more knowledge on how to manage companies towards healthier and more prosperous organizations with low levels of absenteeism. Relational Justice can be a useful concept when managing such organizations. Organizational factors can help to explain why some companies have relatively low absenteeism rates, even though they are equal to other companies in many other aspects. Previous studies suggest that management may be one important factor. Efficient management may depend on good relations between the leaders and the employees. The concept of Relational Justice is designed to capture these relations. Consequently, a Relational Justice framework may be used to understand why some companies have a low incidence of absenteeism. Managers from a representative body of Swedish companies. Interviews were analyzed to explore whether the items representing the concept of Relational Justice can be used to further understand the strategies, procedures and structures that characterize organizations and management in companies with a low incidence of absenteeism. Strategies, procedures or principles related to Relational Justice were common and highlighted in companies with an incidence of absenteeism. The most frequently occurring factors were; to be treated with kindness and consideration, personal viewpoint considered and to be treated impartially. The results suggested that a Relational Justice framework could be used to increase understanding of the organizational and managerial factors typical for companies with a low incidence of absenteeism. A Relational Justice approach to organizational management may be used to successfully lower absenteeism, change organizations and promote healthy and prosperous companies.

  5. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  6. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  7. The Challenges of Transitional Justice in Nigeria: Echoes from the ...

    African Journals Online (AJOL)

    Nonetheless, the victims' petitions were heard, to that effect, neither retributive nor restorative justice was offered to them. As tradition permits, the report will usually be published and implemented immediately. Nigerians waited patiently without recourse. Six months later, the Government of Obasanjo surprisingly annulled ...

  8. A Call for Restorative Justice in Higher Education Judicial Affairs

    Science.gov (United States)

    Clark, Karen L.

    2014-01-01

    This paper aims to provide support for post-secondary institutions' exploring and implementing restorative justice in their judicial practices. Although restorative principles have been employed successfully across the globe in criminal proceedings and K-12 education, most colleges and universities have not yet embraced this practice. By exploring…

  9. Electronic Performance Monitoring: An Organizational Justice and Concertive Control Perspective.

    Science.gov (United States)

    Alder, G. Stoney; Tompkins, Phillip K.

    1997-01-01

    Applies theories of organizational justice/concertive control to account for contradictions inherent in electronic monitoring of workers by organizations. Argues that results are usually positive when workers are involved in the design and implementation of monitoring systems, and monitoring is restricted to performance-related activities with…

  10. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  11. Day-to-day management of EU projects: Implementation of a local manager network to secure knowledge transfer

    Science.gov (United States)

    Hoffmann, Friederike; Meyer, Stefanie; de Vareilles, Mahaut

    2017-04-01

    In the past years there has been a strong push in Norway for increasing participation in the EU Framework Programmes for Research and Innovation. EU projects coordinated by the University of Bergen (UiB) usually receive management support from the central administration (mostly financial) in collaboration with a full- or part-time scientific project manager working on a fixed-term contract at the same institute as the project's principal scientist. With an increasing amount of granted EU projects, the number of scientific project managers employed across the whole university has also increased, and a need for coordination and professionalization of this service became obvious. Until recently, UiB had no unified structures and routines for training of newly recruited project managers, or for archiving and transferring routines and skills after the end of the project and the manager's employment contract. To overcome this administrative knowledge gap, the "Forum for scientific EU project managers at UiB" was founded in spring 2016 as an informal communication platform. Its purpose is to bring together current and previous scientific EU project managers from different disciplines to share their experiences. The main aim of the forum is to transfer and improve knowledge, skills and routines on effective management of EU funded projects, but also to function as a discussion forum where issues arising from handling international consortia can be reviewed. The group meets monthly and discusses current challenges from on-going EU projects as well as routines for specific project operation tasks. These routines are archived in an online best-practise guide which the group currently develops. The regular personal meetings are supplemented with an intense communication via a group mailing list and several individual mail- and phone-meetings. Since lessons learned during project implementation may improve future proposals, UiB research advisors for proposal support frequently

  12. A hermeneutic of justice. Justice as discernment in Matthew ...

    African Journals Online (AJOL)

    In some important dictionaries for the study of the New Testament, δικαιοσύνη has two meanings: justice in the sense of distributive justice and righteousness as a relational notion. In Matthew, we discover that the word concerns a threefold loyalty: loyalty to the law, loyalty to fellow people, and loyalty to the will of God. In the ...

  13. Effect of Organizational Justice and Job Satisfaction on Organizational Effectiveness with the Moderating Role of Strategic Commitment

    Directory of Open Access Journals (Sweden)

    Atif Kafayat

    2014-12-01

    Full Text Available In this era of highly competitive business environment every organization strives to be successful, and for that an organization pays great emphasis on organizational justice and job satisfaction of its employees in order to be effective and successful. This study investigates the impacts of organizational justice and Job Satisfaction on organizational effectiveness with moderating variable of strategic commitment. The organizational justice is subdivided into three types: Distributive Justice, Procedural justice, Interactional justice while job satisfaction is also divided into three dimensions as well: Working Condition, Job security and Autonomy. This study is an effort to contribute in the body of knowledge and helpful for organizations to improve their effectiveness. The data for this study is collected from Telecommunication sector of Pakistan via questionnaire.

  14. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  15. The Efficiency of Requesting Process for Formal Business-Documents in Indonesia: An Implementation of Web Application Base on Secure and Encrypted Sharing Process

    Directory of Open Access Journals (Sweden)

    Aris Budi Setyawan

    2014-12-01

    Full Text Available In recent business practices, the need of the formal document for business, such as the business license documents, business domicile letters, halal certificates, and other formal documents, is desperately needed and becomes its own problems for businesses, especially for small and medium enterprises. One stop service unit that was conceived and implemented by the government today, has not been fully integrated yet. Not all permits (related with formal document for business can be completed and finished in one place, businesses are still have to move from one government department to another government department to get a formal document for their business. With these practices, not only a lot of the time and cost will be sacrificed, but also businesses must always fill out a form with the same field. This study aims to assess and identify the problem, especially on applying the formal document for business, and use it as inputs for the development of a web application based on secure and encrypted sharing process. The study starts with a survey of 200 businesses that have applied the formal document for their business, to map the initial conditions of applying the formal document for business in Indonesia . With these applications that are built based on these needs, it is expected that not only the time, cost, and physical effort from both parties are becoming more efficient, but also the negative practices of bureaucratic and economic obstacles in business activities can be minimized, so the competitiveness of business and their contribution for national economy will increase.Keywords : Formal documents, Efficiencies, Web application, Secure and encrypted sharing process, SMEs

  16. Research uncovers what citizens' think about the security sector in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-07-27

    Jul 27, 2015 ... Here, direct experience with security services leads to more negative opinions, and perceptions of personal and family safety play a critical role in citizens' ... sector and the justice system as perceived by the general public.

  17. Reforming the South African Social Security Adjudication System ...

    African Journals Online (AJOL)

    Reforming the South African Social Security Adjudication System: innovative experiences ... Dispute resolution systems in the labour relations, business competition ... the rights of access to justice, to a fair trial and to just administrative action).

  18. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  19. Organizational Justice Perception According to Generations

    Directory of Open Access Journals (Sweden)

    Zeki YÜKSEKBİLGİLİ

    2015-12-01

    Full Text Available Although there are many different researches on the subject of organizational justice, there is no research on organizational justice perception according to generations. In this study, the research subject is defined if there is a difference on the perception of organizational justice between x and y generations. After a conduct of 430 surveys the Organizational Justice Scale is used. As a result, it is proved that there is no significant difference between the organizational justice perceptions according to generations

  20. Gendering agency in transitional justice

    DEFF Research Database (Denmark)

    Björkdahl, Annika; Selimovic, Johanna Mannergren

    2015-01-01

    -Herzegovina, where we point out instances of critical, creative, and transformative agency performed by women that challenge or negotiate patterns of gendered relations of domination. We collect women’s oral narratives and explore new sets of questions to capture women’s unique experiences in doing justice......Mainstream transitional justice and peacebuilding practices tend to re-entrench gendered hierarchies by ignoring women or circumscribing their presence to passive victims in need of protection. As a consequence we have limited knowledge about the multifaceted ways women do justice and build peace....... To address this lacuna we conceptualize and unpack the meaning of gendered agency, by identifying its critical elements and by locating it in space and in time. The conceptual work that we undertake is underpinned by empirical mapping of the transitional justice spaces in post-conflict Bosnia...

  1. Restorative justice innovations in Canada.

    Science.gov (United States)

    Wilson, Robin J; Huculak, Bria; McWhinnie, Andrew

    2002-01-01

    As many jurisdictions move towards more retributive measures as a means to address public discontent with crime, a parallel movement has developed in regard to restorative justice. This article presents three restorative initiatives currently in use in Canada. Each initiative addresses offender behavior and community engagement at a different point in the justice continuum. The use of Sentencing Circles is an example of how restorative justice principles can be instituted at the front end, prior to an offender becoming lodged in the system. The Restorative Justice Options to Parole Suspension project demonstrates how community engagement can assist in preventing offenders from being returned to the system once they have achieved conditional release. The Circles of Support and Accountability project has enlisted the support of professionally supported volunteers in the community reintegration of high-risk sexual offenders. These initiatives are presented within a framework of effective correctional interventions and increased empowerment for a variety of stakeholders. Copyright 2002 John Wiley & Sons, Ltd.

  2. Allegheny County Environmental Justice Areas

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Environmental Justice areas in this guide have been defined by the Pennsylvania Department of Environmental Protection. The Department defines an environmental...

  3. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  4. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  5. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  6. Transgenerational epigenetics and environmental justice.

    Science.gov (United States)

    Rothstein, Mark A; Harrell, Heather L; Marchant, Gary E

    2017-07-01

    Human transmission to offspring and future generations of acquired epigenetic modifications has not been definitively established, although there are several environmental exposures with suggestive evidence. This article uses three examples of hazardous substances with greater exposures in vulnerable populations: pesticides, lead, and diesel exhaust. It then considers whether, if there were scientific evidence of transgenerational epigenetic inheritance, there would be greater attention given to concerns about environmental justice in environmental laws, regulations, and policies at all levels of government. To provide a broader perspective on environmental justice the article discusses two of the most commonly cited approaches to environmental justice. John Rawls's theory of justice as fairness, a form of egalitarianism, is frequently invoked for the principle that differential treatment of individuals is justified only if actions are designed to benefit those with the greatest need. Another theory, the capabilities approach of Amartya Sen and Martha Nussbaum, focuses on whether essential capabilities of society, such as life and health, are made available to all individuals. In applying principles of environmental justice the article considers whether there is a heightened societal obligation to protect the most vulnerable individuals from hazardous exposures that could adversely affect their offspring through epigenetic mechanisms. It concludes that unless there were compelling evidence of transgenerational epigenetic harms, it is unlikely that there would be a significant impetus to adopt new policies to prevent epigenetic harms by invoking principles of environmental justice.

  7. Justice orientation as a moderator of the framing effect on procedural justice perception.

    Science.gov (United States)

    Sasaki, Hiroyuki; Hayashi, Yoichiro

    2014-01-01

    Justice orientation is a justice-relevant personality trait, which is referred to as the tendency to attend to fairness issues and to internalize justice as a moral virtue. This study examined the moderating role of justice orientation in the relationship between justice perception and response to a decision problem. The authors manipulated procedural justice and the outcome valence of the decision frame within a vignette, and measured justice orientation of 174 Japanese participants. As hypothesized, the results indicated an interaction between procedural justice and framing manipulation, which was moderated by individual differences in justice orientation. In negative framing, justice effects were larger for individuals with high rather than low justice orientation. The results are explained from a social justice perspective, and the contributions and limitations of this study are also discussed with respect to our sample and framing manipulation.

  8. New security measures are proposed for N-plants: Insider Rule package is issued by NRC

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    New rules proposed by the Nuclear Regulatory Commission (NRC) will require background investigations and psychological assessments of new job candidates and continual monitoring of the behavior of all power plant workers with access to sensitive areas. Licensees will have to submit an ''access authorization'' program for approval describing how they will conduct these security activities. The employee checks will go back five years to examine credit, educational, and criminal histories. Implementation of the rules could involve the Edison Electric Institute as an intermediary to funnel criminal checks from the Justice Department and FBI. The NRC is also considering a clarification of areas designated as ''vital'' because current designations may be too strict

  9. Smart Meter (Gateways). Attacks and implementation of a cost effective security solution; Smart Meter (Gateways). Angriffe und Umsetzung einer kostenguenstigen Sicherheitsloesung

    Energy Technology Data Exchange (ETDEWEB)

    Krauss, Christoph [Fraunhofer Research Institution AISEC, Garching (Germany); Sigl, Georg [Technische Univ. Muenchen (Germany); Stumpf, Frederic

    2012-07-01

    Smart Meter (Gateways) are a central component of future Smart Grids and their secure operation must be ensured. In this paper, we first present several attacks on actual smart meter and gateway systems. Next, we describe a possible security solution which meets the requirements of the protection profile specified by the German Federal Office for Information Security (BIS) as far as possible with current available technology and includes additional security mechanisms. To realize a cost-efficient solution, we use off-the-shelf hardware for the mandatory Hardware Security Module (HSM) in form of a Trusted Platform Module (TPM). Finally, we give a brief overview on alternative approaches. (orig.)

  10. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  11. [Environmental justice as an approach to tackle environmental health inequalities].

    Science.gov (United States)

    Bolte, Gabriele; Bunge, Christiane; Hornberg, Claudia; Köckler, Heike

    2018-06-01

    Current international studies show that environment-related diseases disproportionately affect vulnerable people. This is a case of environmental injustice. Environmental justice goes beyond the mere description of environment- and health-related social inequalities by comprising two dimensions of justice as a normative approach: distributional and procedural justice. Attempts to explain the link between social circumstances, the environment and health deal with both the socially unequal distribution of environmental hazards and environmental resources (exposure variation) and social differences in vulnerability to the health effects of environmental exposures (effect modification). Integrated monitoring approaches provide the basis for deriving interventions under various aspects of environmental justice. Parting from public health research and embedded in the Health in All Policies (HiAP) concept, environmental justice has now been taken up in a number of fields, including politics, administration and practice. There are strategic considerations and attempts to anchor it in politics at the federal, state and the communal level, both by government and non-government groups. Health-promoting urban development is a core field for intervention. The Soziale Stadt (Social City) programme for promoting urban planning and construction as well as place oriented sectoral planning make an important contribution by helping to focus on urban spaces with multiple health hazards and to implement target group-oriented participation processes. There continues to be a need to develop methods and systematically implemented evaluations of political strategies and corresponding interventions regarding their effects on inequalities in health and environmental justice.

  12. Perception des institutions de sécurité et de justice par les abidjanais

    Directory of Open Access Journals (Sweden)

    Antoine Nassoua Okpo

    2016-07-01

    Full Text Available This study aims at knowing the Abidjanian perception and the induced representation of Ivorian institutions of security and justice. We used theories of motivation, in particular the one concerning motivational content, in order to understand the Abidjanian judgments. Data from a questionnaire and some interviews have provided information that highlight a negative image among citizens of the Ivorian system of security and justice. This discrediting of the system is mainly the result of different dissatisfaction experiences and other complaints towards the system and its agents.

  13. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  14. Exploring Intervening Influence of Interactional Justice between Procedural Justice and Job Performance: Evidence from South Asian Countries

    Directory of Open Access Journals (Sweden)

    Muhammad Ashraf

    2018-02-01

    Full Text Available The paper investigates the intervening influence of interactional justice between procedural justice and job performance (task, contextual and adaptive performance of the faculty members of Karachi (Pakistan and Dhaka (Bangladesh based government colleges by using Structural Equation Modelling (SEM. Data, for this study, has been collected through pre-designed close-ended questionnaire. The intervening variable fully mediated the relationship between procedural justice and job performance. The result of this study indicates that the performance of government college faculty members can be improved by ensuring fair procedures and dignified treatment of faculty members in the working environment. It can be concluded that teachers can accommodate harsh procedures, subject to courteously and fairly communicated. Significance of this study is that it has investigated the least researched areas in Pakistan and Bangladesh. Its findings can be helpful to the government and college administration while making and implementing policies for college education development in both countries

  15. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  16. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  17. Secure Multiparty AES

    Science.gov (United States)

    Damgård, Ivan; Keller, Marcel

    We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + {{400}over{255}} expected elementary operations in expected 70 + {{20}over{255}} rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive security against at most one corrupted player) in a local network showed that one block can be encrypted in 2 seconds. We also argue that this result could be improved by an optimized implementation.

  18. Application Security in the ISO27001 Environment

    CERN Document Server

    Vinod, Vasudevan; Firosh, Ummer

    2008-01-01

    Application Security in the ISO27001 Environment demonstrates how to secure software applications within a best practice ISO/IEC 27001 environment and supports implementation of the PCI DSS Payment Application Security Standard.

  19. Environmental justice and healthy communities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    The environmental justice movement has come a long way since its birth a decade ago in rural and mostly African American Warren County, North Carolina. The selection of Warren County for a PCB landfill, they brought national attention to waste facility siting inequities and galvanized African American church and civil rights leaders` support for environmental justice. The demonstrations also put {open_quotes}environmental racism{close_quotes} on the map and challenged the myth that African Americans are not concerned about or involved in environmental issues. Grassroots groups, after decades of struggle, have grown to become the core of the multi-issue, multiracial, and multi-regional environmental justice movement. Diverse community-based groups have begun to organize and link their struggles to issues of civil and human rights, land rights and sovereignty, cultural survival , racial and social justice, and sustainable development. The impetus for getting environmental justice on the nations`s agenda has come from an alliance of grassroots activists, civil rights leaders, and a few academicians who questioned the foundation of the current environmental protection paradigm--where communities of color receive unequal protection. Whether urban ghettos and barrios, rural {open_quotes}poverty pockets,{close_quotes} Native American reservations, or communities in the Third World, grassroots groups are demanding an end to unjust and nonsustainable environmental and development policies.

  20. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  1. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  2. Victimisation and justice in intercultural context in Serbia

    Directory of Open Access Journals (Sweden)

    Nikolić-Ristanović Vesna

    2015-01-01

    Full Text Available During 2013, within the ALTERNATIVE project, Victimology Society of Serbia conducted an empirical research study with the aim to find out how people from three multiethnic communities in Serbia deal with interethnic conflicts in their everyday life and to identify both problems and positive experiences in solving them. It also analysed how victims are treated, how the security and justice are perceived by the citizens, and what is the place of restorative approaches in dealing with conflicts and security. The research was conducted in Bačka Palanka, Bač, Prijepolje and Medveđa. It consisted of qualitative and quantitative part, and it had a strong action dimension. After a brief description of the research methodology, we present main research findings related to the conflicts that have been evolving since 1990 between members of different ethnic groups in three multiethnic communities in Serbia, focusing on the prevalence and characteristics of victimisation and respondents’ notions of justice, i.e. mechanisms suitable to achieve justice in the concrete cases of victimisation they experienced. In the conclusion we point out that respondents attribute high relevance to both formal and informal restorative approaches, suggesting the need of citizens in general, and victims in particular to actively participate in the process of conflict transformation and prevention of further victimisations. [The research leading to these results has received funding from the European Union’s Seventh Framework Programme (FP7-SEC-2011-1 under grant agreement n°285368

  3. Secure software development training course

    Directory of Open Access Journals (Sweden)

    Victor S. Gorbatov

    2017-06-01

    Full Text Available Information security is one of the most important criteria for the quality of developed software. To obtain a sufficient level of application security companies implement security process into software development life cycle. At this stage software companies encounter with deficit employees who able to solve problems of software design, implementation and application security. This article provides a description of the secure software development training course. Training course of application security is designed for co-education students of different IT-specializations.

  4. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  5. Special Justice for Peace: A Transitional Justice Model According to Modern Tendencies and Orientations of Law and Justice

    OpenAIRE

    Carlos Arturo Gómez Pavajeau

    2016-01-01

    The article analyses the constitutional implications of the peace agreement about Colombia’s armed conflict. It examines constitutional rules and international instruments about human rights, confronting the agreement with justice criteria in the national and international context, to underline the role of justice for the definitive solution of the conflict. By using the methodology of opposing concepts, it reviews the implications of formal justice and material justice, to establish the supe...

  6. Social Justice, Research, and Adolescence.

    Science.gov (United States)

    Russell, Stephen T

    2016-03-01

    In what ways might research on adolescence contribute to social justice? My 2014 Presidential Address identified strategies for social justice in our field. First, we need research that is conscious of biases, power, and privilege in science, as well as in our roles as scholars. Second, we need research that attends to inequities in lives of adolescents, and as scholars we need to question the ways that our research may unwittingly reinforce those inequalities. Third, we need research that attends to urgencies, that is, issues or conditions that influence adolescents' well-being which demand attention and action. I draw from a range of concepts and theoretical perspectives to make the case for a framework of social justice in research on adolescence.

  7. Green justice in the city

    DEFF Research Database (Denmark)

    Rutt, Rebecca Leigh; Gulsrud, Natalie Marie

    2016-01-01

    tIn this short communication, we discuss European urban green space (UGS) research from an environ-mental justice perspective. We show that European UGS scholarship primarily focuses on functionalvalues and managerial aspects of UGS, while paying less attention to equity in the enjoyment of andde...... of anddecision-making around UGS. On this basis we discuss potentials for European urban green space researchto take up a more explicit environmental justice framing to shed much-needed light on injustices inEuropean cities and inspire change in policy and practice.......tIn this short communication, we discuss European urban green space (UGS) research from an environ-mental justice perspective. We show that European UGS scholarship primarily focuses on functionalvalues and managerial aspects of UGS, while paying less attention to equity in the enjoyment...

  8. Spheres of Justice within Schools

    DEFF Research Database (Denmark)

    Sabbagh, Clara; Resh, Nura; Mor, Michal

    2006-01-01

    This article argues that there are distinct spheres of justice within education and examines a range of justice norms and distribution rules that characterize the daily life of schools and classrooms. Moving from the macro to micro level, we identify the following five areas: the right to education......, the allocation of (or selection into) learning places, teaching–learning practices, teachers’ treatment of students, and student evaluations of grade distribution. We discuss the literature on the beliefs by students and teachers about the just distribution of educational goods in these five domains......, and on the practices used in the actual allocation of these goods. In line with normative ‘spheres of justice’ arguments in social theory, we conclude that the ideals of social justice within schools vary strongly according to the particular resource to be distributed. Moreover, these ideals often do not correspond...

  9. A broader view of justice.

    Science.gov (United States)

    Jecker, Nancy S

    2008-10-01

    In this paper I argue that a narrow view of justice dominates the bioethics literature. I urge a broader view. As bioethicists, we often conceive of justice using a medical model. This model focuses attention at a particular point in time, namely, when someone who is already sick seeks access to scarce or expensive services. A medical model asks how we can fairly distribute those services. The broader view I endorse requires looking upstream, and asking how disease and suffering came about. In contrast to a medical model, a social model of justice considers how social determinants affect the health of a population. For example, social factors such as access to clean drinking water, education, safe workplaces, and police protection, profoundly affect risk for disease and early death. I examine one important social determinant of health, health care coverage, to show the limits of a medical model and the merits of a broader view.

  10. Editors' Introduction: Justice, Rights, Literature

    Directory of Open Access Journals (Sweden)

    Joxerramon Bengoetxea

    2014-12-01

    Full Text Available The articles gathered in this issue are the result of papers presented at the workshop held at the Oñati International Institute for the Sociology of Law on 20-21 May 2013 on Perspectives of Justice in Literature: Perspectives from Justice and Fundamental Rights in Literature: an Approach from Legal Culture in a European context. Literature and literary fiction can act as a thread that helps different disciplines to communicate with each other and can thus help go beyond the strictly legal field opening up to questions of justice and rights. These papers deal with issues of justice - mainly Fundamental Rights, but also procedural aspects of justice and its administration, philosophical perspectives of justice - and of legal culture - local, European, Universal - as reflected through and by literature. Los artículos que conforman este número son el resultado de las ponencias presentadas en el workshop celebrado en el Instituto Internacional de Sociología Jurídica de Oñati el 20 y 21 mayo de 2013 sobre las perspectivas de la justicia en la literatura: Perspectivas desde la Justicia y los Derechos Fundamentales en la Literatura: un Enfoque de Cultura Jurídica en el Contexto Europeo. La literatura y la ficción literaria pueden ser un hilo que favorece que diferentes disciplinas se comuniquen entre sí y pueden de esta forma ayudar a ir más allá del campo jurídico estricto, planteando cuestiones sobre justicia y derechos. Estos artículos tratan sobre aspectos de la justicia (principalmente derechos fundamentales, pero también sobre procedimiento judicial y administración de la justicia, perspectivas filosóficas de la justicia y de cultura jurídica (local, europea, universal, de la forma en la que se han reflejado en la literatura.DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=2543450

  11. Engineering justice transforming engineering education and practice

    CERN Document Server

    Leydens, Jon A

    2018-01-01

    Using social justice as a catalyst for curricular transformation, Engineering Justice presents an examination of how politics, culture, and other social issues are inherent in the practice of engineering. It aims to align engineering curricula with socially just outcomes, increase enrollment among underrepresented groups, and lessen lingering gender, class, and ethnicity gaps by showing how the power of engineering knowledge can be explicitly harnessed to serve the underserved and address social inequalities. This book is meant to transform the way educators think about engineering curricula through creating or transforming existing courses to attract, retain, and motivate engineering students to become professionals who enact engineering for social justice. Engineering Justice offers thought-provoking chapters on: why social justice is inherent yet often invisible in engineering education and practice; engineering design for social justice; social justice in the engineering sciences; social justice in human...

  12. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  13. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  14. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  15. THE THEORETICAL PRINCIPLES OF JUSTICE WITHIN THE PENAL ASPECT

    Directory of Open Access Journals (Sweden)

    Kristina Sawen

    2017-05-01

    Full Text Available Justice will be fulfilled when the restraint on actions to benefit themselves by way of seizing what belongs to someone else is or reject what was supposed to be given to others.Justice will be fulfilled when self-restraint are applied to on actions that will only be self-benefiting for the said individuals by way of seizing someone else’s belongings or rejecting what is supposed to be given to others. Justice will be seen in the legal provisions governing and being framed in managing the human life even if that provision is still in the form of ideas that poured in through the legal provisions of the country. Justice can be seen in legal provisions that govern and frame the human’s life even if that provision is still in the form of ideas that are subscribed in the legal provisions of the country. The threat of sanctions contained in the law as one element of a crime, is also a manifestation of the value of the balance between the prohibition or the permissibility of things which will manifest themselves in a sanction when a violation of these provisions. The threat of a sanction that is contained in the law, as an element of crime, is also a form of manifestation of the accessibility of a certain value of balance between prohibition or permissibility which will be visible in the form of a sanction when a violation of these provisions occurs. As a value of balance between the ban and the threat of sanctions would also form the idea of the values of justice in law, which is expected to be obeyed by the people. The value of a balance between the prohibitions or threats will also form the values of justice in law, which is expected to be adhered to by by the people. So the sosial order and security of living together can be met.The importance of justice seen as essential virtues of that must be firmly held and at the same time the spirit of the basis of various institutions basic social a society .It means give it a chance in a fair manner and

  16. Directive of the Minister of Justice of 16 December 1969, Stcrt. 248 concerning the implementation of Section 83 of the Nuclear Energy Act (Civil Servants Competent for the Prosecution of Criminal Acts)

    International Nuclear Information System (INIS)

    1969-01-01

    This Directive, made in implementation of the Nuclear Energy Act, Lays down that Chief Inspectors and Regional Inspectors of the Ministry of Social Affairs and Public health are competent in respect of the prosecution of criminal acts. (NEA) [fr

  17. Engaging Global Justice Through Internships (Penultimate Draft)

    OpenAIRE

    Ericka Tucker

    2014-01-01

    Engaging with Global Justice through InternshipsGlobal justice, on its face, seems like an impossible task. As individuals, even citizens of wealthy and powerful countries, the task of economic, social and political justice seems to outstrip our intellectual, practical and emotional abilities. Considering the scope of 'global' justice, it would appear that a massive coordinated effort would be necessary to overcome the problems of global injustice, yet it would seem such coordination may be i...

  18. Globalization and Social Justice in OECD Countries

    OpenAIRE

    Björn Kauder; Niklas Potrafke

    2015-01-01

    Social justice is a topic of importance to social scientists and also political decision makers. We examine the relationship between globalization and social justice as measured by a new indicator for 31 OECD countries. The results show that countries that experienced rapid globalization enjoy social justice. When the KOF index of globalization increases by one standard deviation, the social justice indicator increases by about 0.4 points (on a scale from 1 to 10). The policy implication is t...

  19. 75 FR 9613 - Draft NIJ Restraints Standard for Criminal Justice

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF JUSTICE Office of Justice Programs [OJP (NIJ) Docket No. 1512] Draft NIJ Restraints Standard for Criminal Justice AGENCY: National Institute of Justice, Office of Justice Programs, DOJ. ACTION: Notice of Draft NIJ Restraints Standard for Criminal Justice and Certification Program...

  20. Restorative Justice: A Changing Community Response

    Science.gov (United States)

    Ryan, Thomas G.; Ruddy, Sean

    2015-01-01

    Our purpose herein is to demonstrate how restorative justice continues to unfold globally and we explain how the use of a restorative justice ideology and intervention leads to a common alternative, not only in criminal justice institutions, but also within social agencies, such as elementary schools, and the related social support systems. We…

  1. Common Frame of Reference and social justice

    NARCIS (Netherlands)

    Hesselink, M.W.; Satyanarayana, R.

    2009-01-01

    The article "Common Frame of Reference and Social Justice" by Martijn W. Hesselink evaluates the Draft Common Frame of Reference (DCFR) of social justice. It discusses the important areas, namely a common frame of Reference in a broad sense, social justice and contract law, private law and

  2. Climate Change, Human Rights, and Social Justice.

    Science.gov (United States)

    Levy, Barry S; Patz, Jonathan A

    2015-01-01

    The environmental and health consequences of climate change, which disproportionately affect low-income countries and poor people in high-income countries, profoundly affect human rights and social justice. Environmental consequences include increased temperature, excess precipitation in some areas and droughts in others, extreme weather events, and increased sea level. These consequences adversely affect agricultural production, access to safe water, and worker productivity, and, by inundating land or making land uninhabitable and uncultivatable, will force many people to become environmental refugees. Adverse health effects caused by climate change include heat-related disorders, vector-borne diseases, foodborne and waterborne diseases, respiratory and allergic disorders, malnutrition, collective violence, and mental health problems. These environmental and health consequences threaten civil and political rights and economic, social, and cultural rights, including rights to life, access to safe food and water, health, security, shelter, and culture. On a national or local level, those people who are most vulnerable to the adverse environmental and health consequences of climate change include poor people, members of minority groups, women, children, older people, people with chronic diseases and disabilities, those residing in areas with a high prevalence of climate-related diseases, and workers exposed to extreme heat or increased weather variability. On a global level, there is much inequity, with low-income countries, which produce the least greenhouse gases (GHGs), being more adversely affected by climate change than high-income countries, which produce substantially higher amounts of GHGs yet are less immediately affected. In addition, low-income countries have far less capability to adapt to climate change than high-income countries. Adaptation and mitigation measures to address climate change needed to protect human society must also be planned to protect

  3. Juvenile Justice: A Bibliographic Essay.

    Science.gov (United States)

    Kondak, Ann

    1979-01-01

    Provides information on the background and legal framework of the juvenile justice system, the issues that confront it, and the pressures for change, as well as noting some sources of information on the system. Available from American Association of Law Libraries, 53 West Jackson Blvd., Suite 1201, Chicago, Illinois 60604; sc $4.00. (Author/IRT)

  4. Current Issues and Distributive Justice.

    Science.gov (United States)

    Rosal, Lorenca Consuelo

    1992-01-01

    Provides a lesson plan on the issue of distributive justice, or fairness in the ways things are distributed among individuals and groups. Includes a student reading concerning a proposed guaranteed standard of living. Proposes an activity that calls for student discussion of a constitutional amendment that would offer such a guarantee. (SG)

  5. Feminism, Budgeting and Gender Justice

    Science.gov (United States)

    Misra, S. N.; Ghadai, Sanjaya Kumar

    2017-01-01

    The Fourth Conference on Women at Beijing (1995) underlined the importance of gender mainstreaming; spurring India to provide for separate Gender Budgeting in 2005-06. The Constitution tries to make fine balance between right to equality and positive discrimination for promoting gender justice in India. Yet high levels of Gender Inequality Index…

  6. Autonomy, Vulnerability, Recognition, and Justice

    NARCIS (Netherlands)

    Anderson, J.H.; Honneth, A.

    2005-01-01

    One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life,

  7. Social Justice for Human Development

    Science.gov (United States)

    Jaramillo, Nathalia

    2010-01-01

    The topic of social justice in U.S. teacher education has a long and protracted history that harkens back to the civil rights movement of the mid-20th century, with its attendant legal rulings and constitutional amendments that sought to undo the legacy of discrimination against communities of color, women, and the poor. What is lost,…

  8. Flaunting It for Social Justice

    Science.gov (United States)

    Jackson, Janna

    2010-01-01

    By examining various movements in education in "Flaunt It! Queers Organizing for Public Education and Justice," Quinn and Meiners show a systematic and intentional "straightening" of American public schools. Throughout the book, the authors explore how various public and private realms operate to try to silence queer voices, and they discuss ways…

  9. Bodies, Pollution, and Environmental Justice

    Science.gov (United States)

    Sze, Julie

    2006-01-01

    The field of American Studies explores the cultures and practices of individuals and communities in the United States, as well as their transnational exchanges and impacts. It is an interdisciplinary field that is based on making "connections." Environmental justice, as a social movement, also makes important connections. It integrates…

  10. Terrorism, forgiveness and restorative justice

    NARCIS (Netherlands)

    Pemberton, A.

    2014-01-01

    This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly

  11. Social Justice and Leadership Development

    Science.gov (United States)

    Forde, Christine; Torrance, Deirdre

    2017-01-01

    The revised professional standards for the teaching profession in Scotland are underpinned by a set of values which includes a detailed articulation of social justice for education covering rights, diversity and sustainability. There is a future orientation in these standards that privileges the contribution of teachers and leaders to realizing a…

  12. Cultural Cleavage and Criminal Justice.

    Science.gov (United States)

    Scheingold, Stuart A.

    1978-01-01

    Reviews major theories of criminal justice, proposes an alternative analytic framework which focuses on cultural factors, applies this framework to several cases, and discusses implications of a cultural perspective for rule of law values. Journal available from Office of Publication, Department of Political Science, University of Florida,…

  13. What is Justice for Juveniles?

    Science.gov (United States)

    Rothwell, Jennifer Truran

    1997-01-01

    Provides background information and related learning activities for three areas of inquiry involving youth and violence: (1) "Evolution of the Juvenile Justice System"; (2) "The Literature of Crime and Poverty"; (3) "Youth Crime and Public Policy." Includes a list of six recommended Web sites. (MJP)

  14. Two Ideals of Educational Justice

    Science.gov (United States)

    Stillwaggon, James

    2016-01-01

    Background/Context: This essay takes up McClintock's (2004) critique of educational discourses as overly dependent upon a distributive model of justice and largely ignorant of the formative assumptions that ground educational policy and practice. Purpose/Objective/Research Question/Focus of Study: The question that McClintock's analysis begs is…

  15. Climate change, responsibility, and justice.

    Science.gov (United States)

    Jamieson, Dale

    2010-09-01

    In this paper I make the following claims. In order to see anthropogenic climate change as clearly involving moral wrongs and global injustices, we will have to revise some central concepts in these domains. Moreover, climate change threatens another value ("respect for nature") that cannot easily be taken up by concerns of global justice or moral responsibility.

  16. Issues with Access to Acquisition Data and Information in the Department of Defense: A Closer Look at the Origins and Implementation of Controlled Unclassified Information Labels and Security Policy

    Science.gov (United States)

    2016-12-19

    directly affect the access and utility of acquisition databases. The current information security environment does not establish a consistent... information ” without a nondisclosure agreement • proposing a legislative amendment to 10 U.S.C. 2320, which allows access to technical data for providing...ISSUES WITH Access to Acquisition Data and Information IN THE DEPARTMENT OF DEFENSE A Closer Look at the Origins and Implementation of

  17. Human biomonitoring from an environmental justice perspective

    DEFF Research Database (Denmark)

    Morrens, Bert; Den Hond, Elly; Schoeters, Greet

    2017-01-01

    Background: Environmental justice research shows how socially disadvantaged groups are more exposed and more vulnerable to environmental pollution. At the same time, these groups are less represented and, thus, less visible in biomedical studies. This socioeconomic participation bias is a form...... of environmental injustice within research practice itself. Methods: We designed, implemented and evaluated a targeted recruitment strategy to enhance the participation of socially disadvantaged pregnant women in a human biomonitoring study in Belgium. We focused on women of Turkish and Moroccan descent...... in direct, person-to-person contact with trusted buddies and supported by practical advice about cultural and linguistic sensitivity, it was possible to increase study participation of socially disadvantaged people. Above all, this required openness and flexibility in the mind-set of researchers so...

  18. Employees' perceptions of justice in performance appraisals.

    Science.gov (United States)

    Vasset, Frøydis; Marnburg, Einar; Furunes, Trude

    2010-05-01

    Of all the tasks undertaken by human resource managers, performance appraisals (PAs) are one of the most unpopular among employees (Meyer 1991, Murphy and Cleveland 1995, Holbrook 2002, Jackman and Strober 2003). As PA guides and plans show (Fletcher 2004, CatalystOne 2010), PAs can be implemented in similar ways in organisations throughout Europe and developed countries elsewhere. But, if employees perceive PA processes as unfair, they may reject the usefulness and validity of the information they receive and so may not be motivated to change behaviour. This article concerns perceptions of organisational justice and explains the results of a study of perceived fairness in PAs among nurses and auxiliary nurses in Norway's municipal health service.

  19. Doing Justice Today: A Welcoming Embrace for LGBT Students in Christian Schools

    Science.gov (United States)

    Joldersma, Clarence W.

    2016-01-01

    The article argues for welcoming LGBT students in Christian schools. The article develops an idea of justice based on Nicholas Wolterstorff's idea of claim-rights of vulnerable groups that have been wronged, and applies this to the security and recognition of LGBT students in Christian schools. The article presents empirical evidence about the…

  20. Jurisprudence by the European Court of Justice in the field of environment protection

    International Nuclear Information System (INIS)

    Lenz, C.O.

    1993-01-01

    The lecture gives a detailed overview of the jurisprudence by the European Court of Justice, especially of the legal and contractual basis of environment protection. It deals with the distribution of responsibilities, jurisprudence on water protection, clean air presevation, and disposal law. From a global viewpoint, the European Court of Justice can only give impulses, the implementation of concrete measures being the task of the politicians. (HSCH) [de