WorldWideScience

Sample records for justice secured implementing

  1. The first year of implementation of the Child Justice Act

    African Journals Online (AJOL)

    The Child Justice Act 75 of 2008 mandates the Minister of Justice and Constitutional Development to report annually on the implementation of the Child Justice Act to the Parliamentary Portfolio Committee on Justice and Constitutional Development. On 1 April 2011 a year had passed since the implementation of the Child ...

  2. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    When the United Nations Security Council first met in January 1946, it was unable to reach agreement on rules of procedure to govern its operation. Instead, “provisional” rules were adopted in anticipation of further negotiation at a later date. The same provisional rules govern the Council’s work...... today, but provide only the skeletal framework of its contemporary practice. From the early 1990s, the Council increasingly implemented informal working methods to expedite its decision-making. This paper will critically examine the tension between the procedural practice of the Security Council...... to act ‘in conformity with the principles of justice and international law’ as stipulated in the very first provision of the United Nations Charter. Scholarship to date has largely ignored the procedural context of Security Council decisions, notwithstanding it provides the very structure within which...

  3. 28 CFR 16.132 - Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records...

    Science.gov (United States)

    2010-07-01

    ... System—Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ-006. 16.132...

  4. Continent at a Crossroads: Prosperity, Justice, and Security in South America

    National Research Council Canada - National Science Library

    Scott, Frances K

    2006-01-01

    This Special Bibliography Series, Number 107, "Continent at the Crossroads: Prosperity, Justice, and Security in South America," was developed by Social Sciences Bibliographer and Reference Librarian Frances K...

  5. An Exploration of the Implementation of Restorative Justice in an Ontario Public School

    Science.gov (United States)

    Reimer, Kristin

    2011-01-01

    This qualitative case study explores the implementation of restorative justice within one Ontario Public School. Restorative justice is a philosophy and a process for dealing with harmful behaviour, viewing such behaviour as a violation of relationships, not rules. My research seeks to present how restorative justice has been implemented in one…

  6. The uniqueness of the energy security, justice, and governance problem

    International Nuclear Information System (INIS)

    Goldthau, Andreas; Sovacool, Benjamin K.

    2012-01-01

    This article argues that among all policy fields exhibiting externalities of a global scale, energy stands out on four dimensions: vertical complexity, horizontal complexity, higher entailed costs, and stronger path dependency. These structural attributes are at odds with contemporary key challenges of energy security, energy justice, and low carbon energy transition. With regard to the latter, energy governance challenges occur related to unclear levels of authority and weak resilience. This has implications for energy scholarship, specifically relating to the political economy of energy transitions, discussions about common pool resources, systems analysis, and other neighboring disciplines. - Highlights: ► Among all policy fields exhibiting global externalities, energy stands out. ► It is characterized by greater complexity, higher costs, and stronger path dependency. ► This is at odds with key challenges relating to security, justice, and transition. ► Problems are particularly related to unclear levels of authority and weak resilience. ► Energy scholarship needs to focus further on these issues.

  7. International and Local Visions of the Justice and Security Sector in the West Bank

    Directory of Open Access Journals (Sweden)

    Ida Nafstad

    2018-03-01

    Full Text Available Considerable efforts by leading experts and funds from around the world are put into restructuring the West Bank justice and security sector (JSS. This is an effort done in a highly contested environment, with an ongoing Israeli occupation and weak local trust in the Palestine Authority (PA. This article analyzes the understandings by local Palestinian non-government organizations and international bodies aiding in building the JSS of what a legitimate development of the JSS is and should be, and whose voices become dominant in the discussions and implementations of it. The argument made is that Western legal knowledge, with its focus on security and technocratic solutions, have been dominant at the expense of core political solutions in regard to the Israeli occupation and the workings of the PA, and that it has downplayed the local context, local voices and their understandings of a legitimate JSS.

  8. Crime Victims Support System and Restorative Justice: Possible Implementation in Malaysia

    Directory of Open Access Journals (Sweden)

    Azlinda Azman, PhD

    2013-06-01

    Full Text Available Victims’ position is increasingly acknowledged in the criminal justice system across the world. Because of that, criminal justice systems in various countries slowly transform from focusing too much on the relationship between offenders and the legal system and to between the offenders and their victims. Several programs are highlighted such as victim-offender mediation, family group conferences, reparative orders and referral orders in this article. Findings from several studies support the effectiveness of the programs on both the victims and the offenders in terms of several measurements such as satisfaction and recidivism. Looking at this revolution, Malaysian academicians and professionals are beginning to recognize restorative justice as a possible revolution to its criminal justice system, but Malaysian criminal justice system first needs to strengthen or build components that support victims of crime, as this is one of the main principles of restorative justice. Currently, Malaysia still focuses on offenders and their relationship with legal system, but not much with their own victims (physical, emotional, and psychological consequences of the crime. Several possible issues before formal implementation of restorative justice are discussed. The issues (culture, training, and attitude of Malaysian people, including the victims, offenders, and those who work with them can influence the efficiency of restorative justice programs if not identified systematically. These issues can also be the possible research areas to be ventured in the future as these researches can help in implementation.

  9. The European Union as an Area of Freedom, Security and Justice

    NARCIS (Netherlands)

    Fletcher, Maria; Herlin-Karnell, Ester; Matera, Claudio

    2016-01-01

    Europe’s area of freedom, security and justice is of increasing importance in contemporary EU law and legislation. It is worthy of special research attention because of its high-stakes content (particularly from an individual and a state perspective) and because its development to date has

  10. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  11. Best Implementation Practices: Disseminating New Assessment Technologies in a Juvenile Justice Agency

    Science.gov (United States)

    Young, Douglas; Moline, Karl; Farrell, Jill; Bierie, David

    2006-01-01

    Much has been written in recent years about advances in assessment technologies designed to aid decision making in the juvenile justice system. Adoption and implementation of this latest generation of actuarial tools, however, have lagged behind their development. Assessment in juvenile justice exemplifies the "science-practice gap" that…

  12. Enhancing implementation security of QKD

    Science.gov (United States)

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  13. Internet security information system implement method

    International Nuclear Information System (INIS)

    Liu Baoxu; Mei Jie; Xu Rongsheng; An Dehai; Yu Mingjian; Chen Xiangyang; Zheng Peng

    1999-01-01

    On the basis of analysis of the key elements that will affect the Internet Security Information System, the author takes UNIX Operating System as an example, and provides the important stages that must be considered when implementing the Internet Security Information System. An implemental model of the Internet Security Information System is given

  14. 6 CFR 11.13 - Referrals to the Department of Justice.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Referrals to the Department of Justice. 11.13 Section 11.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.13 Referrals to the Department of Justice. Referrals of debts to the Department of Justice for collection will...

  15. Procedural (in)justice in the implementation of solar energy: The case of Charanaka solar park, Gujarat, India

    International Nuclear Information System (INIS)

    Yenneti, Komali; Day, Rosie

    2015-01-01

    Solar PV is being rolled out on a large scale in India and other emerging economies, but in the enthusiasm for solar’s promise of plentiful, low carbon energy, the social and environmental justice concerns accompanying such infrastructure development are in danger of being overlooked. In this context, this paper, using the case study of ‘Charanaka Solar Park’ in Gujarat state, qualitatively analyses the degree of provision for procedural justice in solar energy implementation in India using a framework drawn from social environmental and energy justice literatures. The case study illustrates how the failure of various aspects of procedural justice can result in unnecessarily large impacts on the livelihoods of rural communities and the further marginalisation of those of lowest status. We conclude with discussion of the aspects of procedural justice that need attention in low carbon energy developments in developing countries alongside some policy and governance suggestions for the achievement of this in India and elsewhere. - Highlights: • Procedural justice issues in Charanaka solar park implementation are examined • New insights into participation, enfranchisement, and recognition are provided • Lack of information sharing and acknowledgement of local knowledge • Lack of adequate participation and enfranchisement of the affected communities • Consideration of procedural justice important for success of National Solar Mission

  16. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  17. 83 CHALLENGES AND PROSPECTS OF THE JUVENILE JUSTICE ...

    African Journals Online (AJOL)

    Fr. Ikenga

    Juvenile justice administration in Nigeria is weak and has been given very .... The Nigerian criminal justice system, of which the juvenile justice system is an integral part, ... as instruments of security and justice but as weapons of oppression8.

  18. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  19. Organisational justice, trust and perceptions of fairness in the implementation of agenda for change

    Energy Technology Data Exchange (ETDEWEB)

    Williamson, Keren, E-mail: williamsonk2@cardiff.ac.u [Department of Radiography, School of Healthcare Studies, Cardiff University, Heath Park, Cardiff CF14 4XN (United Kingdom); Williams, Kristy J. [Radiotherapy Department, Queen Elizabeth Hospital, Birmingham B15 2TH (United Kingdom)

    2011-02-15

    Background: Agenda for Change (AfC) was introduced to ensure equity of rewards for work of equal value, irrespective of professional background. Radiographer grades were evaluated and matched against job profiles and placed within the relevant pay bands of AfC. Equity theory suggests that individuals will make comparisons between themselves and others with regard to their rewards resulting in justice perceptions which may affect morale and work behaviours. This case study explored the justice perceptions and effect on co-worker relationships of a group of therapeutic radiographers in the process and outcomes of the implementation of AfC within their organisation. Method: An existential phenomenological approach was used and self administered questionnaires utilised for data collection. A sample of band 5-8a therapeutic radiographers from one regional Cancer Centre was questioned. Content analysis was applied to systematically and objectively categorise information into recurring themes. Findings: Open coding identified two main themes which were termed Recognition and Resentment. Data was analysed in terms of organisational justice theory and issues were identified in relation to recognition of extra-role behaviour and trust in those tasked with job matching and decision making. Conclusion: There appeared to be a perceived lack of justice in relation to the implementation of AfC, resulting in a lowering of staff morale and organisational commitment. However, no effect on co-worker relations was reported. Professional values appear to supersede issues of organisational justice, with staff asserting that patient care must override any matter of personal dissatisfaction.

  20. Organisational justice, trust and perceptions of fairness in the implementation of agenda for change

    International Nuclear Information System (INIS)

    Williamson, Keren; Williams, Kristy J.

    2011-01-01

    Background: Agenda for Change (AfC) was introduced to ensure equity of rewards for work of equal value, irrespective of professional background. Radiographer grades were evaluated and matched against job profiles and placed within the relevant pay bands of AfC. Equity theory suggests that individuals will make comparisons between themselves and others with regard to their rewards resulting in justice perceptions which may affect morale and work behaviours. This case study explored the justice perceptions and effect on co-worker relationships of a group of therapeutic radiographers in the process and outcomes of the implementation of AfC within their organisation. Method: An existential phenomenological approach was used and self administered questionnaires utilised for data collection. A sample of band 5-8a therapeutic radiographers from one regional Cancer Centre was questioned. Content analysis was applied to systematically and objectively categorise information into recurring themes. Findings: Open coding identified two main themes which were termed Recognition and Resentment. Data was analysed in terms of organisational justice theory and issues were identified in relation to recognition of extra-role behaviour and trust in those tasked with job matching and decision making. Conclusion: There appeared to be a perceived lack of justice in relation to the implementation of AfC, resulting in a lowering of staff morale and organisational commitment. However, no effect on co-worker relations was reported. Professional values appear to supersede issues of organisational justice, with staff asserting that patient care must override any matter of personal dissatisfaction.

  1. Security, justice and the energy crossroads: Assessing the implications of the nuclear phase-out in Germany

    International Nuclear Information System (INIS)

    Rehner, Robert; McCauley, Darren

    2016-01-01

    The nuclear melt-down in Fukushima resulted in diverging energy policy decisions across the world where Germany decided to opt out of nuclear electricity production. Yet, the government’s decision-making framework for energy policy decisions does not accurately reflect important drivers for the strategy change. This paper presents the Energy Crossroads framework as a more comprehensive tool to analyse the drivers and impacts of the nuclear phase-out. 20 expert interviews were performed across business participants as well as policy makers in the national and international energy context. Results show that Germany has adopted an environmental justice, rather than energy security, stance in their nuclear phase out policy, with significant long-term consequences. - Highlights: • We develop the Energy Crossroads framework as a means to analyse the Energiewende. • The strategy's short and medium term concerns focus on the security of supply. • Long term goals are driven by aspects of environmental justice. • Targeted development of national FiTs is needed alongside a functioning carbon market.

  2. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  3. Urban land acquisition and social justice in Ethiopia

    African Journals Online (AJOL)

    Keywords: access to land, land lease, social justice, tenure security, urban land policy. I. INTRODUCTION ... As Mattew Robinson put it correctly, social justice embraces virtues including “share of common humanity .... But such tenure security will not, by its own, reduce poverty and bring about sustainable development.10.

  4. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  5. Security of Nuclear Information. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance on implementing the principle of confidentiality and on the broader aspects of information security (i.e. integrity and availability). It assists States in bridging the gap between existing government and industry standards on information security, the particular concepts and considerations that apply to nuclear security and the special provisions and conditions that exist when dealing with nuclear material and other radioactive material. Specifically it seeks to assist states in the identification, classification, and assignment of appropriate security controls to information that could adversely impact nuclear security if compromised

  6. Implementation Of Law Number 11 Of 2012 Concerning Child Related Criminal Justice System Concept Restorative Justice

    Directory of Open Access Journals (Sweden)

    Intan Karangan

    2016-09-01

    Full Text Available This study aims to determine how the application of the concept of restorative justice in accordance with Law No. 11 of 2012 on Child Criminal Justice system. This study uses normative namely a study that discusses the problem based on the literature and legislation relating to the matter to be investigated. Law No. 11 of 2012 on the Criminal Justice System Child has provided a new concept in the criminal justice system, especially those in the juvenile justice system. Related to the concept of Restorative Justice or restorative justice is a resolution processes involving perpetrators, victims, families, and other relevant parties in a criminal act, jointly seek solutions to the offense and its implications by emphasizing restoration and not retribution

  7. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  8. Towards a Transnational Application of the Legality Principle in the EU’s Area of Freedom, Security and Justice?

    NARCIS (Netherlands)

    Luchtman, M.J.J.P.

    2013-01-01

    The Treaty of Lisbon formulates ambitious goals for the European Union. It holds that the EU shall offer its citizens an area of freedom, security and justice, in which the free movement of citizens is guaranteed in combination with appropriate measures with respect to crime control. This wording –

  9. Equal Access to Justice Act Payments

    Data.gov (United States)

    Social Security Administration — A dataset containing payment amounts made by the Social Security Administration for court-approved Equal Access to Justice Act (EAJA) payments for fiscal year 2010...

  10. 6 CFR 13.40 - Stays ordered by the Department of Justice.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Stays ordered by the Department of Justice. 13.40 Section 13.40 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.40 Stays ordered by the Department of Justice. If at any time the Attorney...

  11. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  12. Restorative justice in Macedonian criminal legislation and difficulties in its implementation

    Directory of Open Access Journals (Sweden)

    Bačanović Oliver

    2010-01-01

    Full Text Available The subject-matter of this paper is to provide an overview of the situation/ status within Macedonian criminal legislation as a concept whose introduction and implementation is of recent time. This issue is addressed at two levels: through the overview of the representation of restorative justice elements within the Macedonian criminal legislation and through foreseeing the difficulties considering the implementation of this concept. Regarding the second level the author especially focuses on the difficulties with which social work centers and local communities have to deal. In order to answer the posed questions the author used his own findings, as well as the findings to which he came during the direct contacts with representatives of respective institutions or on the grounds of materials that these institutions provided. In the conclusion, the author attempts to answer to the closing question: can we be satisfied with the accomplished in the area of restorative justice? The author attempts to answer on the grounds of certain indicators (political will, material assumptions, realized professional trainings and education. The author points out to the necessity of acting in the educational system as well on all levels with an aim to create indispensable critical mass within society that will have an upgraded awareness for peaceful resolution of the conflict situation.

  13. Global health justice and governance.

    Science.gov (United States)

    Ruger, Jennifer Prah

    2012-01-01

    While there is a growing body of work on moral issues and global governance in the fields of global justice and international relations, little work has connected principles of global health justice with those of global health governance for a theory of global health. Such a theory would enable analysis and evaluation of the current global health system and would ethically and empirically ground proposals for reforming it to more closely align with moral values. Global health governance has been framed as an issue of national security, human security, human rights, and global public goods. The global health governance literature is essentially untethered to a theorized framework to illuminate or evaluate governance. This article ties global health justice and ethics to principles for governing the global health realm, developing a theoretical framework for global and domestic institutions and actors.

  14. Cultivating Safe and Supportive Schools: The Implementation and Institutionalization of Restorative Justice Practices

    Science.gov (United States)

    Anderson, Eleanor Robinson

    2017-01-01

    Mounting public concern about a school-to-prison pipeline has put schools and districts under increasing pressure to reduce their use of suspensions, expulsions and arrests. Many are turning to restorative justice practices (RJP) as a promising alternative for addressing school discipline and improving school climate. However, implementing RJP in…

  15. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Science.gov (United States)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  16. Reviewing the Justice and Security Hub Modality as Piloted in Liberia

    Directory of Open Access Journals (Sweden)

    Rory Keane

    2012-11-01

    Full Text Available ‘The Republic of Bangui’ or ‘the Republic of Monrovia’ are phrases we sometimes hear from practitioners to describe post conflict countries where very few services exist outside the capital city. This is especially the case for security – the critical public good in post conflict countries. In response to the need to bring security services closer to the citizens who often need them most, the Government of Liberia and the United Nations are piloting a new approach financed by the UN Peacebuilding Fund (PBF – the so-called ‘Justice and Security Hubs’. The donor community and the United Nations are watching closely. If this works, there is indication from UN officials that the model could potentially be replicated in other settings such as the East of the Democratic Republic of the Congo (DRC, Haiti and the northern states of South Sudan. If the hub concept is capable of being adapted and successful elsewhere, the United Nations will not only have added a new instrument to its peacekeeping toolkit but will also firmly demonstrate how the UN Peacebuilding Fund can in essence be catalytic in fostering long-term and comprehensive approaches to peacebuilding. This practice note outlines the process of developing and constructing the first hub in Liberia, which is due to be partly operational by the end of 2012, and provides a prognosis on its chances for success.

  17. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  18. Implementation of computer security at nuclear facilities in Germany

    Energy Technology Data Exchange (ETDEWEB)

    Lochthofen, Andre; Sommer, Dagmar [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Koeln (Germany)

    2013-07-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  19. Implementation of computer security at nuclear facilities in Germany

    International Nuclear Information System (INIS)

    Lochthofen, Andre; Sommer, Dagmar

    2013-01-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  20. Effect of Organizational Factors on Information Security Implementations

    Science.gov (United States)

    Perez, Rafael G.

    2013-01-01

    The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…

  1. Justice In Granting Remission For Corruption Prisoners A Review Of Indonesian Criminal Justice System

    Directory of Open Access Journals (Sweden)

    Mispansyah

    2015-08-01

    Full Text Available Abstract Prisoners are entitled to have a reduction in criminal past remission as stipulated in the Indonesian Criminal Justice System still being debated to this day. This research reviews the essence of the implementation of the substantive law in granting remission against inmate corruption cases from the perspective of public and individual interests. The type of research used in this paper is socio-legal research reviewing remission policy from the perspective of the criminal law system with philosophical and statute approach. The outcomes of the research indicate that the implementation of granting remission for corruption prisoners does not provide justice both procedural and substantive does not provide legal expediency and arising imbalance of justice for individuals communities and countries. The need to implement remissions with impartial justice for corruption prisoners in granting remission to be useful for individuals communities and countries.

  2. Implementation Support of Security Design Patterns Using Test Templates

    Directory of Open Access Journals (Sweden)

    Masatoshi Yoshizawa

    2016-06-01

    Full Text Available Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an “aspect test template” to observe the internal processing and a “test case template”. Providing design information creates a test from the test template with a tool. Because our test template is reusable, it can easily perform a test to validate a security design pattern. In an experiment involving four students majoring in information sciences, we confirm that our method can realize an effective test, verify pattern applications, and support pattern implementation.

  3. LAW ENFORCEMENT PREPAREDNESS FOR THE IMPLEMENTATION OF INDONESIA’S LAW ON JUVENILE JUSTICE SYSTEM

    Directory of Open Access Journals (Sweden)

    Dani Krisnawati

    2014-03-01

    Full Text Available Paradigmatic changes stipulated in Law Number 11 of 2012 on Juvenile Justice System, including regulations concerning restorative justice and diversion require the competency and skills of the law enforcement officers. This research identifies measures that have been taken and the existing barriers in preparing for the implementation of this Law. The research demonstrates that the readiness of the investigators and child prosecutors are merely limited to the outreach of Law Number 11 of 2012, whilst knowledge of the court judges only covers the draft Law. The number of officers receiving outreach is limited and should be increased. Negative perception on the officers due to the risk of a bribery accusation is feared to hamper the implementation of diversion regulation based on a restorative justice. Perubahan paradigmatik yang termuat dalam Undang-Undang Nomor 11 Tahun 2012 tentang Sistem Peradilan Pidana Anak, termasuk diantaranya ketentuan mengenai keadilan restoratif dan diversi, memerlukan kompetensi dan keahlian aparat penegak hukum. Penelitian ini mengidentifikasi langkah yang telah dilakukan dan kendala persiapan implementasi Undang-Undang tersebut. Hasil penelitian memperlihatkan bahwa kesiapan penyidik dan penuntut umum anak masih terbatas pada partisipasi sosialisasi Undang-Undang Nomor 11 Tahun 2012, sedangkan hakim anak memiliki pengetahuan hanya pada Rancangan Undang-Undang. Jumlah aparat yang menerima sosialisasi Undang-Undangmasih terbatas dan perlu ditingkatkan jumlahnya. Pandangan negatif terhadap aparat karena bisa menimbulkan dugaan suap dikhawatirkan menjadi penghambat diterapkannya ketentuan diversi dengan pendekatan keadilan restoratif.

  4. Project IVOR - Implementing victim-oriented reform of the criminal justice system in the European Union

    NARCIS (Netherlands)

    Biffi, Emanuela; Mulder, Eva; Pemberton, Antony; Santos, Manuela; Valério, Mafalda; Vanfraechem, Inge; van der Vorm, Benny

    2016-01-01

    Project IVOR – Implementing victim-oriented reform of the criminal justice system in the European Union (2014-2016) offers an overview of current research into and with victims’ rights and services, identifying lacunas in the knowledge base and offering a model which can serve to connect experience

  5. Gendered Justice Gaps in Bosnia-Herzegovina

    DEFF Research Database (Denmark)

    Björkdahl, Annika; Mannergren Selimovic, Johanna

    2014-01-01

    , and reparations gaps-this article examines structural constraints for women to engage in shaping and implementing transitional justice, and unmasks transitional justice as a site for the long-term construction of the gendered post-conflict order. Thus, the gendered dynamics of peacebuilding and transitional...... justice have produced a post-conflict order characterized by gendered peace and justice gaps. Yet, we conclude that women are doing justice within the Bosnian-Herzegovina transitional justice project, and that their presence and participation is complex, multilayered, and constrained yet critical....

  6. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.230 Maritime Security (MARSEC) Level coordination and implementation. (a) The facility owner...

  7. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  8. Key Considerations in Providing a Free Appropriate Public Education for Youth with Disabilities in Juvenile Justice Secure Care Facilities. Issue Brief

    Science.gov (United States)

    Gagnon, Joseph C.; Read, Nicholas W.; Gonsoulin, Simon

    2015-01-01

    Access to high-quality education for youth is critical to their long-term success as adults. Youth in juvenile justice secure care facilities, however, too often do not have access to the high-quality education and related supports and services that they need, particularly youth with disabilities residing in such facilities. This brief discusses…

  9. The Implementation of Justice Principle Within the Land Procurement for Public Utilities Construction

    OpenAIRE

    SH, Sahnan,

    2015-01-01

    The Indonesia€™s population growth and development increasing makes all parties, in the reality, need more land, especially for government. Land procurement for public utilities construction usually have a problem, because on the process we rarely meet easy process or easy getting deal between landowner and government, or other parties who needs the land. This occurs because is difficult getting deal between government and landowner about compensation. Justice principle implementation someti...

  10. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives as well...

  11. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  12. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  13. IT Security Management Implementation Model in Iranian Bank Industry

    Directory of Open Access Journals (Sweden)

    Mona Vanaki

    2017-06-01

    Full Text Available According to the complexity and differences between Iranian banks and other developed countries the appropriate actions to implement effective security management of information technology have not been taken. The aim of this study was to create a powerful model by selecting the appropriate security controls to protect information assets in the bank. In this model, at first the principle set fort in ISO standard 27001, was extracted and then by further studies derived from best practices carried out in the world on the related subject from 2008 to 2016 using a qualitative descriptive method, points comply with information security management in the banking industry were added to it. With the study of Iranian banks in dealing with IT security management system and with help of action research tools, provisions which prevent the actual implementation of this standard was removed and finally a conceptual model with operating instructions and considering all the principles of information security management standard, as well as banking institutions focusing on the characteristics of Iran was proposed.

  14. Mathematics education for social justice

    Science.gov (United States)

    Suhendra

    2016-02-01

    Mathematics often perceived as a difficult subject with many students failing to understand why they learn mathematics. This situation has been further aggravated by the teaching and learning processes used, which is mechanistic without considering students' needs. The learning of mathematics tends to be just a compulsory subject, in which all students have to attend its classes. Social justice framework facilitates individuals or groups as a whole and provides equitable approaches to achieving equitable outcomes by recognising disadvantage. Applying social justice principles in educational context is related to how the teachers treat their students, dictates that all students the right to equal treatment regardless of their background and completed with applying social justice issues integrated with the content of the subject in order to internalise the principles of social justice simultaneously the concepts of the subject. The study examined the usefulness of implementing the social justice framework as a means of improving the quality of mathematics teaching in Indonesia involved four teacher-participants and their mathematics classes. The study used action research as the research methodology in which the teachers implemented and evaluated their use of social justice framework in their teaching. The data were collected using multiple research methods while analysis and interpretation of the data were carried out throughout the study. The findings of the study indicated that there were a number of challengesrelated to the implementation of the social justice framework. The findings also indicated that, the teachers were provided with a comprehensive guide that they could draw on to make decisions about how they could improve their lessons. The interactions among students and between the teachers and the students improved, they became more involved in teaching and learning process. Using social justice framework helped the teachers to make mathematics more

  15. Monitoring the Implementation of State Regulation of National Economic Security

    Directory of Open Access Journals (Sweden)

    Hubarieva Iryna O.

    2018-03-01

    Full Text Available The aim of the article is to improve the methodological tools for monitoring the implementation of state regulation of national economic security. The approaches to defining the essence of the concept of “national economic security” are generalized. Assessment of the level of national economic security is a key element in monitoring the implementation of state regulation in this area. Recommendations for improving the methodology for assessing national economic security, the calculation algorithm of which includes four interrelated components (economic, political, social, spiritual one, suggests using analysis methods (correlation and cluster analysis, and taxonomy, which allows to determine the level and disproportion of development, can serve as a basis for monitoring the implementation of state regulation of national economic security. Such an approach to assessing national economic security makes it possible to determine the place (rank that a country occupies in a totality of countries, the dynamics of changing ranks over a certain period of time, to identify problem components, and monitor the effectiveness of state regulation of the national economic security. It the course of the research it was determined that the economic sphere is the main problem component of ensuring the security of Ukraine’s economy. The analysis made it possible to identify the most problematic partial indicators in the economic sphere of Ukraine: economic globalization, uneven economic development, level of infrastructure, level of financial market development, level of economic instability, macroeconomic stability. These indicators have a stable negative dynamics and a downward trend, which requires an immediate intervention of state bodies to ensure the national economic security.

  16. Choice of forum in an area of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Michiel Luchtman

    2011-01-01

    Full Text Available This article deals with the question of which state, in the case of overlapping jurisdictions, should investigate, prosecute and try offences in the European area of freedom, security and justice (choice of forum. As binding instruments on the choice of forum currently have no priority for the European legislator, this issue is de facto left largely to the legislative and executive branches of the Member States. Yet the question of whether this Member State discretion is acceptable de iure remains unanswered. This article assesses the relevant EU instruments in light of the requirement of a 'tribunal established by law' (Article 6 ECHR; Article 47 CFR and addresses the issue of whether this requirement, in addition to its role in the national context, is also of relevance for the AFSJ as a whole. It is submitted that the choice of forum has a clear constitutional dimension, including a prominent role for the national and European judiciary as well. Only if concerns of losing national sovereignty are overcome will it be possible to start the debate on what actions must follow.

  17. IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION

    Directory of Open Access Journals (Sweden)

    MATÚŠ HORVÁTH

    2009-12-01

    Full Text Available Information security should be today a key issue in any organization. With the implementation of information security management system (ISMS the organization can identify and reduce risks in this area. This the area of information security management covers a numbers of ISO / IEC 27000 standards, which are based on best practice solutions. However, smaller organizations are often discourages with the implementation of these systems, because of fear of high cost and complexity. Especially due to the fact that the standards does not strictly require implementation of all security controls it is possible to implement these systems in small-size organizations. In this article, we want to point on this fact through describing practical experience with ISMS implementation in small-size organization.

  18. The Space for Restorative Justice in the Ethiopian Criminal Justice System

    Directory of Open Access Journals (Sweden)

    Endalew Lijalem Enyew

    2014-12-01

    Full Text Available Restorative Justice (RJ is an alternative way of apprehending crime and justice which views crime as a violation of a relationship among victims, offenders and community, and which allows the active participation of the crime’s stakeholders. It has the objective of ‘putting right’ the wrong done, to restore the broken relationship and to reintegrate the offender back into society. The Ethiopian criminal justice system views crime primarily as a violation of the state’s criminal laws, either in the form of a commission or omission. It excludes the community from participation, and gives no opportunity to the victim to fully participate in the process. Nor is there a satisfactory legal procedure which enables the public prosecutor to adequately protect the victim’s interest. The focus of the public prosecutor is to have the accused convicted and punished, instead of encouraging them to take responsibility to undo the wrong they have committed. This article thus examines whether restorative justice has a place in the formal legal framework of the existing Ethiopian criminal justice system; and analyses the prospects for, and the challenges that may hinder, the implementation of restorative justice practice in this framework.

  19. Community Security and Justice under United Nations Governance: Lessons from Chiefs’ Courts in South Sudan’s Protection of Civilians Sites

    Directory of Open Access Journals (Sweden)

    Rachel Ibreck

    2017-12-01

    Full Text Available This article examines the public authority of chiefs’ courts within the United Nations Mission in South Sudan (UNMISS Protection of Civilians Sites (PoCs. After December 2013, UNMISS peacekeepers opened the gates of their bases to around 200,000 civilians fleeing war. This unintentionally created a legal and political anomaly. Over time, conflicts and crimes rose within the sites, and UNMISS improvised a form of administration. But while the internationals sought technical solutions, people displaced within the sites turned to familiar ‘customary’ methods to manage problems of insecurity, establishing chiefs’ courts. The PoC sites became an arena of plural authorities, with chiefs working alongside camp administrators, peacekeepers and humanitarian actors. We explore how and why the chiefs responded to insecurity within the sites and whether they engaged with, or diverged from United Nations actors and international norms. We demonstrate that justice remains central to the provision of security in contexts of war and displacement. International peace interventions are rightly wary of ‘customary’ justice processes that prioritise communities and families at the expense of individual rights, but this unique case shows that they are sources of trust and consistency that are resilient, adaptable and can contribute to human security.

  20. Electronic Data Exchange within European Justice: A Good Opportunity?

    Directory of Open Access Journals (Sweden)

    Nadia Carboni

    2012-12-01

    Full Text Available This paper analyses one of the most debated and controversial issues regarding the changes which are taking place in the Justice domain: the complexity of developing and implementing ITC systems that ‘actually work’, and doing so with a reasonable budget and in a reasonable time. While the number of studies on National experiences is slowly growing (see for example Fabri & Contini 2001, Fabri 2007, Contini & Lanzara 2009, Reiling 2012, filling an often-mentioned gap in justice sector literature, building on the European project e-CODEX case study, the authors point the attention to a somewhat new and unexplored phenomenon, the concrete attempt to build cross-border electronic data exchange within the European justice field. e-CODEX (e-Justice Communication via Online Data Exchange is the first European Large Scale Pilot in the domain of e-Justice. The project is carried out by 19 partners either being or representing their national ministries of justice of 15 European countries, plus the Council of Bars and Law Societies of Europe (CCBE, the Conseil des Notariats de l'Union Européenne (CNUE and the National Research Council of Italy (through two of its institutes - IRSIG-CNR and ITTIG-CNR. To provide a better grasp of the project scale, its overall budget is over 14 M euro and about 14 hundred person-months are committed to it. The project aims at improving cross-border access of citizens and businesses to legal means in Europe, as well as to improve the interoperability between legal authorities of different Member States. With a case based approach, e-CODEX is developing and will be soon implementing an interoperability layer to connect existing National Systems in order to provide cross border e-justice services. The project commitment includes running a live pilot in a ‘production environment’ for a duration of twelve months. The electronic services that have been so far selected are: European Payment Order (EPO, European Small

  1. A study on the development of national guide for implementing nuclear security culture in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs.

  2. A study on the development of national guide for implementing nuclear security culture in ROK

    International Nuclear Information System (INIS)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik

    2014-01-01

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs

  3. From distributive to procedural justice. Justice as a constitutive value of public administration

    Directory of Open Access Journals (Sweden)

    Antonio SANDU

    2016-07-01

    Full Text Available The justice as an ethical value can be considered constitutive for contemporary administrative systems. These ones are asked to transpose into practice the ideal of justice in the community. The functioning of a modern state cannot be conceived without a series of institutions that would guarantee the achievement of justice. The legal system was established specifically to administer justice. Modern democratic systems felt the need for certain courts and extrajudicial procedures to create justice. The institutions required to implement the extrajudicial distribution of justice are part of the public administration, representing a central element of it. The model of a political system based on justice is a minimalist one; the role of the state is limited to making it possible for individuals to follow their own ideal of welfare. Opposed to justice, the ideal of welfare requests the state, and implicitly the administration, to ensure the individual the minimum conditions to live in that community. The minimal state centered on justice is the result of a modern paradigm with post-Kantian reverberations, which emphasize the rationality of human action. If the individual is rational, he only needs fair conditions in order to pursue his own welfare. The role of the administration is to ensure those conditions and to oversee the distribution of goods and services, as well as the distribution and redistribution of added value.

  4. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...

  5. The Strengthening Nuclear Security Implementation initiative: evolution, status and next steps

    NARCIS (Netherlands)

    Dal, B.; Herbach, J.; Luongo, K.N.

    2015-01-01

    The "Strengthening Nuclear Security Implementation" initiative broke new ground at the 2014 Nuclear Security Summit in the effort to harmonize and strengthen the global nuclear security regime. This report discusses the significance of the initiative, the importance of expanding its signatories, and

  6. 75 FR 45152 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0004] National Security Division: Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the... write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National Security Division...

  7. A Methodology to Implement an Information Security Management System

    Directory of Open Access Journals (Sweden)

    Alaíde Barbosa Martins

    2005-08-01

    Full Text Available Information security has actually been a major challenge to most organizations. Indeed, information security is an ongoing risk management process that covers all of the information that needs to be protected. ISO 17799 offers what companies need in order to better manage information security. The best way to implement this standard is to ease the security management process using a methodology that will define will define guidelines, procedures and tools that will be needed along the way. Hence, this paper proposes a methodology to assist companies in assessing their compliance with BS 7799/ ISO 17799 as well as planning and implementing the actions necessary to become compliant or certified to the standard. The concepts and ideas presented here had been applied in a case study involving the Cetrel S/A - Company of Environmental Protection. For this company, responsible for treatment of industrial residues generated by the Camaçari Petrochemical Complex and adjacent areas, to assure confidentiality and integrity of customers' data is a basic requirement.

  8. Securing a control system: experiences from ISO 27001 implementation

    International Nuclear Information System (INIS)

    Vuppala, V.; Vincent, J.; Kusler, J.; Davidson, K.

    2012-01-01

    Recent incidents of breaches, in control systems in specific and information systems in general, have emphasized the importance of security and operational continuity in achieving the quality objectives of an organization, and the safety of its personnel and infrastructure. However, security and disaster recovery are either completely ignored or given a low priority during the design and development of an accelerator control system, the underlying technologies, and the overlaid applications. This leads to an operational facility that is easy to breach, and difficult to recover. Retrofitting security into a control system becomes much more difficult during operations. In this paper we describe our experiences with implementing ISO/IEC 27001 Standard for information security at the Electronics Department of the National Superconducting Cyclotron Laboratory (NSCL) located on the campus of Michigan State University. We describe our risk assessment methodology, the identified risks, the selected controls, their implementation, and our documentation structure. We also report the current status of the project. We conclude with the challenges faced and the lessons learnt. (authors)

  9. Restorative Justice: Principles, Practices, and Application

    Science.gov (United States)

    O'Brien, Sandra Pavelka

    2007-01-01

    A modern-day movement is transforming the way that communities and justice systems think about and respond to crime and wrongful occurrences. This response implements a holistic continuum of services, providing for prevention, intervention, diversion, commitment, probation, reentry, and aftercare. This approach--known as restorative justice--seeks…

  10. RESTORATIVE JUSTICE DALAM SISTEM PERADILAN PIDANA ANAK / Restorative Justice In Juvenile Justice System

    Directory of Open Access Journals (Sweden)

    Randy Pradityo

    2016-11-01

    Full Text Available Anak sebagai generasi penerus bangsa sudah selayaknya mendapatkan perhatian khusus. Hal tersebut bertujuan dalam rangka pembinaan anak untuk mewujudkan sumber daya manusia yang berkualitas. Maka dari itu, diperlukan pula sarana dan prasarana hukum yang mengantisipasi segala permasalahan yang timbul. Sarana hukum ini bertujuan untuk mengantisipasi stigma atau cap jahat yang ditimbulkan ketika anak berhadapan dengan hukum, sekaligus memulihkan dan memasyarakatkan kembali anak tersebut. Salah satu solusinya adalah dengan mengalihkan atau menempatkan pelaku tindak pidana anak keluar dari sistem peradilan pidana serta memberikan alternatif bagi penyelesaian dengan pendekatan keadilan demi kepentingan terbaik bagi anak, yang kemudian dikenal dengan pendekatan restorative justice. Restorative justice yang merupakan implementasi konsep dari diversi telah dirumuskan dalam sistem peradilan pidana anak, namun sistem yang baik haruslah diiringi dengan suatu sikap yang dijiwai kehendak untuk memandang dan berkeyakinan bahwa dunia ini selalu menjadi lebih baik. Selain itu, hendaknya prinsip the best interest of the children selalu diutamakan ketika menangani anak yang berhadapan dengan hukum.   Children as the nation's next generation is already deserve special attention. It aims in order to develop the child to realize the quality of human resources. Therefore, it is also necessary legal infrastructure to anticipate any problems that arise. The legal means to anticipate stigma or stamp evil inflicted when the child against the law, as well as restoring and re-socialize the child. One solution is to divert or placing the offender children out of the criminal justice system as well as providing an alternative to the settlement with justice approach in the best interests of the child, who was then known as restorative justice approach. Restorative justice which is the implementation of the concept of diversion has been formulated in the juvenile justice system

  11. Crime, In/Security and Mob Justice

    DEFF Research Database (Denmark)

    Orock, Rogers Tabe Egbe

    2014-01-01

    from violent crime. The widespread sense of anxiety over various forms of violent crime and state failure to guarantee protection for citizens generates a quest for alternative practices of safety-making that, in turn, evoke serious concerns over state power and sovereignty in Africa. Focusing on mob...... justice in Cameroon, this article argues that the political contextualisation of sovereignty must pay attention not only to the sovereign’s right to kill and let live, but also its responsibility to guarantee safety for those citizens it chooses to let live. The paper demonstrates that in Cameroon mob...

  12. Relationships are building blocks to social justice: Cases of biblical justice and African Ubuntu

    Directory of Open Access Journals (Sweden)

    Selaelo T. Kgatla

    2016-10-01

    Full Text Available The entire Bible is full of themes calling humans to live justly with one another and fear God who is the author of justice. The first book of the Bible, Genesis, carries the story of God’s relationship with his people. Their relationship is bound by social justice and mutual love in reciprocity. This article argues that African Ubuntu has an affinity with the Bible’s message of justice and mutual caring for one another. Ubuntu presupposes that humans were created in God’s image and indicates that characteristics such as kindness, charity, equality, love of one’s neighbours and voluntarily dispensing justice to others are present in human life. God created humans to be bound to one another in caring love, coexistence and total dependence. In today’s world, social justice requires good judgement from those who are in privileged positions to implement it.

  13. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  14. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  15. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  16. Sandia's experience in designing and implementing integrated high security physical protection systems

    International Nuclear Information System (INIS)

    Caskey, D.L.

    1986-01-01

    As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described

  17. The role of Nigerian youths in effective implementation of security ...

    African Journals Online (AJOL)

    ... effective implementation of security and social development intervention in Nigeria cannot be over-emphasized. This is because youths have been deeply involved in various self-help projects in various Local and State Governments in Nigeria. Their areas of interventions cover projects involving trade, commerce, security ...

  18. The Nagoya Protocol – Justice in the Making?- Comment

    Directory of Open Access Journals (Sweden)

    Doris Schroeder

    2013-09-01

    Full Text Available Ratification of the Nagoya Protocol seems to be a long drawn out process for many parties to the Convention on Biological Diversity, delaying the Protocol's entering into force. This short paper suggests that four innovative elements of the Protocol may require time-consuming consideration prior to implementation: the Global Multilateral Benefit-Sharing Mechanism and the encouragement of Transboundary Co-operation; the reference to human pathogens, the reference to food security and affordable access to treatments and finally the demand to accommodate customary laws of indigenous peoples. At the same time, these four elements are essential to achieving global justice in access and benefit sharing regulations and therefore highly welcome.

  19. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Science.gov (United States)

    2010-01-01

    ... 29, 2009 Implementation of the Executive Order, “Classified National Security Information” Memorandum..., “Classified National Security Information” (the “order”), which substantially advances my goals for reforming... or handles classified information shall provide the Director of the Information Security Oversight...

  20. Designing, Implementing, and Evaluating Secure Web Browsers

    Science.gov (United States)

    Grier, Christopher L.

    2009-01-01

    Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…

  1. Access to Justice for the Wrongfully Accused in National Security Investigations

    Directory of Open Access Journals (Sweden)

    Jasminka Kalajdzic

    2009-02-01

    Full Text Available Among the casualties in the ‘war on terror’ is the presumption of innocence. It is now known that four Canadians who were the subject of investigation by the RCMP and CSIS were detained and tortured in Syria on the basis of information that originated in and was shared by Canada. None has ever been charged with a crime. On their return home, all four men called for a process that would expose the truth about the role of Canadian agencies in what happened to them, and ultimately help them clear their names and rebuild their lives. To date, in varying degrees, all four men continue to wait for that “process.” In this paper, I examine the access to justice mechanisms available to persons who are wrongfully accused of being involved in terrorist activities. Utilizing the case study of one of the four men, Abdullah Almalki, I explore the various processes available to him: (i a complaint to the relevant domestic complaints bodies, the Security Intelligence Review Committee and the Commission for Public Complaints Against the RCMP; (ii a commission of inquiry; and (iii a civil tort claim. Due in large part to the role national security confidentiality plays in these mechanisms, all three models are found to be ineffective for those seeking accountability in the national security context. Parmi les victimes de la «guerre contre le terrorisme» figure la présomption d’innocence. On sait maintenant que quatre Canadiens qui ont fait l’objet d’enquêtes par la GRC et le SCRS ont été détenus et torturés en Syrie suite à des renseignements ayant leur origine au Canada et partagés par le Canada. Nul d’entre eux n’a jamais été accusé de crime. À leur retour, tous les quatre hommes ont demandé un processus qui exposerait la vérité au sujet du rôle d’agences canadiennes dans ce qui leur est arrivé et qui éventuellement leur aiderait à rétablir leur réputation et refaire leur vie. À ce jour, à des degrés divers, tous

  2. I and C security program for nuclear facilities: implementation guide - TAFICS/IG/2

    International Nuclear Information System (INIS)

    2016-04-01

    This is the second in a series of documents being developed by TAFICS for protecting computer-based I and C systems of Indian nuclear facilities from cyber attacks. The document provides guidance to nuclear facility management to establish, implement and maintain a robust I and C security program - consisting of security plan and a set of security controls. In order to provide a firm basis for the security program, the document also identifies the fundamental security principles and foundational security requirements related to computer-based I and C systems of nuclear facilities. It is recommended that all applicable Indian nuclear facilities should implement the security program - with required adaptation - so as to provide the necessary assurance that the I and C systems are adequately protected against cyber attacks. (author)

  3. Implementation of a security system in the radiotherapy process

    International Nuclear Information System (INIS)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-01-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  4. Cyber Security in Digital I and C Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William [Doosan HF Controls, Texas (United States)

    2011-08-15

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described.

  5. Cyber Security in Digital I and C Implementation

    International Nuclear Information System (INIS)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William

    2011-01-01

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described

  6. Distributive principles of economic justice: an Islamic perspective

    Directory of Open Access Journals (Sweden)

    Zakiyuddin Baidhawy

    2012-12-01

    Full Text Available Poverty and impoverishment in the world currently continue to increase as aresult of distributive justice systems and its principles that became the basis ofcontemporary economics did not succeed in allocating and distributing resourcesjustly. Based on this problem, this study aimed at describing the Islamic responseto the problem of distributive injustice, and how necessarily the state played arole in upholding distributive justice. Through the thematic-induction method andthe synthetic analysis, the study finds out several findings as follows. Firstly,Islam formulated three principles of distributive justice as follows: 1 the Distributionof natural and the environmental resources was in the framework of participation;2 the Redistribution of the wealth and the income were joint responsibilityof ascertaining social security, the increase in the capacity and the authorityfor them who were disadvantage; and 3 the Role of the state was certaintythat was complementary for the ethical market in order to guarantees the senseof justice and the achievement of public welfare. Secondly, according to Islam,the process of the redistribution of the wealth and the income aimed at givingsocial security on the fulfillment of basic needs for the poor; strove for the increasein the capacity through education and skills; and increased the poor’sbargaining position through their participation in decision making that was linkedwith their interests and the control on its implementation. Thirdly, the intention of establishing justice was to gain both individual and public welfare and the happiness(al-fala>h}.Kemiskinan dan pemiskinan di dunia kontemporer terus meningkat sebagai akibatsistem keadilan distributif dan prinsip-prinsipnya yang menjadi basis ekonomisaat ini tidak berhasil dalam mengalokasikan dan memeratakan sumber dayasecara adil. Berdasarkan masalah ini, kajian ini bertujuan untuk menjelaskanrespon Islam atas problem ketidakadilan distributif, dan

  7. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  8. Security of Radioactive Sources. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    There are concerns that terrorist or criminal groups could gain access to high activity radioactive sources and use these sources maliciously. The IAEA is working with Member States to increase control, accounting and security of radioactive sources to prevent their malicious use and the associated potential consequences. Based on extensive input from technical and legal experts, this implementation guide sets forth guidance on the security of sources and will serve as a useful tool for legislators and regulators, physical protection specialists and facility and transport operators, as well as for law enforcement officers.

  9. Aspects regarding the implementation of information security standards in organizations

    Directory of Open Access Journals (Sweden)

    Mihai Bârsan

    2017-03-01

    Full Text Available Information security is one of the major challenges of the information and knowledge based society. The preoccupation of organizations to ensure the security of information in the digital environment has led to the emergence of specific standards in the field. Thus, ISO 27000 brings together reference standards in the field. Starting from ISO 27001, which summarizes policies and procedures on physical, legal and technological security risks, this paper looks at the steps the organization must undertake to implement the standards.

  10. Islamic Political Thought between Justice Value and the State Structure

    Directory of Open Access Journals (Sweden)

    Ahmed As-Sirri

    2013-06-01

    Full Text Available The paper discusses the relationship between state structure and the implementing of justice in the Islamic society. The shift from caliphate system to the system of royal system starting from the Umayyad Dynasty (41-132 AH / 661-750 AD made the issue of social justice highly urgent. The main question discussed was : Is there a relationship between state structure and achieving social justice? To answer this question the paper reviews the relationship between religious authorities and political authorities in the main periods of Islamic history. Based on these relations as well as the intellectual product known as the “Heritage of Islamic Political Thought”, we concluded that the classical structure of Islamic state didn’t assure the implementing of justice. In light of the forgoing idea we could also conclude that the political islamic thought used today in context of “Arab spring” does not support the aspirations of building a modern state that assures the implementing of justice as well as variety of social, cultural and political rights.

  11. Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2016-01-01

    Full Text Available The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices.

  12. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  13. Transformative Justice as a Way of Permitting Women's Perspectives in Liberian Transitional Justice

    DEFF Research Database (Denmark)

    Ammann, Theresa

    In recent years, the field of transitional justice—originally rooted within the area of law—has gained recognition and input from a growing number of different disciplines (e.g., anthropology, politics, psychology). While this expansion has allowed the field to become more holistic it has also...... in Liberia’s transitional justice efforts—namely, women and particularly female ex-combatants. The paper will, therefore, be based on a literature review which will draw its conclusions from existing research within the fields of anthropology, human security, peace & conflict studies, political sciences......, and psychology. With regards to Liberian peacebuilding; this paper will argue for the necessity to balance juridical, political, cultural, social, and psychological needs in peacebuilding to achieve transformative justice—rather than transitional justice. Questions such as, “How were women neglected...

  14. I and C security audit of nuclear facilities: implementation guide - TAFICS/IG/3

    International Nuclear Information System (INIS)

    2017-05-01

    This document provides guidance to I and C Security audit team to prepare, plan, and execute security audit of Instrumentation and Control (I and C) systems at DAE's nuclear facilities, including I and C system development and manufacturing organisations. The audit is expected to check efficacy of I and C security program - plan, policies, procedures and controls - implemented at a nuclear facility to protect I and C systems from potential cyber attacks. The document contains detailed audit procedures, which specify the audit objectives, audit objects and audit methods for each element of I and C security described in implementation guides promulgated by TAFICS to all DAE Units. (author)

  15. Symmetry in Social Construction during ERP Implementation: A Systems Security Perspective

    Directory of Open Access Journals (Sweden)

    Kennedy Njenga

    2014-03-01

    Full Text Available The principle of symmetry in enterprise resource planning (ERP systems implementation holds that the researcher should deploy impartial explanation in cases of success as in cases of failure. This article examines the symmetry intrinsic in social construction within the various stages of the ERP development life cycle, from initiation to implementation. Discourse on symmetry focuses on whether social constructs are able to influence ERP implementation positively (success or negatively (failure and whether this exposes ERP systems to information security risk. The theoretical lens of social construction of technology (SCOT theory, a theory premised on social interaction between agents and technology artefacts, is applied for this purpose. The research was quantitative with a survey having been conducted on information technology (IT and information security (IS practitioners. Results of the study highlight the significant role social construction plays because of the direct linkage it has with the implementation of information security controls in ERP systems.  The research delineated five social constructs, namely positional influence, reward influence, coercive influence, expert influence and referent influence. For purposes of this research and on the sampling criteria applied, the construct ‘expert influence’, a typology of social construction, is shown to be more domineering than other typologies of social construction and is seen as providing symmetrical balance between governing ERP security (success and risk (failure. Implications of these results for theory and practice are discussed in the main article.

  16. The externalisation of migration control in the European Union: first steps towards the external dimension of the space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ryabov Yuri

    2012-03-01

    Full Text Available The creation of an area of freedom, security and justice is one of the most rapidly developing aspects of European integration. It this paper, we take a look at the foreign policies involved in this process — aside from the internal development of the European Union, they concern a significant number of third countries, including Russia. In our view, the efforts to manage the flow of migrants and asylum seekers constitute a viable part of the external dimension within the AFSJ policies. Much of this article is based on the theoretical postulates introduced by the scholars of the Paris School, a school within the discipline of security studies that conceptualized the connection between migration, terrorism, asylum, crime and ethnic clashes, and its role as a major threat facing the European Union. Externalization of this complex threat (that is, externalization in relation to the European Union is thus seen as one of the key prerequisites to advancement of migration management activities beyond the EU (i. e. externalization of migration management. In this article, we analyze the role the EU plays at the international scene and categorize the actions it took to manage the influx of migrants and asylum seekers from the 1980s until the time when supranational administrative bodies were granted mandates in the spheres of Justice and Home Affairs (JHA of the EU Member States. We conclude that it was as early as the 1990-s that the EU launched the policy which later allowed to transfer part of its security concerns to third countries.

  17. PCI compliance understand and implement effective PCI data security standard compliance

    CERN Document Server

    Williams, Branden R

    2012-01-01

    The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of

  18. Crime Victims Support System and Restorative Justice: Possible Implementation in Malaysia

    OpenAIRE

    Azlinda Azman, PhD; Mohd Taufik bin Mohammad

    2013-01-01

    Victims’ position is increasingly acknowledged in the criminal justice system across the world. Because of that, criminal justice systems in various countries slowly transform from focusing too much on the relationship between offenders and the legal system and to between the offenders and their victims. Several programs are highlighted such as victim-offender mediation, family group conferences, reparative orders and referral orders in this article. Findings from several studies support the ...

  19. Health Law as Social Justice.

    Science.gov (United States)

    Wiley, Lindsay F

    2014-01-01

    Health law is in the midst of a dramatic transformation. From a relatively narrow discipline focused on regulating relationships among individual patients, health care providers, and third-party payers, it is expanding into a far broader field with a burgeoning commitment to access to health care and assurance of healthy living conditions as matters of social justice. Through a series of incremental reform efforts stretching back decades before the Affordable Care Act and encompassing public health law as well as the law of health care financing and delivery, reducing health disparities has become a central focus of American health law and policy. This Article labels, describes, and furthers a nascent "health justice" movement by examining what it means to view health law as an instrument of social justice. Drawing on the experiences of the reproductive justice, environmental justice, and food justice movements, and on the writings of political philosophers and ethicists on health justice, I propose that health justice offers an alternative to the market competition and patient rights paradigms that currently dominate health law scholarship, advocacy, and reform. I then examine the role of law in reducing health disparities through the health justice lens. I argue that the nascent health justice framework suggests three commitments for the use of law to reduce health disparities. First, to a broader inquiry that views access to health care as one among many social determinants of health deserving of public attention and resources. Second, to probing inquiry into the effects of class, racial, and other forms of social and cultural bias on the design and implementation of measures to reduce health disparities. And third, to collective action grounded in community engagement and participatory parity. In exploring these commitments, I highlight tensions within the social justice framework and between the social justice framework and the nascent health justice movement

  20. Relational Restorative Justice Pedagogy in Educator Professional Development

    Science.gov (United States)

    Vaandering, Dorothy

    2014-01-01

    What would a professional development experience rooted in the philosophy, principles, and practices of restorative justice look and feel like? This article describes how such a professional development project was designed to implement restorative justice principles and practices into schools in a proactive, relational and sustainable manner by…

  1. Simulating the implementation of the administrative justice act with ThinkLets and GroupSystems: a comparative analysis from three field studies

    CSIR Research Space (South Africa)

    Phahlamohlaka, J

    2006-09-01

    Full Text Available Presented in this paper are the results of three simulation exercises performed as part of a series of field studies whose object is the implementation of the Promotion of Administrative Justice Act. The unit of analysis of the study is the process...

  2. EUROPEAN UNION SUPPORT AND TRANSITIONAL JUSTICE PROCESSES IN KOSOVO

    Directory of Open Access Journals (Sweden)

    Remzije Istrefi

    2017-12-01

    Full Text Available The legacy of systematic human rights violations committed during 1999 violent conflict and the previous repressive rule still impact the everyday life of Kosovo citizens. That is why transitional justice processes are a necessary component in Kosovo’s state building efforts. With the end of the 1999 conflict, Kosovo has been administered by the United Nations Mission in Kosovo (UNMIK and also supported by European Union (EU presences: the EU Special Representative in Kosovo, and European Union Rule of Law Mission known as EULEX. In the course of implementation of their mandates transitional justice processes were not a priority for UNMIK and EU presences. With the signing of the Stabilization and Association Agreement (SAA the EU made transitional justice part of the Kosovo accession demands. In December 2015, the Government of Kosovo approved its National Action Plan for the Implementation of the Stabilization and Association Agreement (NAPISAA. The General Principles of the SAA, included within the NAPISAA oblige Kosovo Government to approve a National Transitional Justice Strategy. This paper analyses EU peace and institution-building support and their impact in transitional justice processes in Kosovo. Through analysing the mandate and actions on the ground it draws conclusions if EU is an active participant in transitional justice process in Kosovo or transitional justice policies are promoted by EU only as part of its enlargement strategy. Finally, the paper gives recommendations as a basis for future elaboration of an EU approach to transitional justice.

  3. Transitional Justice and Peacebuilding : International Center for ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Currently, the United Nations and other agencies advance a broad set of empirical claims concerning the power of transitional justice to promote peace in post-conflict situations. One of the most important is that prosecutions, reparations, official truth-telling, apologies, memorials and reform of abusive security institutions ...

  4. Implementation of Learning Organization Components in Ardabil Social Security Hospital

    OpenAIRE

    Azadeh Zirak

    2015-01-01

    This study aimed to investigate the implementation of learning organization characteristics based on Marquardt systematic model in Ardabil Social Security Hospital. The statistical population of this research was 234 male and female employees of Ardabil Social Security Hospital. For data collection, Marquardt questionnaire was used in the present study which its validity and reliability had been confirmed. Statistical analysis of hypotheses based on independent samples t-test showed that lear...

  5. A Charity/Justice Partnership for U.S. Food Security.

    Science.gov (United States)

    Whitaker, William H.

    1993-01-01

    Contends that it is imperative to end hunger in the United States and to go beyond a national perspective, taking a global perspective to fight hunger elsewhere in the world. Sees America's first response to hunger being charity and considers charity and justice. Discusses efforts of Campaign to End Childhood Hunger and Maine Coalition for Food…

  6. Design and implementation of a high performance network security processor

    Science.gov (United States)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  7. Perception des institutions de sécurité et de justice par les abidjanais

    Directory of Open Access Journals (Sweden)

    Antoine Nassoua Okpo

    2016-07-01

    Full Text Available This study aims at knowing the Abidjanian perception and the induced representation of Ivorian institutions of security and justice. We used theories of motivation, in particular the one concerning motivational content, in order to understand the Abidjanian judgments. Data from a questionnaire and some interviews have provided information that highlight a negative image among citizens of the Ivorian system of security and justice. This discrediting of the system is mainly the result of different dissatisfaction experiences and other complaints towards the system and its agents.

  8. The relationship between organizational justice and workplace aggression.

    Science.gov (United States)

    St-Pierre, Isabelle; Holmes, Dave

    2010-05-01

    This paper is a discussion of the links between organizational justice and workplace aggression. Managers have been identified as key players in implementing and maintaining an organizational culture of trust and justice. Employees who perceive themselves to be victims of injustice may rebel, using various means to 'punish' the source of the injustice. Literature review of publications in English and French from the early 1960 to 2009, including books, was conducted. Bibliographic databases searched for journal articles were Cumulative Index to Nursing and Allied Health Literature, Current Content, EMBASE, Medline, PsycINFO and Web of Science. The work environment and roles of nursing managers have changed considerably in the last 20 years, resulting in challenging working conditions for nursing managers. These can have an impact on their ability to create a trusting and fair culture, and can mean that they themselves be considered victims of organizational injustice. The failure of many re-engineering projects has been linked to a lack of consideration of the impact of perception of justice when implementing change. In addition, perception of organizational justice has the potential to influence many organizational outcomes, such as perception of respect and trust. As justice is a founding principle of biomedical ethics, principles of justice, equity and fairness must be upheld in practice in accordance with the requirements of professional codes of ethics. The concept of justice is linked to the founding principles of biomedical ethics, and these must be upheld in order to practise in accordance with professional codes of ethics and conduct.

  9. The notion and basic principles of restorative justice

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2007-01-01

    Full Text Available One of the most important achievements of the contemporary criminal justice system and criminal policy is development of the concept of restorative justice. Contemporary concept of restorative justice was developed in 1970s on the basis of the criticism of the traditional criminal law and criminal justice system. Since that time, it has been developing through different programs in many countries. Reform of the criminal justice system in Serbia staring from 2002 went into direction of entering elements of restorative justice into existing criminal justice system. In that sense, development of restorative justice is still at the beginning in our country. However, it can be noticed that there is a low level of awareness on the nature and importance of restorative forms of response to crime among our professionals, as well as a lack of understanding of the concept itself. Due to that, the aim of the paper is to enable better understanding of restorative concept in general through defining restorative justice and basic principles it relies on. That may put a basis for further recognition of restorative elements in our criminal justice system, which may provide adequate implementation of relevant provisions of restorative character in practice. .

  10. Informal Justice Systems: Charting a Course for Human Rights-Based Engagement

    DEFF Research Database (Denmark)

    Kerrigan, Fergus; McKay, Anne Louise; Kristiansen, Annali

    engagement with informal justice systems can build greater respect and protection for human rights. It highlights the considerations that development partners should have when assessing whether to implement programmes involving informal justice systems, the primary consideration being that engagement......Providing accessible justice is a state obligation under international human rights standards, but this obligation does not require that all justice be provided through formal justice systems. If done in ways to respect and uphold human rights, the provision of justice through informal justice...... systems is not against human rights standards and can be a mechanism to enhance the fulfilment of human rights obligations by delivering accessible justice to individuals and communities where the formal justice system does not have the capacity or geographical reach. This study seeks to identify how...

  11. Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection

    Science.gov (United States)

    Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang

    Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.

  12. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    International Nuclear Information System (INIS)

    Ibrahim, Ahmad Salah; Jung, Jaecheon

    2016-01-01

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity

  13. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, Ahmad Salah; Jung, Jaecheon [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2016-10-15

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity.

  14. Nuclear security in major public events: the XV Pan American Games and the III Para-Pan American Games in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The organization of a major public event involving large numbers of spectators and participants, presents important security challenges. Taking this into consideration, the Brazilian Nuclear Energy Commission (CNEN) has been requested, by the National Secretary of Public Security/ Ministry of Justice (SENASP/MJ), by the end of 2006, to participate on the security actions to be implemented in both the XV Pan American Games and III Para Pan American Games. The XV Pan American Games 2007 and the III Para Pan American Games were held in Rio de Janeiro, Brazil from 13 to 29 July 2007 and from 12 to 19 August 2007, respectively. Those events had 8700 participants between athletes, coaches and referees from 42 countries. More than 300 competition events were held at 17 different venues and were covered by 4910 professionals from TV, radio and written press. Around 2 million tickets have been sold or distributed and 18,000 volunteers participated on the organization. The participation of CNEN was concentrated on the implementation of specific nuclear and radiological security measures to be applied at those events. This was part of a multi-institutional plan for the security of the Games, coordinated by the National Secretary of Public Security of the Ministry of Justice (SENASP/MJ). The support provided by IAEA under a Cooperation Arrangement with the Brazilian authorities was a key factor for the success of the whole operation. The actions taken and the lessons identified by the Brazilian Nuclear Energy Commission related to nuclear and radiological security for the Pan American Games and for the Para Pan American Games are presented. (author)

  15. Transitional Justice as Elite Justice? Compromise Justice and Transition in Tunisia

    NARCIS (Netherlands)

    Lamont, Christopher; Pannwitz, Hannah

    2016-01-01

    This article reflects upon the ways in which transitional justice debates and processes impacted Tunisia's transition. It explores key questions such as what demands for justice emerged in the aftermath of the Tunisian revolution? Did Tunisia's transitional justice process reflect these demands?

  16. Practices and Policies for Implementing Restorative Justice within Schools

    Science.gov (United States)

    Pavelka, Sandra

    2013-01-01

    Restorative justice models provide schools with the opportunity to improve school culture by addressing the disciplinary standards and creating a forum for peaceful resolution of conflict and misbehavior. These models seek to determine the impact of the incident and establish a mutual, prescriptive agreement for resolving and repairing the harm…

  17. Special Justice for Peace: A Transitional Justice Model According to Modern Tendencies and Orientations of Law and Justice

    Directory of Open Access Journals (Sweden)

    Carlos Arturo Gómez Pavajeau

    2016-06-01

    Full Text Available The article analyses the constitutional implications of the peace agreement about Colombia’s armed conflict. It examines constitutional rules and international instruments about human rights, confronting the agreement with justice criteria in the national and international context, to underline the role of justice for the definitive solution of the conflict. By using the methodology of opposing concepts, it reviews the implications of formal justice and material justice, to establish the superiority of the last one and it’s relation with social justice; it analyses the differences between individual justice and global justice, to demonstrate the need to obtain an integral justice; it contrasts alternative justice and traditional justice, to propose an integrated justice; it explains that justice based upon the formal syllogism should be overcome by a justice based upon equity, to obtain a justice anchored in the Constitution, universal and concentrated in the human rights; it hypothesizes that justice supported in the atonement and retribution should be overcome by a justice that is preventive and restorative, that allows the construction of a justice focused in the future, without ignoring the past; it clarifies that justice with one jurisdiction and special justice are the components of a integrative transitional justice; it explains the presence of justice in different institutions with different functions and justice concentrated in one institution, although with different functions, because there is a search for an integrative justice; it exposes the search for a constitutional and political justice, discussing the vision of justice as a triumph of the force or the scandalous concession of benefits; it exalts that it is a justice in search of a positive discrimination, not a negative discrimination, overcoming the discussion between justice for the powerful and justice for the weak; finally, it considers that it is a justice

  18. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0003] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  19. Promoting Human Rights and Justice from the Perspective of the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As the economic and political clout of new and emerging powers such as China, ... These tools will help guide IDRC's Governance, Security, and Justice ... of its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  20. Implementing Restorative Justice Practice in Schools: What Pedagogy Reveals

    Science.gov (United States)

    Vaandering, Dorothy

    2014-01-01

    In the ongoing pursuit for creating safe, nurturing and relational school cultures, educators continue to turn to restorative justice (rj) principles and practice. Predominantly, schools begin to engage with rj in an effort to address harm done, causing its discourse to be situated in literature tied to classroom management and behaviour. However,…

  1. Agile IT Security Implementation Methodology

    CERN Document Server

    Laskowski, Jeff

    2011-01-01

    The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects. It is useful for anyone responsible for the deployment of IT security countermeasures. Security people with a strong knowledge of agile software development will find this book to be a good review of agile concepts.

  2. Implementation of Safety and Security Issues in the Transport of Radioactive Material in Argentina

    International Nuclear Information System (INIS)

    López Vietri, J.; Elechosa, C.; Gerez Miranda, C.; Menossi, S.; Rodríguez Roldán, M.S.; Fernández, A.

    2016-01-01

    This paper is intended to describe implementation of safety and security issues in the transport of radioactive material by the Nuclear Regulatory Authority (in Spanish Autoridad Regulatoria Nuclear, ARN), which is the Competent Authority of Argentina in Safety, Security and Safeguards of radioactive and nuclear material. There are depicted main regulatory activities dealing with the mentioned issues, and relevant milestones of national regulatory standards and guidance applied, that are based on requirements and guides from IAEA. Interfaces between Safety and Security sections are most of the times complementary but sometimes conflictive, therefore the resolution of such conflicts and goals achieved during their implementation are also commented; as well as future joint planned activities between both sections of ARN as a way to provide safety and security without compromising one or the other. (author)

  3. Emancipatory Nursing Praxis: A Theory of Social Justice in Nursing.

    Science.gov (United States)

    Walter, Robin R

    Emancipatory nursing praxis (ENP) is a middle-range nursing theory of social justice developed from an international, grounded theory study of the critical factors influencing nurses' perceptions of their role in social justice. The ENPs implementing processes (becoming, awakening, engaging, and transforming) and 2 conditional contexts (relational and reflexive) provide an in-depth understanding of the transformative learning process that determines nurse engagement in social justice. Interpretive findings include the voice of Privilege primarily informed ENP theory, the lack of nursing educational and organizational support in social justice role development, and the advocate role should expand to include the role of an ally.

  4. Global Information Justice: Rights, Responsibilities, and Caring Connections.

    Science.gov (United States)

    Smith, Martha

    2001-01-01

    Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)

  5. Transitional Justice

    DEFF Research Database (Denmark)

    Gissel, Line Engbo

    This presentation builds on an earlier published article, 'Contemporary Transitional Justice: Normalising a Politics of Exception'. It argues that the field of transitional justice has undergone a shift in conceptualisation and hence practice. Transitional justice is presently understood to be th...... to be the provision of ordinary criminal justice in contexts of exceptional political transition.......This presentation builds on an earlier published article, 'Contemporary Transitional Justice: Normalising a Politics of Exception'. It argues that the field of transitional justice has undergone a shift in conceptualisation and hence practice. Transitional justice is presently understood...

  6. Mobilising for environmental justice in China

    OpenAIRE

    Balme, Richard

    2014-01-01

    This article assesses the situation of environmental rights in China in terms of political interactions and their implications for Chinese politics. Environmental justice is primarily conceived as equity in access to environmental goods and fairness in social processes dealing with market or government failures to provide environmental security. The argument is that environmental deterioration has a significant influence on the pattern of inequalities in the PRC, occasionally creating situati...

  7. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  8. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  9. Achieving successful evidence-based practice implementation in juvenile justice: The importance of diagnostic and evaluative capacity.

    Science.gov (United States)

    Walker, Sarah Cusworth; Bumbarger, Brian K; Phillippi, Stephen W

    2015-10-01

    Evidence-based programs (EBPs) are an increasingly visible aspect of the treatment landscape in juvenile justice. Research demonstrates that such programs yield positive returns on investment and are replacing more expensive, less effective options. However, programs are unlikely to produce expected benefits when they are not well-matched to community needs, not sustained and do not reach sufficient reach and scale. We argue that achieving these benchmarks for successful implementation will require states and county governments to invest in data-driven decision infrastructure in order to respond in a rigorous and flexible way to shifting political and funding climates. We conceptualize this infrastructure as diagnostic capacity and evaluative capacity: Diagnostic capacity is defined as the process of selecting appropriate programing and evaluative capacity is defined as the ability to monitor and evaluate progress. Policy analyses of Washington State, Pennsylvania and Louisiana's program implementation successes are used to illustrate the benefits of diagnostic and evaluate capacity as a critical element of EBP implementation. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Emerging Environmental Justice Issues in Nuclear Power and Radioactive Contamination

    Directory of Open Access Journals (Sweden)

    Dean Kyne

    2016-07-01

    Full Text Available Nuclear hazards, linked to both U.S. weapons programs and civilian nuclear power, pose substantial environment justice issues. Nuclear power plant (NPP reactors produce low-level ionizing radiation, high level nuclear waste, and are subject to catastrophic contamination events. Justice concerns include plant locations and the large potentially exposed populations, as well as issues in siting, nuclear safety, and barriers to public participation. Other justice issues relate to extensive contamination in the U.S. nuclear weapons complex, and the mining and processing industries that have supported it. To approach the topic, first we discuss distributional justice issues of NPP sites in the U.S. and related procedural injustices in siting, operation, and emergency preparedness. Then we discuss justice concerns involving the U.S. nuclear weapons complex and the ways that uranium mining, processing, and weapons development have affected those living downwind, including a substantial American Indian population. Next we examine the problem of high-level nuclear waste and the risk implications of the lack of secure long-term storage. The handling and deposition of toxic nuclear wastes pose new transgenerational justice issues of unprecedented duration, in comparison to any other industry. Finally, we discuss the persistent risks of nuclear technologies and renewable energy alternatives.

  11. Emerging Environmental Justice Issues in Nuclear Power and Radioactive Contamination.

    Science.gov (United States)

    Kyne, Dean; Bolin, Bob

    2016-07-12

    Nuclear hazards, linked to both U.S. weapons programs and civilian nuclear power, pose substantial environment justice issues. Nuclear power plant (NPP) reactors produce low-level ionizing radiation, high level nuclear waste, and are subject to catastrophic contamination events. Justice concerns include plant locations and the large potentially exposed populations, as well as issues in siting, nuclear safety, and barriers to public participation. Other justice issues relate to extensive contamination in the U.S. nuclear weapons complex, and the mining and processing industries that have supported it. To approach the topic, first we discuss distributional justice issues of NPP sites in the U.S. and related procedural injustices in siting, operation, and emergency preparedness. Then we discuss justice concerns involving the U.S. nuclear weapons complex and the ways that uranium mining, processing, and weapons development have affected those living downwind, including a substantial American Indian population. Next we examine the problem of high-level nuclear waste and the risk implications of the lack of secure long-term storage. The handling and deposition of toxic nuclear wastes pose new transgenerational justice issues of unprecedented duration, in comparison to any other industry. Finally, we discuss the persistent risks of nuclear technologies and renewable energy alternatives.

  12. Effect of Organizational Justice and Job Satisfaction on Organizational Effectiveness with the Moderating Role of Strategic Commitment

    Directory of Open Access Journals (Sweden)

    Atif Kafayat

    2014-12-01

    Full Text Available In this era of highly competitive business environment every organization strives to be successful, and for that an organization pays great emphasis on organizational justice and job satisfaction of its employees in order to be effective and successful. This study investigates the impacts of organizational justice and Job Satisfaction on organizational effectiveness with moderating variable of strategic commitment. The organizational justice is subdivided into three types: Distributive Justice, Procedural justice, Interactional justice while job satisfaction is also divided into three dimensions as well: Working Condition, Job security and Autonomy. This study is an effort to contribute in the body of knowledge and helpful for organizations to improve their effectiveness. The data for this study is collected from Telecommunication sector of Pakistan via questionnaire.

  13. Victimisation and justice in intercultural context in Serbia

    Directory of Open Access Journals (Sweden)

    Nikolić-Ristanović Vesna

    2015-01-01

    Full Text Available During 2013, within the ALTERNATIVE project, Victimology Society of Serbia conducted an empirical research study with the aim to find out how people from three multiethnic communities in Serbia deal with interethnic conflicts in their everyday life and to identify both problems and positive experiences in solving them. It also analysed how victims are treated, how the security and justice are perceived by the citizens, and what is the place of restorative approaches in dealing with conflicts and security. The research was conducted in Bačka Palanka, Bač, Prijepolje and Medveđa. It consisted of qualitative and quantitative part, and it had a strong action dimension. After a brief description of the research methodology, we present main research findings related to the conflicts that have been evolving since 1990 between members of different ethnic groups in three multiethnic communities in Serbia, focusing on the prevalence and characteristics of victimisation and respondents’ notions of justice, i.e. mechanisms suitable to achieve justice in the concrete cases of victimisation they experienced. In the conclusion we point out that respondents attribute high relevance to both formal and informal restorative approaches, suggesting the need of citizens in general, and victims in particular to actively participate in the process of conflict transformation and prevention of further victimisations. [The research leading to these results has received funding from the European Union’s Seventh Framework Programme (FP7-SEC-2011-1 under grant agreement n°285368

  14. Urban land acquisition and social justice in Ethiopia | Mengie ...

    African Journals Online (AJOL)

    In this work, the author argues that the existing urban land acquisition system of Ethiopia has resulted in social injustice by denying the poor from access to urban land; and creating discriminatory environment while enforcing the new lease system. Keywords: access to land, land lease, social justice, tenure security, urban ...

  15. Organising Data Exchange in the Dutch Criminal Justice Chain

    Directory of Open Access Journals (Sweden)

    Philip LANGBROEK

    2009-12-01

    Full Text Available Effective exchange of information in the criminal justice chain is crucial for effective law enforcement, but difficult to achieve. This article describes the case of the development and introduction of electronic data exchange in the Dutch Criminal Justice chain. Basic theories on the introduction of IT in justice organizations are tested by means of qualitative empirical research. Case flow management automation is technically feasible in the criminal justice chain but presupposes willingness of different organizations attached to that chain to adapt working processes for that purpose. The Dutch case shows a relative failure of the development and implementation of an integrated case flow management system for the entire chain (from the police via the public prosecutions office and the courts up to the prison service. It also shows a relative success of connecting xml-based data files to different reference indexes using intelligent agent software. Compared to the intended integrated case flow management system this solution for inter-organizational data exchange is much more simple and flexible because it does not demand a far reaching adaptation of internal organizational routines. It avoids the complexities of justice organizations and simplifies tasks related to data exchange. The data therefore are more accurate and are faster available. The most important advantage however is that risks of failure of development and implementation are reduced.

  16. European Court of Justice Secures Fundamental Rights from UN Security Council Resolutions

    Directory of Open Access Journals (Sweden)

    Sebastian Recker

    2009-02-01

    /msohtml1/01/clip_header.htm" fcs; mso-endnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" es; mso-endnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" ecs;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 2.0cm 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} -->

    The European Court of Justice has annulled Council Regulation (EC No 881/2002[1] freezing funds of Mr. Kadi and Al Barakaat based on Resolution 1267 (1999[2] of the United Nations Security Council[3]. In so doing, the European Court of Justice has set aside the Court of First Instance’s judgment

  17. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

  18. Incorporating environmental justice into environmental decision making

    Energy Technology Data Exchange (ETDEWEB)

    Wolfe, A.K.; Vogt, D.P.; Hwang, Ho-Ling [Oak Ridge National Lab., TN (United States)] [and others

    1995-07-01

    Executive Order 12898, signed on February 11, 1994, broadly states that federal activities, programs, and policies should not produce disproportionately high and adverse impacts on minority and low-income populations. Moreover, the Order indicates that these populations should not be denied the benefits of, or excluded from participation in, these activities, programs, and policies. Because a presidential memorandum accompanying the order said that National Environmental Policy Act (NEPA) documents should begin to address environmental justice immediately, much attention has been paid to assessment-related issues. Also important, a topic that appears to have received relatively little attention, is how decision makers should be expected to use information about environmental justice in their decision making. This paper discusses issues surrounding the use of environmental justice information in the decision-making process by focusing on the following five main topics: (1) the importance, or weight, attached to environmental justice within larger decision-making contexts; (2) the potential tension between localized environmental justice issues and regional or national issues and needs; (3) the use of environmental justice information to develop (perhaps in concert with affected minority and low-income communities) appropriate mitigation strategies, or to establish conditions under which activities, programs, and policies may be accepted locally; (4) the general implications of shifting the distribution of broadly defined risks, costs, and benefits among different population groups; and (5) the implications of implementing environmental justice on an individual, ad hoc basis rather than within a larger environmental justice framework. This paper raises the issues and discusses the implications of alternative approaches to them.

  19. social justice in nigeria: the dialectics of ideas and reality

    African Journals Online (AJOL)

    This paper set out to critically look into the gap that has existed between ideas and reality in the realm of social justice in Nigeria. To realize this objective, the paper examined the dynamics of the Nigerian political economy and how this impinges on the practice and implementation of social justice. The paper subsequently ...

  20. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  1. 28 CFR 71.40 - Stays ordered by the Department of Justice.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Stays ordered by the Department of Justice. 71.40 Section 71.40 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) IMPLEMENTATION OF... finding that continuation of the administrative process described in this part with respect to a claim or...

  2. Failing to Fulfill Tasks of Social Justice Weakens Country.

    Science.gov (United States)

    USA Today, 1981

    1981-01-01

    Presents excerpts from an interview with Walter Mondale in which the former vice president expressed fears that the United States will be weakened by current policies of removing government from the tasks of social justice. Topics discussed include social security cuts, reduction of student loans, and elimination of the legal aid program. (DB)

  3. THE THEORETICAL PRINCIPLES OF JUSTICE WITHIN THE PENAL ASPECT

    Directory of Open Access Journals (Sweden)

    Kristina Sawen

    2017-05-01

    Full Text Available Justice will be fulfilled when the restraint on actions to benefit themselves by way of seizing what belongs to someone else is or reject what was supposed to be given to others.Justice will be fulfilled when self-restraint are applied to on actions that will only be self-benefiting for the said individuals by way of seizing someone else’s belongings or rejecting what is supposed to be given to others. Justice will be seen in the legal provisions governing and being framed in managing the human life even if that provision is still in the form of ideas that poured in through the legal provisions of the country. Justice can be seen in legal provisions that govern and frame the human’s life even if that provision is still in the form of ideas that are subscribed in the legal provisions of the country. The threat of sanctions contained in the law as one element of a crime, is also a manifestation of the value of the balance between the prohibition or the permissibility of things which will manifest themselves in a sanction when a violation of these provisions. The threat of a sanction that is contained in the law, as an element of crime, is also a form of manifestation of the accessibility of a certain value of balance between prohibition or permissibility which will be visible in the form of a sanction when a violation of these provisions occurs. As a value of balance between the ban and the threat of sanctions would also form the idea of the values of justice in law, which is expected to be obeyed by the people. The value of a balance between the prohibitions or threats will also form the values of justice in law, which is expected to be adhered to by by the people. So the sosial order and security of living together can be met.The importance of justice seen as essential virtues of that must be firmly held and at the same time the spirit of the basis of various institutions basic social a society .It means give it a chance in a fair manner and

  4. [Environmental justice as an approach to tackle environmental health inequalities].

    Science.gov (United States)

    Bolte, Gabriele; Bunge, Christiane; Hornberg, Claudia; Köckler, Heike

    2018-06-01

    Current international studies show that environment-related diseases disproportionately affect vulnerable people. This is a case of environmental injustice. Environmental justice goes beyond the mere description of environment- and health-related social inequalities by comprising two dimensions of justice as a normative approach: distributional and procedural justice. Attempts to explain the link between social circumstances, the environment and health deal with both the socially unequal distribution of environmental hazards and environmental resources (exposure variation) and social differences in vulnerability to the health effects of environmental exposures (effect modification). Integrated monitoring approaches provide the basis for deriving interventions under various aspects of environmental justice. Parting from public health research and embedded in the Health in All Policies (HiAP) concept, environmental justice has now been taken up in a number of fields, including politics, administration and practice. There are strategic considerations and attempts to anchor it in politics at the federal, state and the communal level, both by government and non-government groups. Health-promoting urban development is a core field for intervention. The Soziale Stadt (Social City) programme for promoting urban planning and construction as well as place oriented sectoral planning make an important contribution by helping to focus on urban spaces with multiple health hazards and to implement target group-oriented participation processes. There continues to be a need to develop methods and systematically implemented evaluations of political strategies and corresponding interventions regarding their effects on inequalities in health and environmental justice.

  5. 75 FR 45151 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  6. Resistance, Justice, and Commitment to Change

    Science.gov (United States)

    Foster, Rex D.

    2010-01-01

    This research focused on individual responses to organizational change by exploring the relationships among individual resistance, organizational justice, and commitment to change following organizational change implementations in three organizations. To accomplish this, Web-based questionnaires were used to gather individual-level quantitative…

  7. 77 FR 39117 - Equal Access to Justice Act Implementation Rule

    Science.gov (United States)

    2012-06-29

    ... regularly perform services for remuneration for the applicant, under the applicant's direction and control... Director may delegate authority to take final action on matters pertaining to the Equal Access to Justice... that the Director's final order issued pursuant to Sec. 1081.405 is final and unappealable, both within...

  8. The design of a medical school social justice curriculum.

    Science.gov (United States)

    Coria, Alexandra; McKelvey, T Greg; Charlton, Paul; Woodworth, Michael; Lahey, Timothy

    2013-10-01

    The acquisition of skills to recognize and redress adverse social determinants of disease is an important component of undergraduate medical education. In this article, the authors justify and define "social justice curriculum" and then describe the medical school social justice curriculum designed by the multidisciplinary Social Justice Vertical Integration Group (SJVIG) at the Geisel School of Medicine at Dartmouth. The SJVIG addressed five goals: (1) to define core competencies in social justice education, (2) to identify key topics that a social justice curriculum should cover, (3) to assess social justice curricula at other institutions, (4) to catalog institutionally affiliated community outreach sites at which teaching could be paired with hands-on service work, and (5) to provide examples of the integration of social justice teaching into the core (i.e., basic science) curriculum. The SJVIG felt a social justice curriculum should cover the scope of health disparities, reasons to address health disparities, and means of addressing these disparities. The group recommended competency-based student evaluations and advocated assessing the impact of medical students' social justice work on communities. The group identified the use of class discussion of physicians' obligation to participate in social justice work as an educational tool, and they emphasized the importance of a mandatory, longitudinal, immersive, mentored community outreach practicum. Faculty and administrators are implementing these changes as part of an overall curriculum redesign (2012-2015). A well-designed medical school social justice curriculum should improve student recognition and rectification of adverse social determinants of disease.

  9. Restoring rape survivors: justice, advocacy, and a call to action.

    Science.gov (United States)

    Koss, Mary P

    2006-11-01

    Rape results in mental and physical health, social, and legal consequences. For the latter, restorative justice-based programs might augment community response, but they generate controversy among advocates and policy makers. This article identifies survivors' needs and existing community responses to them. Survivors feel their legal needs are most poorly met due to justice system problems that can be summarized as attrition, retraumatization, and disparate treatment across gender, class, and ethnic lines. Empirical data support each problem and the conclusion that present justice options are inadequate. The article concludes by identifying common ground in advocacy and restorative justice goals and calls for a holistic approach to the needs of rape survivors that includes advocating for expanded justice alternatives. A call to action is issued to implement restorative alternatives to expand survivor choice and offender accountability. Conventional and restorative justice are often viewed as mutually exclusive whereas the author argues they are complementary.

  10. METHOD FOR SECURITY SPECIFICATION SOFTWARE REQUIREMENTS AS A MEANS FOR IMPLEMENTING A SOFTWARE DEVELOPMENT PROCESS SECURE - MERSEC

    Directory of Open Access Journals (Sweden)

    Castro Mecías, L.T.

    2015-06-01

    Full Text Available Often security incidents that have the object or use the software as a means of causing serious damage and legal, economic consequences, etc. Results of a survey by Kaspersky Lab reflectvulnerabilities in software are the main cause of security incidents in enterprises, the report shows that 85% of them have reported security incidents and vulnerabilities in software are the main reason is further estimated that incidents can cause significant losses estimated from 50,000 to $ 649.000. (1 In this regard academic and industry research focuses on proposals based on reducing vulnerabilities and failures of technology, with a positive influence on how the software is developed. A development process for improved safety practices and should include activities from the initial phases of the software; so that security needs are identified, manage risk and appropriate measures are implemented. This article discusses a method of analysis, acquisition and requirements specification of the software safety analysis on the basis of various proposals and deficiencies identified from participant observation in software development teams. Experiments performed using the proposed yields positive results regarding the reduction of security vulnerabilities and compliance with the safety objectives of the software.

  11. Measuring Practices of Teaching for Social Justice in Elementary Mathematics Classrooms

    Science.gov (United States)

    Reagan, Emilie Mitescu; Pedulla, Joseph J.; Jong, Cindy; Cannady, Mac; Cochran-Smith, Marilyn

    2011-01-01

    This study used the Teaching for Social Justice Observation Scale (TSJOS) of the Reformed Teaching Observation Protocol-Plus (RTOP+) to examine the extent to which twenty-two novice elementary teachers implemented practices related to teaching for social justice in their mathematics instruction. In addition, this study sought to examine the extent…

  12. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide

    International Nuclear Information System (INIS)

    2012-01-01

    severe consequences, depending upon the nature and quantity of the specific material involved, the mode of dispersal (violent or non-violent), the location and the population impacted. Implementing nuclear security systems and measures is, therefore, of paramount importance. This Implementing Guide may be useful to the organizers of major public events. It represents a sound basis, drawn from experience, for raising awareness about nuclear security systems and the measures to be applied for such events.

  13. Design and Implementation of GSM Based Automated Home Security System

    Directory of Open Access Journals (Sweden)

    Love Aggarwal

    2014-05-01

    Full Text Available The Automated Home Security System aims at building a security system for common households using GSM modem, sensors and microcontroller. Since many years, impeccable security system has been the prime need of every man who owns a house. The increasing crime rate has further pressed the need for it. Our system is an initiative in this direction. The system provides security function by monitoring the surroundings at home for intruders, fire, gas leakages etc. using sensors and issue alerts to the owners and local authorities by using GSM via SMS. It provides the automation function as it can control (On/Off the various home appliances while the owners are away via SMS. Thus the Automated Home Security System is self-sufficient and can be relied upon undoubtedly. Also, it is capable of establishing two way communication with its owner so that he/she can keep a watch on his/her home via sensor information or live video streaming. A camera can be installed for continuous monitoring of the system and its surroundings. The system consists of two main parts: hardware and software. Hardware consists of Microcontroller, Sensors, Buzzer and GSM modem while software is implemented by tools using Embedded ‘C’.

  14. 22 CFR 521.40 - Stays ordered by the Department of Justice.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Stays ordered by the Department of Justice. 521.40 Section 521.40 Foreign Relations BROADCASTING BOARD OF GOVERNORS IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT § 521.40 Stays ordered by the Department of Justice. If at any time the...

  15. 22 CFR 224.40 - Stays ordered by the Department of Justice.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Stays ordered by the Department of Justice. 224.40 Section 224.40 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT IMPLEMENTATION OF THE PROGRAM FRAUD CIVIL REMEDIES ACT § 224.40 Stays ordered by the Department of Justice. If at any time the...

  16. Assessing the Effectiveness of Alternative Community-Led Security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    While many believe the state has a monopoly on the legitimate use of force, realities on the ground challenge this assertion, particularly in conflict and ... It will document alternative sources of governance, security, and justice that urban communities apply when state security forces are weak, unresponsive, or abusive.

  17. The Justice of Improving Security and Confronting Poverty

    DEFF Research Database (Denmark)

    Farah, Abdulkadir Osman

    2016-01-01

    Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory of such eff......Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory...

  18. Teacher Consultation to Enhance Implementation of School-Based Restorative Justice

    Science.gov (United States)

    Mayworm, Ashley M.; Sharkey, Jill D.; Hunnicutt, Kayleigh L.; Schiedel, K. Chris

    2016-01-01

    Restorative justice (RJ) is an alternative approach to school discipline that has been gaining recognition in the public and academic spheres as a way to engage students who misbehave in school. RJ has promise to address racial/ethnic, gender, and disability disproportionality in school discipline. One aspect of school-based RJ that has received…

  19. Restorative Justice Of Adjudication On The Household Violence

    Directory of Open Access Journals (Sweden)

    Srigandawati

    2017-06-01

    Full Text Available The essence of restorative justice in the settlement of household violence is very important as bridge for peace of the parties to restoring good relations between the perpetrator and victim both the direct and indirect victim the family of victim. The type of research is socio-legal research with the normative law method doctrinal research. The results shows that the implementation of restorative justice of adjudication on household violence cases can be applied although there is no legal arrangement. The judge may apply in its judgment based on the fact that the judge cannot refuse a case because of a law that does not exist or it is unclear. Judges are required to explore the values that live within society to discover the law. It can be concluded that restorative justice has been acknowledged by its existence in the adjudication as the purpose of punishment. Similar perceptions are required for law enforcers concern the concept of restorative justice as the purpose of punishment.

  20. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  1. Juvenile Justice Paradigms and Improvement of Realization of the Constitutional Rights and Freedoms of Man and Citizen in Russiay

    OpenAIRE

    Arpentieva M. R.

    2015-01-01

    The article is devoted to the problems of implementation and procedures of reconstructing model of juvenile justice system, it considers foreign and domestic experience (problems) of juvenile justice. The author compares the doctrines of juvenile justice, including the doctrine of punitive and understanding justice.

  2. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  3. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  4. Access to Justice for Communications Surveillance and Interception : Scrutinising Intelligence Gathering Reform Legislation

    NARCIS (Netherlands)

    Quirine Eijkman

    2018-01-01

    By analysing intelligence-gathering reform legislation this article discusses access to justice for communications interception by the intelligence and security services. In the aftermath of the Snowden revelations, sophisticated oversight systems for bulk communications surveillance are being

  5. Exploring Intervening Influence of Interactional Justice between Procedural Justice and Job Performance: Evidence from South Asian Countries

    Directory of Open Access Journals (Sweden)

    Muhammad Ashraf

    2018-02-01

    Full Text Available The paper investigates the intervening influence of interactional justice between procedural justice and job performance (task, contextual and adaptive performance of the faculty members of Karachi (Pakistan and Dhaka (Bangladesh based government colleges by using Structural Equation Modelling (SEM. Data, for this study, has been collected through pre-designed close-ended questionnaire. The intervening variable fully mediated the relationship between procedural justice and job performance. The result of this study indicates that the performance of government college faculty members can be improved by ensuring fair procedures and dignified treatment of faculty members in the working environment. It can be concluded that teachers can accommodate harsh procedures, subject to courteously and fairly communicated. Significance of this study is that it has investigated the least researched areas in Pakistan and Bangladesh. Its findings can be helpful to the government and college administration while making and implementing policies for college education development in both countries

  6. Juvenile Justice Paradigms and Improvement of Realization of the Constitutional Rights and Freedoms of Man and Citizen in Russiay

    Directory of Open Access Journals (Sweden)

    Arpentieva M. R.

    2015-07-01

    Full Text Available The article is devoted to the problems of implementation and procedures of reconstructing model of juvenile justice system, it considers foreign and domestic experience (problems of juvenile justice. The author compares the doctrines of juvenile justice, including the doctrine of punitive and understanding justice.

  7. Environmental justice at the Savannah River Site

    International Nuclear Information System (INIS)

    Flemming, R.; Hooker, K.L.

    1995-01-01

    Environmental justice is the conscious commitment to ensure that poor and/or minority communities are not disproportionately bearing adverse human health and environmental effects from the production, processing, or disposal of hazardous or toxic waste. To focus federal attention on assessing the environmental and human health conditions in minority and/or low-income communities surrounding federal facilities, on February 11, 1994, President Clinton signed Executive Order (EO) 12898. As part of the strategy to comply with EO 12898, the President required all federal agencies to develop localized strategies to ensure that their programs and policies are consistent with EO 12898. This would incorporate mechanisms for increasing public participation opportunities for involvement in the decision making, easier access to information, and the collection and analysis of economic, demographic, and food consumption data in surrounding communities. The U.S. Department of Energy (DOE) responded by issuing its Environmental Justice Strategy 2 (April 1995), although many of its field offices had been actively implementing activities in support of the executive order since its issuance. One DOE facility, the Savannah River Site (SRS), which is located in west central South Carolina, is making great strides toward implementing a successful public participation program, which includes environmental justice initiatives

  8. e-Justice in France: the e-Barreau experience

    Directory of Open Access Journals (Sweden)

    Marco Velicogna

    2011-01-01

    Full Text Available Recent field research projects in the justice sector have shown how the development of e-justice entails much more than developing, installing and connecting technological devices or providing normative recognition to the use of the digital medium instead of the traditional one for the exchange of documents. This article presents an exploratory case-study describing the development of an e-filing and document-exchange system between lawyers and ordinary courts in the French justice administration. As it soon became apparent, the real challenge did not lie in the search, assembly and manufacture of technological tools, but in the creation of the governance net of relevant organizational actors that was needed to successfully sustain and implement the innovation. It concerned looking for acceptable compromises as to what could be done and how. The challenge was also to find ways to motivate users to actively participate in the creation of the new service which could not work without them. Furthermore, external and somewhat unforeseeable events also played a relevant role in defining choices, the tempo and the possibilities for the success of the system's design and implementation.

  9. Implementing the Payment Card Industry (PCI Data Security Standard (DSS

    Directory of Open Access Journals (Sweden)

    John O' Raw

    2011-08-01

    Full Text Available Underpinned by the rise in online criminality, the payment card industry (PCI data security standards (DSS were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP can be applied to meet the requirement of masking the primary account number (PAN. Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.

  10. Participatory Action Research as a Social-Justice Framework for Assessment in Student Affairs

    Science.gov (United States)

    Zerquera, Desiree D.; Berumen, Juan G.; Pender, Jason T.

    2017-01-01

    While sufficient methodological training and effective implementation of assessment approaches are essential for successful evaluation in student affairs, those with an interest and passion for social justice may be conflicted. Many of the assessment approaches employed today are misaligned with social justice agendas, lack theoretical grounding…

  11. Software Implementation of Secure Firmware Update in IoT Concept

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2017-01-01

    Full Text Available This paper focuses on a survey of secure firmware update in the Internet of Things, design and description of safe and secure bootloader implementation on RFID UHF reader, encryption with AES-CCM and versioning with use of external backup flash memory device. In the case of problems with HW compatibility or other unexpected errors with new FW version, it is possible to downgrade to previous FW image, including the factory image. Authentication is provided by the UHF RFID service tag used to extract unique initialization vector of the encryption algorithm for each update session. The results show slower update speed with this new upgrade method of approximately 27% compared to older one, using the only AES-CBC algorithm.

  12. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  13. Justice orientation as a moderator of the framing effect on procedural justice perception.

    Science.gov (United States)

    Sasaki, Hiroyuki; Hayashi, Yoichiro

    2014-01-01

    Justice orientation is a justice-relevant personality trait, which is referred to as the tendency to attend to fairness issues and to internalize justice as a moral virtue. This study examined the moderating role of justice orientation in the relationship between justice perception and response to a decision problem. The authors manipulated procedural justice and the outcome valence of the decision frame within a vignette, and measured justice orientation of 174 Japanese participants. As hypothesized, the results indicated an interaction between procedural justice and framing manipulation, which was moderated by individual differences in justice orientation. In negative framing, justice effects were larger for individuals with high rather than low justice orientation. The results are explained from a social justice perspective, and the contributions and limitations of this study are also discussed with respect to our sample and framing manipulation.

  14. Retributive and restorative justice.

    Science.gov (United States)

    Wenzel, Michael; Okimoto, Tyler G; Feather, Norman T; Platow, Michael J

    2008-10-01

    The emergence of restorative justice as an alternative model to Western, court-based criminal justice may have important implications for the psychology of justice. It is proposed that two different notions of justice affect responses to rule-breaking: restorative and retributive justice. Retributive justice essentially refers to the repair of justice through unilateral imposition of punishment, whereas restorative justice means the repair of justice through reaffirming a shared value-consensus in a bilateral process. Among the symbolic implications of transgressions, concerns about status and power are primarily related to retributive justice and concerns about shared values are primarily related to restorative justice. At the core of these processes, however, lies the parties' construal of their identity relation, specifically whether or not respondents perceive to share an identity with the offender. The specific case of intergroup transgressions is discussed, as are implications for future research on restoring a sense of justice after rule-breaking.

  15. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-08-23

    ... regulations to exempt portions of a Department of Homeland Security/United States Citizenship and Immigration system of records entitled the ``United States Citizenship and Immigration Services--009 Compliance... of 1974: Implementation of Exemptions; Department of Homeland Security/United States Citizenship and...

  16. Towards an integrative post-2015 sustainable development goal framework: Focusing on global justice – peace, security and basic human rights

    Directory of Open Access Journals (Sweden)

    George R. Lueddeke

    2015-12-01

    To strengthen the likelihood of realizing the post-2015 Sustainable Development Goals (SDGs, particularly with regard to “planet and population” health and well-being , UN and other decision-makers are urged to consider the adoption of an integrated SDG framework that is based on (i a vision of global justice - underpinned by peace, security and basic human rights; (ii the development of interdependent and interconnected strategies for each of the eleven thematic indicators identified in the UN document The World We Want; and (iii the application of guiding principles to measure the impact of SDG strategies in terms of holism, equity, sustainability, ownership, and global obligation. While current discussions on the SDGs are making progress in a number of areas, the need for integration of these around a common global vision and purpose seems especially crucial to avoid MDG shortcomings.

  17. Civilisation of Criminal Justice: Restorative Justice amongst other strategies

    NARCIS (Netherlands)

    J.R. Blad (John)

    2013-01-01

    markdownabstract__Abstract__ Is criminal justice becoming more and uncivilised if so, how could this be explained? Could Is criminal justice becoming more and uncivilised if so, how could this be explained? Could Is criminal justice becoming more and uncivilised if so, how could this be

  18. Risk Informed Approach for Nuclear Security Measures for Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to States for developing a risk informed approach and for conducting threat and risk assessments as the basis for the design and implementation of sustainable nuclear security systems and measures for prevention of, detection of, and response to criminal and intentional unauthorised acts involving nuclear and other radioactive material out of regulatory control. It describes concepts and methodologies for a risk informed approach, including identification and assessment of threats, targets, and potential consequences; threat and risk assessment methodologies, and the use of risk informed approaches as the basis for informing the development and implementation of nuclear security systems and measures. The publication is an Implementing Guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, law enforcement agencies and experts from competent authorities and other relevant organizations involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures related to nuclear and other radioactive material out of regulatory control

  19. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  20. REDD+ on the rocks? Conflict Over Forest and Politics of Justice in Vietnam.

    Science.gov (United States)

    Sikor, Thomas; Cầm, Hoàng

    In Vietnam, villagers involved in a REDD+ (reduced emissions from deforestation and forest degradation) pilot protect areas with rocks which have barely a tree on them. The apparent paradox indicates how actual practices differ from general ideas about REDD+ due to ongoing conflict over forest, and how contestations over the meaning of justice are a core element in negotiations over REDD+. We explore these politics of justice by examining how the actors involved in the REDD+ pilot negotiate the particular subjects, dimensions, and authority of justice considered relevant, and show how politics of justice are implicit to practical decisions in project implementation. Contestations over the meaning of justice are an important element in the practices and processes constituting REDD+ at global, national and local levels, challenging uniform definitions of forest justice and how forests ought to be managed.

  1. Economizing justice: Turning equity claims into lower energy tariffs in Chile

    International Nuclear Information System (INIS)

    Alvial-Palavicino, Carla; Ureta, Sebastián

    2017-01-01

    This paper considers the issue of how energy justice is economized; how political and ethical claims about particular energy (in)justices are turned into economic valuations. Drawing on science and technology studies, we present a conceptual framework that understands economization as emerging from three interrelated processes: problematization, framing and overflowing. Applying this framework to the drafting of new energy legislation in Chile, we trace how perceived shortcomings in equity and distributional justice were turned into “market failures,” able to be resolved by market-based mechanisms. This case highlights the dangers implicit in the uncritical economization of energy justice claims, in which ethical considerations regarding the distribution of risks and benefits of energy production and provision are reduced to a redistribution of payments among consumers – something that limits the possibilities for structural reform. - Highlights: • The implementation of an electricity equity tariff is discussed. • A process of economization transforms equity demands into market devices. • Energy justice, as mobilized in the policy process, includes multiple forms of justice. • Competition between these multiple forms fails to deliver a complete form of justice.

  2. Corrective Justice vs. Social Justice in the Aftermath of War

    Directory of Open Access Journals (Sweden)

    Pablo Kalmanovitz

    2010-11-01

    Full Text Available How do we justify the practice of corrective justice for losses suffered during armed conflicts? This article seeks to show the force and relevance of this question, and to argue that, in cases of massively destructive wars, social justice should gain priority over corrective justice. Starting from a liberal Rawlsian conception of the relationship between corrective and social justice, it is argued that, paradoxically, the more destructive a war is, the less normative force corrective rights have and the higher priority policies of social justice, which guarantee basic rights to all citizens, should have.

  3. Access to Justice and Labor Law Reform in Asia

    Directory of Open Access Journals (Sweden)

    Asri Wijayanti

    2016-06-01

    Full Text Available The existence of national labor law system guarantees fair is one of legal reform to achieve access to justice. This study aims to analyze whether the system of labor law has given capacity to achieve access to justice as the basis for implementing international labor relations in Asia. The method of this study is a normative legal research with statute approach. The findings support that there was an inconsistency on the substance of the legal structures that affect the low legal culture. The substance of the national labor law systems have not adapted the comprehensive International Labor Organization (ILO conventions. Less robust system of national labor laws affect access to justice in the weak field of labor in the region. How To Cite: Wijayanti, A. (2016. Access to Justice and Labor Law Reform in Asia. Rechtsidee, 3(1, 17-26. doi:http://dx.doi.org/10.21070/jihr.v3i1.144

  4. Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

    Directory of Open Access Journals (Sweden)

    Imen Bouabidi

    2017-01-01

    Full Text Available To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation and are interested specifically in only one layer. Consequently, the originality of this work consists to combine together the two features using a crossing between three layers: physical layer, data link layer and network layer. Our proposition consists firstly in developing a new network deployment in hierarchical areas. This model takes place at the network layer. Secondly, implementing an energy efficient and secure MAC protocol providing a secure authentication, data privacy and integrity in a mobile WSN. Finally, implementing an intrusion detection system protecting the physical layer from malware and viruses that threaten it. We have been used OMNet++ for simulation .Our proposed protocol SXMachiavel offered the best performances and more reliability at the mobility rate (can reach 99% compared with XMachiavel, which doesn’t exceed 35%, loss packets rate (0.05% for a small network size and energy consumption (decreases by 0.01% for each exchanged packet.

  5. Implementation of Learning Organization Components in Ardabil Social Security Hospital

    Directory of Open Access Journals (Sweden)

    Azadeh Zirak

    2015-06-01

    Full Text Available This study aimed to investigate the implementation of learning organization characteristics based on Marquardt systematic model in Ardabil Social Security Hospital. The statistical population of this research was 234 male and female employees of Ardabil Social Security Hospital. For data collection, Marquardt questionnaire was used in the present study which its validity and reliability had been confirmed. Statistical analysis of hypotheses based on independent samples t-test showed that learning organization characteristics were used more than average level in some subsystems of Marquardt model and there was a significant difference between current position and excellent position based on learning organization characteristic application. According to the research findings, more attention should be paid to the subsystems of learning organization establishment and balanced development of these subsystems.

  6. Sanitary justice in scarcity

    Directory of Open Access Journals (Sweden)

    Miguel Kottow

    Full Text Available Justice in health care and the allocation of scarce medical resources must be analyzed differently in affluent as compared to economically weaker societies. The protective functions of the state must be extended to cover basic needs for those too poor to meet them on their own. Medical needs are a high priority, since poor health hampers the ability to secure other basic needs. The state may operate as either a health care provider or supervisor, guaranteeing that citizens be treated fairly by nongovernmental institutions. Two-tiered systems with a vigorous private health care sector are compatible with the explicit right to health care, provided the private tier operates without directly or indirectly draining public funds.

  7. Changing principles in European social security

    NARCIS (Netherlands)

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic

  8. Contemporary Transitional Justice

    DEFF Research Database (Denmark)

    Gissel, Line Engbo

    2017-01-01

    This article studies the contemporary expression of transitional justice, a field of practice through which global governance is exercised. It argues that transitional justice is being normalised, given the normative and empirical de-legitimisation of its premise of exceptionalism. The article...... theorises exceptionalism and normalcy in transitional justice and identifies three macro-level causes of normalisation: the legalisation, internationalisation, and professionalization of the field. This argument is illustrated by a study of Uganda’s trajectory of transitional justice since 1986. Across five...... phases of transitional justice, processes of legalisation, internationalisation, and professionalization have contributed to the gradual dismantling of the country’s exceptional justice. The case demonstrates, further, that normalization is a contested and incomplete process....

  9. Security aspects of database systems implementation

    OpenAIRE

    Pokorný, Tomáš

    2009-01-01

    The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database s...

  10. Measuring the Perception of Travel Security – Comparative Analysis of Students in Two Different Fields: Tourism and Security

    Directory of Open Access Journals (Sweden)

    Sebastjan Repnik

    2015-01-01

    Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as

  11. Security in the transport of radioactive material: Implementing guide. Spanish edition

    International Nuclear Information System (INIS)

    2013-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks

  12. Security in the Transport of Radioactive Material. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  13. Security in the Transport of Radioactive Material. Implementing Guide (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  14. Ending Sexual Violence Through Transformative Justice

    Directory of Open Access Journals (Sweden)

    Judith Armatta

    2018-02-01

    Full Text Available Sexual violence is used to maintain what Dr. Riane Eisler (1990 conceptualizes as the dominator model of society. The early days of the feminist anti-violence movement focused on changing the dominator model, but, in part, this focus was co-opted by seeking criminal justice solutions, contributing to punitive responses and mass incarceration that have been ineffective in ending sexual violence. The racist history of the rape charge and its disproportionate effect on people of color, an effect that continues today. Legislators have passed draconian laws that uniquely apply to anyone convicted of a sex offense, the definition of which has been broadened to encompass harmless behavior. A separate legal regime for sex offenders that isolates them from society and marks them for life as monsters obfuscates the causes of sexual violence and contributes to the problem. The feminist anti-violence movement remains influential, though little recognized, in today’s efforts to respond to sexual violence through restorative justice and transformative justice. A number of groups have adopted the RJ/TJ model, in particular women of color. The article provides examples of successful and unsuccessful implementation of RJ/TJ and discusses impediments to wider adoption of this approach. RJ/TJ is a promising alternative to the current criminal justice response to sexual assault, one that will bring us closer to a partnership culture.

  15. How discrimination and perspective-taking influence adolescents' attitudes about justice.

    Science.gov (United States)

    Rasmussen, Hannah F; Ramos, Michelle C; Han, Sohyun C; Pettit, Corey; Margolin, Gayla

    2018-01-01

    Little is known about factors influencing adolescents' justice attitudes. This online study investigates perspective-taking and experiences with discrimination for their associations with adolescents' beliefs about how justice is best served. Participants included 179 ethnically/racially diverse high school students (M age  = 16.67 years; SD = 1.02). Higher perspective-taking was associated with less punitive and more restorative attitudes. Youth reporting more personal and ethnic/racial discrimination experiences endorsed more restorative justice attitudes. Perspective-taking also moderated the associations between reports of family, personal, and religious discrimination and punitive justice attitudes: adolescents reporting higher discrimination showed a stronger inverse relationship between perspective-taking and punitive attitudes. Findings have implications for school and community programs aiming to implement restorative policies, and for adolescents' civic participation. Copyright © 2017 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  16. Special Justice for Peace: A Transitional Justice Model According to Modern Tendencies and Orientations of Law and Justice

    OpenAIRE

    Carlos Arturo Gómez Pavajeau

    2016-01-01

    The article analyses the constitutional implications of the peace agreement about Colombia’s armed conflict. It examines constitutional rules and international instruments about human rights, confronting the agreement with justice criteria in the national and international context, to underline the role of justice for the definitive solution of the conflict. By using the methodology of opposing concepts, it reviews the implications of formal justice and material justice, to establish the supe...

  17. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Science.gov (United States)

    2011-07-06

    ... the Terrorist Screening Database System of Records relates to official DHS national security and law... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 [Docket No. DHS-2011-0060] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--030 Use of the...

  18. Reforming the South African Social Security Adjudication System ...

    African Journals Online (AJOL)

    Reforming the South African Social Security Adjudication System: innovative experiences ... Dispute resolution systems in the labour relations, business competition ... the rights of access to justice, to a fair trial and to just administrative action).

  19. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  20. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-10-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  1. The implementation of the situational control concept of information security in automated training systems

    Directory of Open Access Journals (Sweden)

    A. M. Chernih

    2016-01-01

    Full Text Available The main approaches to ensuring security of information in the automated training systems are considered, need of application of situational management of security of information for the automated training systems is proved, the mathematical model and a problem definition of situational control is offered, the technique of situational control of security of information is developed.The purpose of the study. The aim of the study is to base the application of situational control of information security by subsystem of the control and protection of information in automated learning systems and to develop implementation methods of the situational control concept.Materials and methods. It is assumed that the automated learning system is a fragment of a larger information system that contains several information paths, each of them treats different information in the protection degree from information, containing constituting state secrets, to open access information.It is considered that the technical methods, measures and means of information protection in automated learning systems implement less than half (30% functions of subsystems of control and protection information. The main part of the functions of this subsystem are organizational measures to protect information. It is obvious that the task of ensuring the security of information in automated learning systems associated with the adoption of decisions on rational selection and proper combination of technical methods and institutional arrangements. Conditions of practical application of automated learning systems change over time and transform the situation of such a decision, and this leads to the use of situational control methods.When situational control is implementing, task of the protection of information in automated learning system is solved by the subsystem control and protection of information by distributing the processes ensuring the security of information and resources of

  2. On the implementation of a deterministic secure coding protocol using polarization entangled photons

    OpenAIRE

    Ostermeyer, Martin; Walenta, Nino

    2007-01-01

    We demonstrate a prototype-implementation of deterministic information encoding for quantum key distribution (QKD) following the ping-pong coding protocol [K. Bostroem, T. Felbinger, Phys. Rev. Lett. 89 (2002) 187902-1]. Due to the deterministic nature of this protocol the need for post-processing the key is distinctly reduced compared to non-deterministic protocols. In the course of our implementation we analyze the practicability of the protocol and discuss some security aspects of informat...

  3. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  4. THE COURT OF JUSTICE OF THE EUROPEAN UNION AND INTERNATIONAL LEGAL ORDER

    Directory of Open Access Journals (Sweden)

    TETYANA KOMAROVA

    2017-01-01

    Full Text Available The author discusses the relationship between two legal orders: international law and European Union (EU law. The main provisions of this relationship have been established through the precedential practice of the Court of Justice of the European Union – the EU’s main judicial body. This kind of research seems important because of the gap in the theory of international law caused by the immutable dogma of the supremacy of international law. However, modern legal practice demonstrates a certain fragmentation of the international legal order because of the impact of the existence and development of regional supranational legal orders. The EU legal order, with its own special nature (sui generis, is undoubtedly one of the most developed among them. The Court of Justice of the European Union performs a crucial role in the EU legal system concerning application and interpretation of EU law. It provides a uniform interpretation of this law for the purposes of development of supranational integration. In this context the Court of Justice the European Union establishes the status of European law and its relationship with the national legal systems and international law. The Court acts as protector of the EU legal order against the influence of other legal orders. The Court’s precedential practice reveals EU law’s tendency towards its constitutionalization and the development of its autonomy. The latest practice indicates the Court’s powers to review the EU institutions’ acts in relation to the implementation of UN Security Council resolutions. This proves the Court’s ability to establish indirect control even over UN acts.

  5. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide (Arabic Edition)

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to Member States for the development, or improvement of nuclear security systems and measures for the detection of criminal or unauthorized acts with nuclear security implications involving nuclear and other radioactive material out of regulatory control. It describes the elements of an effective nuclear security detection architecture which is composed of an integrated set of nuclear security systems and measures, and is based on an appropriate legal and regulatory framework for the implementation of the national detection strategy. The publication is an implementing guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, legislative bodies, competent authorities, institutions, and individuals involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control

  6. Doing Justice Today: A Welcoming Embrace for LGBT Students in Christian Schools

    Science.gov (United States)

    Joldersma, Clarence W.

    2016-01-01

    The article argues for welcoming LGBT students in Christian schools. The article develops an idea of justice based on Nicholas Wolterstorff's idea of claim-rights of vulnerable groups that have been wronged, and applies this to the security and recognition of LGBT students in Christian schools. The article presents empirical evidence about the…

  7. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Science.gov (United States)

    2010-07-01

    ... requiring a security risk assessment. (a) Citizens and nationals of the United States. A citizen or national... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY...

  8. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    Directory of Open Access Journals (Sweden)

    Li Xiong

    Full Text Available In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  9. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    Science.gov (United States)

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  10. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    severe consequences, depending upon the nature and quantity of the specific material involved, the mode of dispersal (violent or non-violent), the location and the population impacted. Implementing nuclear security systems and measures is, therefore, of paramount importance. This Implementing Guide may be useful to the organizers of major public events. It represents a sound basis, drawn from experience, for raising awareness about nuclear security systems and the measures to be applied for such events

  11. Middle School Science Teachers' Perceptions of Social Justice: A Study of Two Female Teachers

    Science.gov (United States)

    Upadhyay, Bhaskar

    2010-01-01

    The focus of this qualitative study is to document two middle school science teachers' perceptions of social justice and how these teachers implement various aspects of social justice in their science instruction. The two teachers teach science in an urban school that serves students from low-income, immigrant, and ethnic minority families. The…

  12. Working towards Justice, Security Sector Reform and Better ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... on security sector reform, constitutional reform, governance of diversity and critical dialogues in MENA societies. ... Reform will take time and one of the tests for those involved in this process is exercising patience and .... Related articles ...

  13. 75 FR 5491 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... addressing privacy concerns. The fifteen- year retention period will allow CBP to access the data when needed... security, law enforcement and counterterrorism missions, while addressing privacy concerns. Legal or...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs and Border...

  14. Justice and Negotiation.

    Science.gov (United States)

    Druckman, Daniel; Wagner, Lynn M

    2016-01-01

    This review article examines the literature regarding the role played by principles of justice in negotiation. Laboratory experiments and high-stakes negotiations reveal that justice is a complex concept, both in relation to attaining just outcomes and to establishing just processes. We focus on how justice preferences guide the process and outcome of negotiated exchanges. Focusing primarily on the two types of principles that have received the most attention, distributive justice (outcomes of negotiation) and procedural justice (process of negotiation), we introduce the topic by reviewing the most relevant experimental and field or archival research on the roles played by these justice principles in negotiation. A discussion of the methods used in these studies precedes a review organized in terms of a framework that highlights the concept of negotiating stages. We also develop hypotheses based on the existing literature to point the way forward for further research on this topic.

  15. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  16. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  17. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    International Nuclear Information System (INIS)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca; Martin, Anthony; Zbinden, Hugo; Houlmann, Raphael; Lim, Charles Ci Wen

    2016-01-01

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find that DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.

  18. A Phenomenological Study of the Experience of Respondents in Campus-Based Restorative Justice Programs

    Science.gov (United States)

    Meagher, Peter J.

    2009-01-01

    The focus of this dissertation was the use of restorative justice practices in the collegiate setting. Some have expressed concern with the legal nature of campus conduct processes. Restorative practices have been implemented in criminal justice and K-12 settings and are seen by some as an antidote to overly legalistic campus conduct processes.…

  19. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Fadhil Mahmood

    2013-04-01

    Full Text Available     Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.        In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.      This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications

  20. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  1. Advancing an energy justice perspective of fuel poverty: Household vulnerability and domestic retrofit policy in the United Kingdom

    OpenAIRE

    Gillard, Ross; Snell, Carolyn Jane; Bevan, Mark Alistair

    2017-01-01

    The concept of energy justice is increasingly relevant in industrialised countries, where policymakers face significant challenges to establishing affordable, low-carbon and secure energy systems. This emerging field has brought philosophies of ethics and principles of social justice to bear on a range of contemporary energy issues. More inter-disciplinary and applied endeavours are now needed to take this field forward. One such application is to the issue of fuel poverty and the challenge o...

  2. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  3. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  4. Justice seems not to be for all: Exploring the scope of justice

    OpenAIRE

    Lima-Nunes, Aline; Pereira, Cícero Roberto; Correia, Isabel

    2013-01-01

    The idea that “justice is for everyone” seems to be over. A justice perception can have unfair consequences for those who are perceived not to be included within the boundaries of fairness. This is what the scope of justice is all about: who is within and who is outside of the “justice boundaries”. This paper intends to clarify the concept and explain how social psychologists work with it in real-life contexts. We argue that the scope of justice is a key concept that helps us to understand a ...

  5. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  6. Adopting Problem-Based Learning in Criminology and Criminal Justice Education

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2014-06-01

    Full Text Available While problem-based learning (PBL has been successfully used in many disciplines for over 30 years, it has not yet been widely adopted by criminal justice instructors. It is a student-centered curriculum that empowers undergraduate students to decide what they learn and to apply their knowledge and skills while solving real-world problems in relevant and authentic contexts. The present study provides an overview of PBL and empirical evidence for the effectiveness of problem-based instruction in many disciplines. This article offers theoretical foundations for adopting PBL in the study of crime and criminal justice. Finally, for scaffolding instructors striving to implement PBL, this article describes possible formats of implementation and also identifies the challenges new PBL instructors may encounter during application and provides specific recommendations.

  7. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  8. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  9. Justice delayed is justice denied: Protecting Miners against ...

    African Journals Online (AJOL)

    Justice delayed is justice denied: Protecting Miners against Occupational ... of section 35 of Compensation for Occupational Injuries and Diseases Act 130 of ... of the Mankayi case for the system of occupational health and safety in South Africa. ... KEYWORDS: Occupational health; diseases; injuries; employees; protection; ...

  10. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  11. Co-workers' Justice Judgments, own Justice Judgments and Employee Commitment: A multi-foci approach

    Directory of Open Access Journals (Sweden)

    Florence Stinglhamber

    2008-06-01

    Full Text Available Using a sample of 212 employees, we conducted a study to examine whether employees use their co-workers' fairness perceptions to generate their own justice judgments and to develop their subsequent affective commitment. The conceptual framework used to investigate these linkages is social exchange theory combined with a multiple foci approach. Results of the structural equation modeling analyses revealed that co-workers' procedural justice judgments strengthened employee's own procedural justice judgments, which in turn influenced their affective commitment to the organisation. Similarly, co-workers' interactional justice judgments increased employee's own interactional justice judgments, which in turn impacted on their affective commitment to both the supervisor and the organisation. As a whole, findings suggest that coworkers' justice judgments strengthened employee's affective attachments toward the justice sources by reinforcing employee's own justice perceptions.

  12. A Longitudinal Study of the Predictors of Procedural Justice in Australian University Staff

    Directory of Open Access Journals (Sweden)

    Silvia Pignata

    2016-08-01

    Full Text Available Purpose - This study examined the factors that predict employees’ perceptions of procedural justice in university settings. The paper also reviews the ethical aspects of justice and psychological contracts within employment relationships. Design/Methodology/Approach - The study examined the predictors of perceived procedural justice in a two-wave longitudinal sample of 945 employees from 13 universities by applying the Job Demands-Resources theoretical model of stress. The proposed predictors were classified into two categories: job demands of work pressure and work-home conflict; and job resources of job security, autonomy, trust in senior management, and trust in supervisor. The predictor model also examined job satisfaction and affective organizational commitment, demographic (age, gender, tenure, role and individual characteristics (negative affectivity, job involvement as well as Time 1 (T1 perceptions of procedural justice to ensure that tests were rigorous. Findings - A series of hierarchical multiple regression analyses found that job satisfaction at T1 was the strongest predictor of perceived procedural justice at Time 2. Employees' trust in senior management, and their length of tenure also positively predicted justice perceptions. There were also differences between academic and non-academic staff groups, as non-academic employees' level of job satisfaction, trust in senior management and their length of organizational tenure predicted procedural justice perceptions, whereas for academics, only job satisfaction predicted perceived justice. For the all staff category, job satisfaction was a dominant and enduring predictor of justice, and employees' trust in senior management also predicted justice. Research limitations/implications - Results highlight the importance of workplace factors in enhancing fair procedures to encourage reciprocity from employees. As perceived procedural justice is also conceptually linked to the

  13. General Principles of Transnationalised Criminal Justice?
    Exploratory Reflections

    Directory of Open Access Journals (Sweden)

    Marianne L. Wade

    2013-09-01

    Full Text Available This article sets out to explore the premise of general principles in what is labelled transnationalised criminal justice (encompassing the substantive and procedural law as well as the institutions of transnational criminal law and European criminal law. Whilst there can be no denying that these are diverse and divergent areas of law in many ways, their fundamental common denominator of seeking to convict individuals whilst subjecting these to arrest, detention and deprivation of other rights across borders, is taken as a baseline around which certain general principles may gravitate. The current state of executive over-reach within transnationalised criminal justice structures is studied, particularly in relation to the European criminal justice context. This over-reach is explored utilising the theoretical framework of social contract theory. It is suggested that the transfer of investigative and prosecutorial powers to transnationalised contexts undertaken by the relevant executives without seeking to temper this assignment with mechanisms to secure the rights of individuals which counter-balance these, as required by the constitutional traditions of their country, can be regarded as in breach of the social contract. Using this thought experiment, this article provides a framework with which to identify the deficits of transnationalised criminal law.  The way in which such deficits undermine the legitimacy of the institutions created by states to operate the mechanisms of transnationalised criminal justice as well as the fundamental values of their own constitutions is, however, demonstrated as concrete. The latter are identified as mechanisms for deducing the general principles of transnationalised criminal justice (albeit via difficult international negotiation. If the supranationalisation of criminal justice powers is not to be regarded as a tool undermining constitutional values and effectively allowing executives acting in an

  14. Just Security and the Crisis of Global Governance

    NARCIS (Netherlands)

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade

  15. Information Security: USDA Needs to Implement Its Departmentwide Information Security Plan

    National Research Council Canada - National Science Library

    2000-01-01

    USDA has taken positive steps to begin improving its information security by developing its August 1999 Action Plan with recommendations to strengthen department-wide information security and hiring...

  16. Geographies of justice: preschool-childcare provision and the conceptualisation of social justice

    OpenAIRE

    S L Holloway

    1998-01-01

    During the 1990s geographers of diverse philosophical orientations have shown a renewed interest in questions of justice. The author draws on empirical work on childcare provision in Sheffield, England, in order to evaluate two different approaches to the geography of justice and hence the theories of social justice which lie behind these; in particular she explores the different geographies of childcare produced by the territorial-justice approach, which is based on a liberal conception of s...

  17. Jurisprudence by the European Court of Justice in the field of environment protection

    International Nuclear Information System (INIS)

    Lenz, C.O.

    1993-01-01

    The lecture gives a detailed overview of the jurisprudence by the European Court of Justice, especially of the legal and contractual basis of environment protection. It deals with the distribution of responsibilities, jurisprudence on water protection, clean air presevation, and disposal law. From a global viewpoint, the European Court of Justice can only give impulses, the implementation of concrete measures being the task of the politicians. (HSCH) [de

  18. Justice Globalism

    NARCIS (Netherlands)

    Wilson, Erin; Steger, Manfred; Siracusa, Joseph; Battersby, Paul

    2014-01-01

    The pursuit of a global order founded on universal rules extends beyond economics into the normative spheres of law, politics and justice. Justice globalists claim universal principles applicable to all societies irrespective of religion or ideology. This view privileges human rights, democracy and

  19. 21 CFR 1301.71 - Security requirements generally.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Security requirements generally. 1301.71 Section 1301.71 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF..., cooperative buying, etc.); (2) The type and form of controlled substances handled (e.g., bulk liquids or...

  20. Justice at the millennium: a meta-analytic review of 25 years of organizational justice research.

    Science.gov (United States)

    Colquitt, J A; Conlon, D E; Wesson, M J; Porter, C O; Ng, K Y

    2001-06-01

    The field of organizational justice continues to be marked by several important research questions, including the size of relationships among justice dimensions, the relative importance of different justice criteria, and the unique effects of justice dimensions on key outcomes. To address such questions, the authors conducted a meta-analytic review of 183 justice studies. The results suggest that although different justice dimensions are moderately to highly related, they contribute incremental variance explained in fairness perceptions. The results also illustrate the overall and unique relationships among distributive, procedural, interpersonal, and informational justice and several organizational outcomes (e.g., job satisfaction, organizational commitment, evaluation of authority, organizational citizenship behavior, withdrawal, performance). These findings are reviewed in terms of their implications for future research on organizational justice.

  1. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    DEFF Research Database (Denmark)

    Gehring, Tobias; Haendchen, Vitus; Duhme, Joerg

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State......-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our...... with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components....

  2. Implementing healthcare information security: standards can help.

    Science.gov (United States)

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  3. Women, truth, justice and reparation in Colombia

    Directory of Open Access Journals (Sweden)

    María Eugenia Ibarra Melo

    2011-07-01

    Full Text Available This paper account for the main collective actions undertaken by two women networks in Colombia: Women’s Peace Route and the Colombian Women Initiative for Peace, during transition justice process and the implementation of the Justice and Peace Law (2004-2009. From a sociological approach to the political process and the gender category, this paper discusses how gender ideologies inform new ways of mobilization affecting discourses, purposes and repertoires of those claiming identities and defending human rights. The main conclusion here is that the feminist influence in redistribution and acknowledgement claims for victims from the armed conflict have encouraged collective actions that begin to modify their relationship to the State. This is proved by their achievements at Court and social acknowledgement victims have gained as social actors.

  4. Feasibility of energy justice: Exploring national and local efforts for energy development in Nepal

    International Nuclear Information System (INIS)

    Islar, Mine; Brogaard, Sara; Lemberg-Pedersen, Martin

    2017-01-01

    The energy justice framework serves as an important decision-making tool in order to understand how different principles of justice can inform energy systems and policies. The realization of the urgency of providing modern energy technology and services particularly to rural areas has prompted both the Nepalese government and development institutions to focus on community-run renewable energy facilities. It is argued that off-grid and micro-scale energy development offers an alternative path to fossil-fuel use and top-down resource management as they democratize the grid and increase marginalized communities' access to renewable energy, education and health care. However, Nepal's energy development is also heavily influenced by demands from the fast-growing economies of neighboring countries such as China and India. As a result, this article evaluates the Nepalese national energy policies by applying the key aspects of the energy justice framework and showing the feasibility constraints due to geopolitical and biophysical factors to the implementation of energy just policies in this developing country context. The empirical evidence is derived from interviews during a one-month fieldwork in the Lalitpur and Katmandu districts of Nepal, site-visits, discourse analysis of expert statements, government policies and newspaper articles as well literature review on peer-review articles. - Highlights: • Energy justice framework can be used as a decision-making tool. • Energy transitions need to be understood from multiple perspectives. • Justice principles may face geopolitical, biophysical and ethical feasibility constraints. • The implementation of energy justice principles requires attention to the problem of agency.

  5. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  6. Environmental justice: a criminological perspective

    Science.gov (United States)

    Lynch, Michael J.; Stretesky, Paul B.; Long, Michael A.

    2015-08-01

    This article examines studies related to environmental justice in the criminological literature and from a criminological perspective. Criminologists have long been concerned with injustices in the criminal justice system related to the enforcement of criminal law. In the 1990s, following the emergence of green criminology, a handful of criminologists have drawn attention to environmental justice as an extension of more traditional criminological studies of justice and injustice. Relevant criminological studies of environmental justice are reviewed, and suggestions for future environmental justice research are offered.

  7. Justice and medical ethics.

    Science.gov (United States)

    Gillon, R

    1985-07-20

    Justice, in the sense of fair adjudication between conflicting claims, is held to be relevant to a wide range of issues in medical ethics. Several differing concepts of justice are briefly described, including Aristotle's formal principle of justice, libertarian theories, utilitarian theories, Marxist theories, the theory of John Rawls, and the view--held, for example, by W.D. Ross--that justice is essentially a matter of reward for individual merit.

  8. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  9. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  10. The Security Council's Methods of Work: The Borderlines of Legality

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    The first section outlines the Security Council’s rules of procedure (or lack thereof) and working methods. Examples are used to illustrate that the Council's methods of work have, paradoxically, become increasingly opaque at the same time as its direct involvement in international justice has...... escalated. The paper concludes by positing that a lack of procedural fairness in the Council’s methods of work at least undermines the justice imperative that the Council so espouses and at most violates an ancillary legal obligation....

  11. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  12. A study on the barriers of the implementation of social security act in ...

    African Journals Online (AJOL)

    In this study, an analytical review was done on the historical process and contexts of welfare system and social security in order to analyze and evaluate the main features of this act especially in the area of medical services. It was also attempted to study the executive barriers of the appropriate implementation of social ...

  13. Rawls´ legacy: a limited possibility of a non-speciesist environmental justice

    Directory of Open Access Journals (Sweden)

    Sônia T. Felipe

    2005-01-01

    Full Text Available Publishing A Theory of Justice in 1971 John Rawls defined a conceptual realm of justice as that of a well-ordered society in which some principles of justice should be tested before seeking to apply them to distribute primary goods among co-operative representative subjects (considered as equals within the basic structure of society and other subjects, who are not necessarily co-operative, even if they are included in the contract of justice by the representatives through the indirect moral duties theory. Representative subjects were interested in possessing and preserving − for themselves and for their descendants − all kinds of goods: natural, primary, social and public ones. They are interested in maintaining economic and social distinctions obtained by fair work distribution, as well. In explaining his theory of a fair distribution of primary social goods, John Rawls does not include, at least explicitly, the kind of goods I am suggesting in this paper to be called natural environmental goods, the kind of goods which are indispensable to secure, with no exception, the survival of all organisms subjected to basic needs, including human needs. Natural environmental goods seems to have been forgotten by Rawls, or at least considered as not implicated in his model of a fair institutional distribution of primary social goods. Following what Michael S. PRITCHARD, Wade L. ROBISON, Russ MANNING, Brent A. SINGER, Daniel P. THERO and Troy W. HARTLEY have critically pointed in some of their articles, I am going firstly to show the lack of the concept of natural environmental goods in Rawls’ Theory of Justice, and secondly, I suggest considering natural environmental goods as part of a non-speciesist theory of justice. So, I hope to contribute to extend the philosophical legacy of A Theory of Justice, in order to include in our moral consideration needs and interests of all living beings. In other words, I will try to consider the issue of justice

  14. OUTLAWING AMNESTY: THE RETURN OF CRIMINAL JUSTICE IN TRANSITIONAL JUSTICE SCHEMES*

    Directory of Open Access Journals (Sweden)

    Lisa J. Laplante, University of Connecticut-School of Law, Estados Unidos

    2012-11-01

    Full Text Available Abstract: This Article responds to an apparent gap in the scholarly literature which fails to merge the fields of human rights law and international criminal law—a step that would resolve the current debate as to whether any amnesty in transitional justice settings is lawful. More specifically, even though both fields are a subset of transitional justice in general, the discipline of international criminal law still supports the theory of “qualified amnesties” in transitional justice schemes, while international human rights law now stands for the proposition that no amnesty is lawful in those settings. This Article brings attention to this new development through a discussion of the Barrios Altos case. This Article seeks to reveal how an international human rights decision can dramatically impact state practice, thus also contributing to a pending question in international human rights law as to whether such jurisprudence is effective in increasing human rights protections. The Article concludes by looking at the implications of this new legal development in regard to amnesties in order to encourage future research regarding the role of criminal justice in transitional justice schemes. Keywords: Amnesty in the Americas. Transitional Justice. Human Rights Violations

  15. ECONOMIC EQUALITY OR JUSTICE

    Directory of Open Access Journals (Sweden)

    Ekrem Tufan

    2017-12-01

    Full Text Available From the beginning of economic life, equality has been a matter for human. Intrinsically human has two legs: Selfish and Groupish. Our selfish side does not care equality while Groupish side cares. What about the justice? Does human wants justice more than equalities in economic life? In this research, we have applied a questionnaire to find these two questions answer. As a result we can report that respondents prefer equality rather than justice in negative outcomes. On the other hand, they tend to prefer justice if there is possibility for positive outcomes. We cannot give evidence about gender, education and age differences effect on equality and justice preference.

  16. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  17. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  18. Super-Encryption Implementation Using Monoalphabetic Algorithm and XOR Algorithm for Data Security

    Science.gov (United States)

    Rachmawati, Dian; Andri Budiman, Mohammad; Aulia, Indra

    2018-03-01

    The exchange of data that occurs offline and online is very vulnerable to the threat of data theft. In general, cryptography is a science and art to maintain data secrecy. An encryption is a cryptography algorithm in which data is transformed into cipher text, which is something that is unreadable and meaningless so it cannot be read or understood by other parties. In super-encryption, two or more encryption algorithms are combined to make it more secure. In this work, Monoalphabetic algorithm and XOR algorithm are combined to form a super- encryption. Monoalphabetic algorithm works by changing a particular letter into a new letter based on existing keywords while the XOR algorithm works by using logic operation XOR Since Monoalphabetic algorithm is a classical cryptographic algorithm and XOR algorithm is a modern cryptographic algorithm, this scheme is expected to be both easy-to-implement and more secure. The combination of the two algorithms is capable of securing the data and restoring it back to its original form (plaintext), so the data integrity is still ensured.

  19. A Longitudinal Study of the Predictors of Perceived Procedural Justice in Australian University Staff

    Science.gov (United States)

    Pignata, Silvia; Winefield, Anthony H.; Provis, Chris; Boyd, Carolyn M.

    2016-01-01

    Purpose: This study examined the factors that predict employees' perceptions of procedural justice in university settings. The paper also reviews the ethical aspects of justice and psychological contracts within employment relationships. Design/Methodology/Approach: The study examined the predictors of perceived procedural justice in a two-wave longitudinal sample of 945 employees from 13 universities by applying the Job Demands-Resources theoretical model of stress. The proposed predictors were classified into two categories: Job demands of work pressure and work-home conflict; and job resources of job security, autonomy, trust in senior management, and trust in supervisor. The predictor model also examined job satisfaction and affective organizational commitment, demographic (age, gender, tenure, role) and individual characteristics (negative affectivity, job involvement) as well as Time 1 (T1) perceptions of procedural justice to ensure that tests were rigorous. Findings: A series of hierarchical multiple regression analyses found that job satisfaction at T1 was the strongest predictor of perceived procedural justice at Time 2. Employees' trust in senior management, and their length of tenure also positively predicted justice perceptions. There were also differences between academic and non-academic staff groups, as non-academic employees' level of job satisfaction, trust in senior management, and their length of organizational tenure predicted procedural justice perceptions, whereas for academics, only job satisfaction predicted perceived justice. For the “all staff” category, job satisfaction was a dominant and enduring predictor of justice, and employees' trust in senior management also predicted justice. Research limitations/implications: Results highlight the importance of workplace factors in enhancing fair procedures to encourage reciprocity from employees. As perceived procedural justice is also conceptually linked to the psychological contract

  20. Organisational justice and change in justice as predictors of employee health: the Whitehall II study.

    Science.gov (United States)

    Kivimäki, Mika; Ferrie, Jane E; Head, Jenny; Shipley, Martin J; Vahtera, Jussi; Marmot, Michael G

    2004-11-01

    Organisational justice has been proposed as a new way to examine the impact of psychosocial work environment on employee health. This article studied the justice of interpersonal treatment by supervisors (the relational component of organisational justice) as a predictor of health. Prospective cohort study. Phase 1 (1985-88) measured relational justice, job demands, job control, social support at work, effort-reward imbalance, and self rated health. Relational justice was assessed again at phase 2 (1989-90) and self rated health at phase 2 and phase 3 (1991-93). 20 civil service departments originally located in London. 10 308 civil servants (6895 men, 3413 women) aged 35-55. Self rated health. Men exposed to low justice at phase 1 or adverse change in justice between phase 1 and phase 2 were at higher risk of poor health at phase 2 and phase 3. A favourable change in justice was associated with reduced risk. Adjustment for other stress indicators had little effect on results. In women, low justice at phase 1 predicted poor health at phase 2 and phase 3 before but not after adjustment for other stress indicators. Adverse change in justice was associated with worse health prospects irrespective of adjustments. The extent to which people are treated with justice in workplaces seems to predict their health independently of established stressors at work. Evidence on reduced health risk after favourable change in organisational justice implies a promising area for health interventions at workplace.

  1. Organizational Justice

    Science.gov (United States)

    Burns, Travis

    2013-01-01

    Helping principals understand the importance of organizational justice is the first step in enhancing learning outcomes for all learners, regardless of their social class, race, abilities, sex, or gender. In schools, organizational justice may be defined as teachers' perceptions of fairness, respect, and equity that relate to their interactions…

  2. Implementing Information Security Management System as a part of business processes : Where to gain competitive advantage for ISMS?

    OpenAIRE

    Flyktman, Jari

    2016-01-01

    The Idea and background to the study subject lies in the interest in security, leadership and organizational development. The research question was how to provide best practices to fit these all together in harmony. The objective was to help small and medium sized organizations to understand the multifaceted nature of cybersecurity and requirements for successful implementation of information security management system (ISMS). ISMS help companies to form the needed security structures in pra...

  3. Equality in the Framework of Justice

    OpenAIRE

    Aşik, Kübra

    2015-01-01

    This thesis assesses the relation between equality and justice by exploring and identifying the relation between equality and justice in Rawls's theory of justice, Sandel's communitarian account of Justice and Sen's capability approach. And these accounts of justice are evaluated from an egalitarian point of view. The main argument defended in the thesis is that justice requires equality. Accordingly, these three accounts of justice are evaluated by taking their understanding of equality into...

  4. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  5. The Human Rights and Social Justice Scholars Program: a collaborative model for preclinical training in social medicine.

    Science.gov (United States)

    Bakshi, Salina; James, Aisha; Hennelly, Marie Oliva; Karani, Reena; Palermo, Ann-Gel; Jakubowski, Andrea; Ciccariello, Chloe; Atkinson, Holly

    2015-01-01

    Despite the importance of the role social justice takes in medical professionalism, the need to train health professionals to address social determinants of health, and medical trainees' desire to eliminate health disparities, undergraduate medical education offers few opportunities for comprehensive training in social justice. The Human Rights and Social Justice (HRSJ) Scholars Program at the Icahn School of Medicine at Mount Sinai is a preclinical training program in social medicine consisting of 5 components: a didactic course, faculty and student mentorship, research projects in social justice, longitudinal policy and advocacy service projects, and a career seminar series. The aim of this article is to describe the design and implementation of the HRSJ curriculum with a focus on the cornerstone of the HRSJ Scholars Program: longitudinal policy and advocacy service projects implemented in collaboration with partner organizations in East Harlem. Furthermore, we describe the results of a qualitative survey of inaugural participants, now third-year medical students, to understand how their participation in this service-learning component affected their clinical experiences and professional self-perceptions. Ultimately, through the implementation and evaluation of the HRSJ Scholars Program, we demonstrate an innovative model for social justice education; the enduring effect of service-learning experiences on participants' knowledge, skills, and attitudes; and the potential to increase community capacity for improved health through a collaborative educational model. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  6. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  7. The tension between cross-border cooperation in the European Area of Freedom, Security and Justice and the fundamental rights of mentally ill offenders in detention.

    Science.gov (United States)

    Meysman, Michaël

    2016-01-01

    In two recent judgements, the European Court of Human Rights (ECtHR) has given an alarming signal regarding the placement, care and treatment of mentally disordered offenders in Belgium. This article analyses these judgements and the Court's assessment that Belgium faces a structural problem regarding the detention of people with a mental illness in prison. By exploring other recent ECtHR decisions across the EU and combining this with an analysis of international norms and standards, it contends that there is something amiss regarding the post-trial approach towards mentally disordered offenders in an EU-wide context. The potential hazards of this situation, from both an individual and an EU perspective are then presented by analysing the EU Framework Decision on the transfer of prisoners (which aims to facilitate offender rehabilitation) and the EU Court of Justice's interpretation of the relationship between instruments like the Framework Decision that are based on mutual recognition and fundamental rights. Lastly, the EU's initiative for enhancing procedural rights in criminal proceedings through the Roadmap trajectory, and the subsequent Commission Recommendation of 27 November 2013, are scrutinized. Based on this research, the article pinpoints the flaws and vacuums that currently exist for mentally disordered offenders, and the negative outcome this may have on the legitimacy and effectiveness of the European Area of Freedom, Security and Justice. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network

    Science.gov (United States)

    Malasri, Kriangsiri; Wang, Lan

    2009-01-01

    A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility. PMID:22454585

  9. 28 CFR Appendix D to Part 61 - Office of Justice Assistance, Research, and Statistics Procedures Relating to the Implementation...

    Science.gov (United States)

    2010-07-01

    ... Administrator, Law Enforcement Assistance Administration; the Director, Bureau of Justice Statistics; or the... environmental coordinator shall be designated in the Bureau of Justice Statistics, the Law Enforcement.... 1451, et seq.; and other environmental review laws and executive orders. 7. Actions planned by private...

  10. Research uncovers what citizens' think about the security sector in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-07-27

    Jul 27, 2015 ... Here, direct experience with security services leads to more negative opinions, and perceptions of personal and family safety play a critical role in citizens' ... sector and the justice system as perceived by the general public.

  11. Student Perceptions of Social Justice and Social Justice Activities

    Science.gov (United States)

    Torres-Harding, Susan R.; Steele, Cheronda; Schulz, Erica; Taha, Farah; Pico, Chantal

    2014-01-01

    Encouraging students to engage in activities that actively seek to promote social justice is a goal of many educators. This study analyzed college student perceptions around social justice and related activities in a medium-sized, urban university in the United States. Students' open-ended responses to questions assessing their perceptions of…

  12. The Challenges of Transitional Justice in Nigeria: Echoes from the ...

    African Journals Online (AJOL)

    Nonetheless, the victims' petitions were heard, to that effect, neither retributive nor restorative justice was offered to them. As tradition permits, the report will usually be published and implemented immediately. Nigerians waited patiently without recourse. Six months later, the Government of Obasanjo surprisingly annulled ...

  13. Yes we can! The Raffles Dialogue on Human Wellbeing and Security

    Directory of Open Access Journals (Sweden)

    Dr. Tikki Pang

    2015-08-01

    Full Text Available The future of human wellbeing and security depends on our ability to deal with the multiple effects of globalisation and on adoption of a new paradigm and philosophy for living and for health that emphasises people's wellbeing and social justice. Such was the topic of the inaugural Raffles Dialogue on Human Wellbeing and Security held in Singapore on Feb 2–3, 2015. Participants agreed that, to achieve these goals, four conditions must be met. First, equity must be integral to the implementation of technology. Second, there is an urgent need for innovations within our global institutions to make them “fit for purpose” in a rapidly changing world. Third, we must find the right balance between the roles of government and markets so that all those in need can access affordable medicine and health care. Finally, we must realise that we live in a small and interdependent “global village”, where Asian countries need to assume greater leadership of our global village councils. This is the great imperative of our times.

  14. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2013-01-01

    Nuclear terrorism and the illicit trafficking of nuclear and other radioactive material threaten the security of all States. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The possibility that nuclear and other radioactive material may be used for terrorist acts cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material, and to establish capabilities for detection and response to nuclear and other radioactive material out of regulatory control. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This approach recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in nuclear and other radioactive material; national response plans; and contingency measures. Within its nuclear security programme, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking; and to detect and respond to nuclear security events. This is an Implementing Guide on nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control. The objective of the publication is to provide guidance to Member States for the

  15. Building Knowledge of Consumer Participation in Criminal Justice in Australia: A Case Study

    Directory of Open Access Journals (Sweden)

    Sophie De'Ath

    2018-03-01

    Full Text Available This exploratory study investigates the various factors to be considered when developing and implementing consumer participation in community-based criminal justice settings. The study uses the Victorian Association for the Care and Resettlement of Offenders (VACRO, based in Melbourne, Australia, as its case study site as this organisation is in the process of formally introducing consumer participation. The study is informed by previous research in key areas related to criminal justice, focusing on the perspectives of various stakeholders: staff, volunteers, and consumers. A mixed method approach offered a range of opportunities for participants to engage with the research. Thematic analysis identified multi-layered issues need to be considered when implementing consumer participation. Poor individual understanding was noted as a barrier, alongside a limited shared vision of the concept. These were seen to be influenced by practical issues such as high staff turnover and conceptual challenges, notably the existing discourse around offenders. The implications of these findings for further research on consumer participation in the criminal justice setting are explored.

  16. Applying Social Justice Principles through School-Based Restorative Justice

    Science.gov (United States)

    von der Embse, Nathan; von der Embse, Daniel; von der Embse Meghan; Levine, Ian

    2009-01-01

    Social justice has recently received attention within the school psychology community. Yet, social justice is a nebulous term, as opined by Connelly (2009), who cautioned against searching for what is wrong and instead striving for the highest standards and recognizing needs of every unique child. Shriberg and colleagues (2008) have sought to…

  17. Restorative justice for sexual violence: repairing victims, building community, and holding offenders accountable.

    Science.gov (United States)

    Koss, Mary P; Bachar, Karen J; Hopkins, C Quince

    2003-06-01

    Problems in criminal justice system response to date and acquaintance rape, and the nonpenetration sexual offenses are identified: (1) these crimes are often markers of a career of sexual offense, yet they are widely viewed as minor; (2) perpetrators of these crimes are now held accountable in ways that reduce their future threat of sex offending; and (3) current criminal justice response to these crimes disappoints and traumatizes victims and families. In response to these identified problems, we are implementing and evaluating RESTORE, an innovative victim-driven, community-based restorative justice program. Restorative justice views crime as harm for which the person responsible must be held accountable in meaningful ways. RESTORE uses a community conference to involve the victim, offender, and both parties' family and friends in a face-to-face dialogue directed at identifying the harm, and developing a plan for repair, rehabilitation, and reintegration into the community.

  18. On the relationship between justice and forgiveness: are all forms of justice made equal?

    Science.gov (United States)

    Wenzel, Michael; Okimoto, Tyler G

    2014-09-01

    This research investigates whether, following a wrongdoing, the restoration of justice promotes forgiveness. Three studies - one correlational recall study and two experimental scenario studies - provide evidence that while a restored sense of justice is overall positively related to forgiveness, forgiveness is highly dependent on the means of justice restoration being retributive (punitive) versus restorative (consensus-seeking) in nature. The findings showed that, overall, restorative but not retributive responses led to greater forgiveness. Although both retributive and restorative responses appeared to increase forgiveness indirectly through increased feelings of justice, for retributive responses these effects were counteracted by direct effects on forgiveness. Moreover, the experimental evidence showed that, while feelings of justice derived from restorative responses were positively related to forgiveness, feelings of justice derived from retributive responses were not. © 2013 The British Psychological Society.

  19. Transition to a post-carbon society: Linking environmental justice and just transition discourses

    International Nuclear Information System (INIS)

    Evans, Geoff; Phelan, Liam

    2016-01-01

    The Hunter Valley, in New South Wales, Australia, is a globally significant coal mining and exporting region. The Hunter economy's strong basis in fossil fuel production and consumption is challenged by civil society campaigns employing environmental justice discourses. This paper analyses how two civil society campaigns in the Hunter region (‘Stop T4′ and 'Groundswell’) have countered the regional hegemony of fossil fuel interests from an environmental justice perspective. However, the discursive dominance of the 'jobs versus environment’ frame hinders efforts to build solidarity amongst local environmental justice goals on the one hand, and workers and union aspirations for secure, quality jobs on the other. Long-term structural decline of global coal markets adds pressure for economic transition. We argue that campaigns to open up possibilities for transition away from fossil fuel dependency to a post-carbon society can be strengthened by engaging with the 'just transition’ discourses that are typically associated with organised labour. Doing so can create synergy for social change by aligning community and labour movement interests. Inclusive social movement partnerships around this synergy must address structural disadvantage that creates social and economic insecurity if communities are to prevail over the fossil fuel sector's hegemony. - Highlights: • Jobs versus environment. • Environmental justice. • Just transition. • Counter-hegemonic forces.

  20. The implementation of security for microBHT

    CERN Document Server

    Purvis, J

    1997-01-01

    With the construction of LHC and the funding of up to 80% of the new experiments (ATLAS and CMS) to come from outside CERN it is important that budget responsibles have secure and instantaneous access to view their financial data which is managed by CERN. MicroBHT (BHT)is a system specifically designed to cater for these requirements. MicroBHT provides for secure web-based access for Teams (and other budget holders) to view their financial data. The security mechanism for BHT which is detailed in this paper uses the standards adopted by banks and other institutions who use the web with maximum security and confidentialy of for both their data and their customers.

  1. Justice and feelings: Toward a new era in justice research

    NARCIS (Netherlands)

    D. de Cremer (David); K. van den Bos (Kees)

    2007-01-01

    textabstractIn this special issue, the relationship between feelings and justice and its consequences are highlighted. Five articles discuss the role that affect, feelings, and emotions play in justice processes across a variety of social settings. In the present introductory article, the position

  2. How does justice smell? Reflections on space and place, justice and the body

    Directory of Open Access Journals (Sweden)

    Jacob Meiring

    2016-11-01

    Full Text Available Flowing from a joint consultation on Spatial Justice and Reconciliation on 21–22 September 2015, hosted by the Centre for Contextual Ministry and the Ubuntu Research Project of the University of Pretoria, this article reflects on the notions of space and justice from the perspective of a contemporary theological anthropology as ‘embodied sensing’, where the making of meaning is sensed in the body. The argument is put forward that spatial justice is an embodied endeavour and that it cannot be achieved disconnected from the bodies of the persons in the concrete context where justice is strived for and where bodies can flourish. The relation between spatial justice, sense of place, human flourishing and the embodied sensing of meaning is explored.

  3. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  4. Justice on Both Sides: Transforming Education through Restorative Justice

    Science.gov (United States)

    Winn, Maisha T.

    2018-01-01

    Restorative justice represents "a paradigm shift in the way Americans conceptualize and administer punishment," says author Maisha T. Winn, from a focus on crime to a focus on harm, including the needs of both those who were harmed and those who caused it. Her book, "Justice on Both Sides," provides an urgently needed,…

  5. The challenges of multi-layered security governance in Ituri

    DEFF Research Database (Denmark)

    Hoffmann, Kasper; Vlassenroot, Koen

    governance is that the inclusion of local non-state actors in security governance will improve security provision to people because they have more legitimacy. But in reality ‘multi-layered’ security governance is often marked by conflict and competition as much as by collaboration and common solutions......There has been a slow, but growing awareness among external actors that some local non-state security actors should be involved in security governance in conflict-affected situations. Already in 2006, the OECD published a report that called for a ‘multi-layered’ approach to reforming actors...... and institutions that provide security and justice services (Scheye and McLean, 2006). Often these actors consist of local authorities, such as customary chiefs, village elders, or business people working in collaboration with different kinds of self-defense groups. The idea behind ‘multi-layered’ security...

  6. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  7. Electronic Performance Monitoring: An Organizational Justice and Concertive Control Perspective.

    Science.gov (United States)

    Alder, G. Stoney; Tompkins, Phillip K.

    1997-01-01

    Applies theories of organizational justice/concertive control to account for contradictions inherent in electronic monitoring of workers by organizations. Argues that results are usually positive when workers are involved in the design and implementation of monitoring systems, and monitoring is restricted to performance-related activities with…

  8. Governing for Enterprise Security (GES) Implementation Guide

    National Research Council Canada - National Science Library

    Westby, Jody R; Allen, Julia H

    2007-01-01

    .... If an organization's management does not establish and reinforce the business need for effective enterprise security, the organization's desired state of security will not be articulated, achieved, or sustained...

  9. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  10. Restorative justice as social justice for victims of gendered violence: a standpoint feminist perspective.

    Science.gov (United States)

    van Wormer, Katherine

    2009-04-01

    This article provides an overview of restorative justice as a process and examines its relevance to women who have been victimized by physical and sexual abuse. The starting point is the justice system with its roots in adversarial, offender-oriented practices of obtaining justice. The widespread dissatisfaction by battered women and rape victims and their advocates with the current system of mandatory law enforcement opens the door for consideration of alternative forms of dealing with domestic violence. Restorative justice strategies, as argued here, have several major advantages. Like social work, these strategies are solution-based rather than problem-based processes, give voice to marginalized people, and focus on healing and reconciliation. Moreover, restorative justice offers an avenue through which the profession of social work can re-establish its historic role in criminal justice. The four models most relevant to women's victimization are victim-offender conferencing, family group conferencing, healing circles, and community reparations. Each model is examined separately from a feminist standpoint. The discussion is informed by insights from the teachings of standpoint feminist theory and social work values, especially social justice.

  11. „FRAMES OF TRANSITIONAL JUSTICE: SOME APPLICATION IN INTERGENERATIONAL JUSTICE AND RETROACTIVITY”

    Directory of Open Access Journals (Sweden)

    GABRIEL RADU

    2011-04-01

    Full Text Available The article attempts to evaluate the concept of transitional justice in the sphere of public and academical debates, in different social environments during the transition period in the recent history. The approach will include an overflight over some definitions and interpretation of that concept and an assessment of possible applications of this concept in the reparative (corrective theories during the political transition. The evaluation of operational dimension of transitional justice will focus primarily the moral grounds invoked in political and juridical debates, and will pursue some applications of the transitional justice in intergenerational justice realm and at the level of the institution of retroactivity. Also, the assessment will focus the moral core of the motivation of judicial decisions in the space of positive law debates, concerning the constitutional and normative dimension.Examination of particular aspects of the transition has raised particular interest in the public agenda of romanian political change. Reparation issues in dealing with the past had always occupied a privileged role in public debate, in social and political problems. Justification for corrective measures during transition period were presented on various occasions in different points of view, but tools and proper institutions in generating legitimate formal-political obligations were absent, threatening the strength of the the political stability. Requirements for application of a corrective, reparative justice, appeared as a consequence of subjective awareness of rights and liberties that positive law of the communist system ignored or assign them like law infrigement. An approach of such rights, with their features should be evaluated in the context of both totalitarian and democratic state. A dialogue with the past becomes more necesary and will contribute to the success of any public policy designed for any possible reparation in the future

  12. Justice and Feelings: Toward a New Era in Justice Research

    NARCIS (Netherlands)

    Cremer, D. de; Bos, K. van den

    2007-01-01

    In this special issue, the relationship between feelings and justice and its consequences are highlighted. Five articles discuss the role that affect, feelings, and emotions play in justice processes across a variety of social settings. In the present introductory article, the position of past

  13. A Call for Restorative Justice in Higher Education Judicial Affairs

    Science.gov (United States)

    Clark, Karen L.

    2014-01-01

    This paper aims to provide support for post-secondary institutions' exploring and implementing restorative justice in their judicial practices. Although restorative principles have been employed successfully across the globe in criminal proceedings and K-12 education, most colleges and universities have not yet embraced this practice. By exploring…

  14. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  15. Corrective justice and contract law

    OpenAIRE

    Martín Hevia

    2010-01-01

    This article suggests that the central aspects of contract law in various jurisdictions can be explained within the idea of corrective justice. The article is divided into three parts. The first part distinguishes between corrective justice and distributive justice. The second part describes contract law. The third part focuses on actions for breach of contract and within that context reflects upon the idea of corrective justice.

  16. Crippling Sexual Justice

    DEFF Research Database (Denmark)

    Stormhøj, Christel

    2015-01-01

    Exploring homosexuals' citizenship in Denmark from a justice perspective, this article critically interrogates society's supposed gay-friendliness by asking how far it has moved in achieving sexual justice, and inquiring into the gains and pains of the existing modes of achieving this end...... and representation within family law, civil society, and in the labour market. In conclusion, I suggest the possibility of different evaluations of the level of sexual justice reached, a mainly positive, partially negative one. Additionally, I discuss the gains and pains of the existing normalizing politics....

  17. New security measures are proposed for N-plants: Insider Rule package is issued by NRC

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    New rules proposed by the Nuclear Regulatory Commission (NRC) will require background investigations and psychological assessments of new job candidates and continual monitoring of the behavior of all power plant workers with access to sensitive areas. Licensees will have to submit an ''access authorization'' program for approval describing how they will conduct these security activities. The employee checks will go back five years to examine credit, educational, and criminal histories. Implementation of the rules could involve the Edison Electric Institute as an intermediary to funnel criminal checks from the Justice Department and FBI. The NRC is also considering a clarification of areas designated as ''vital'' because current designations may be too strict

  18. Corrective justice and contract law

    Directory of Open Access Journals (Sweden)

    Martín Hevia

    2010-06-01

    Full Text Available This article suggests that the central aspects of contract law in various jurisdictions can be explained within the idea of corrective justice. The article is divided into three parts. The first part distinguishes between corrective justice and distributive justice. The second part describes contract law. The third part focuses on actions for breach of contract and within that context reflects upon the idea of corrective justice.

  19. The Value Of Justice In Child Criminal Justice System A Review Of Indonesian Criminal Law

    Directory of Open Access Journals (Sweden)

    Andi Sofyan

    2015-08-01

    Full Text Available The value of justice in Act No. 11 of 2012 concerns the Child Criminal Justice System Act No. SPPA confirms the Restorative Justice Approach as a method of disputes resolution. The method of research used was normative-legal research with philosophical approach. The results showed that the value of restorative justice through diversion contained in Act SPPA but the diversion limit for certain types of criminal acts and threats of punishment under seven 7 years and not a repetition criminal recidivists. This indicates that Act SPPA still contained a retributive justice not promote the interests of protection for child.

  20. Justice-based social assistance

    Science.gov (United States)

    Barrientos, Armando

    2016-01-01

    What are the main objectives of social protection institutions in developing countries? What should be their scope and reach? What is the source of their legitimacy? Finding appropriate answers to these questions is essential to understanding, and shaping, the emergence of welfare institutions in low- and middle-income countries. Most available answers rely on instrumental arguments. Few make reference to normative principles. This article draws on three concepts from Rawls – social justice as regulating cooperation, the social minimum, and the need for a freestanding political notion of social justice – to develop a coherent argument for grounding social assistance on social justice. In line with this argument, it identifies some parameters for a justice-based social assistance. This article then discusses, with examples, the tensions existing between a social justice-based social minimum and ‘real’ social assistance institutions emerging in developing countries. PMID:27708544

  1. Implementing Security Sector Reform

    Science.gov (United States)

    2008-12-04

    ownership and genuine reform. His experience in Diyala Province indicated that the most effective means of pursuing transition and transformation among...that I have no solution to the security situation in Afghanistan, or to the questions of violence, crime, insurrection, or militias vs . army vs ...than to merge those interests into a greater whole. Franchising of problems or solutions is often the result. In Afghanistan, problems and

  2. Corporate accountability and transitional justice

    Directory of Open Access Journals (Sweden)

    Sabine Michalowski

    2015-10-01

    Full Text Available Traditionally, transitional justice processes do not address the role of corporations in dictatorships or in armed conflicts that give rise to the need for dealing with grave and systematic human rights violations. However, there is a growing awareness that in many contexts corporations contribute to these violations, often in the form of corporate complicity with the principal violators. An argument can therefore be made that to achieve the aims of transitional justice and establish a holistic narrative of the past as well as obtain justice and reparations for victims requires investigating and addressing the role of corporate actors. This article uses the example of Colombia’s Justice and Peace process to show some of the complexities, opportunities and challenges that arise if transitional justice measures focus primarily on criminal law and create a specific legal framework, outside of the ordinary justice systems, only for a limited group of primary perpetrators, in the Colombian case for members of the armed groups who demobilised. It is argued that the exclusion of corporate actors in contexts where their role is regarded as significant leads to victims seeking alternatives ways to obtain justice and that both victims and corporations would benefit if transitional justice mechanisms addressed the role of corporations.

  3. Secure Multiparty AES

    Science.gov (United States)

    Damgård, Ivan; Keller, Marcel

    We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + {{400}over{255}} expected elementary operations in expected 70 + {{20}over{255}} rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive security against at most one corrupted player) in a local network showed that one block can be encrypted in 2 seconds. We also argue that this result could be improved by an optimized implementation.

  4. Setting standards of restorative justice

    Directory of Open Access Journals (Sweden)

    Kostić Miomira

    2007-01-01

    Full Text Available In the article the author deals with the basic theoretical statements and discussions about the practical use of restorative justice. She discusses the questions of introducing and application of restorative justice in order to reach the balance of interests between a victim, society and a delinquent. There is no unique statement about the restorative justice concept, so the authors make this concept by listing certain activities with rispect of standards and principles. Also she emphasizes the values of restorative justice process. A part of the article is dedicated to the standards for restorative justice that are harmonized with the international documents of human rights. .

  5. A hermeneutic of justice. Justice as discernment in Matthew ...

    African Journals Online (AJOL)

    In some important dictionaries for the study of the New Testament, δικαιοσύνη has two meanings: justice in the sense of distributive justice and righteousness as a relational notion. In Matthew, we discover that the word concerns a threefold loyalty: loyalty to the law, loyalty to fellow people, and loyalty to the will of God. In the ...

  6. Doing justice to social justice in South African higher education ...

    African Journals Online (AJOL)

    This paper attempts to develop a conceptualisation of social justice in higher education based on a close reading of the current literature in the field. An important assumption we make is that higher education is a valuable mechanism for social justice. We set the literature against policy documents that detail South African ...

  7. Design, implementation and security of a typical educational laboratory computer network

    Directory of Open Access Journals (Sweden)

    Martin Pokorný

    2013-01-01

    Full Text Available Computer network used for laboratory training and for different types of network and security experiments represents a special environment where hazardous activities take place, which may not affect any production system or network. It is common that students need to have administrator privileges in this case which makes the overall security and maintenance of such a network a difficult task. We present our solution which has proved its usability for more than three years. First of all, four user requirements on the laboratory network are defined (access to educational network devices, to laboratory services, to the Internet, and administrator privileges of the end hosts, and four essential security rules are stipulated (enforceable end host security, controlled network access, level of network access according to the user privilege level, and rules for hazardous experiments, which protect the rest of the laboratory infrastructure as well as the outer university network and the Internet. The main part of the paper is dedicated to a design and implementation of these usability and security rules. We present a physical diagram of a typical laboratory network based on multiple circuits connecting end hosts to different networks, and a layout of rack devices. After that, a topological diagram of the network is described which is based on different VLANs and port-based access control using the IEEE 802.1x/EAP-TLS/RADIUS authentication to achieve defined level of network access. In the second part of the paper, the latest innovation of our network is presented that covers a transition to the system virtualization at the end host devices – inspiration came from a similar solution deployed at the Department of Telecommunications at Brno University of Technology. This improvement enables a greater flexibility in the end hosts maintenance and a simultaneous network access to the educational devices as well as to the Internet. In the end, a vision of a

  8. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  9. The European Union Court of Justice after the Treaty of Lisbon

    Directory of Open Access Journals (Sweden)

    Radivojević Zoran

    2016-01-01

    Full Text Available Created by the Treaty of Paris as a judicial authority which ensures respect for the law when interpreting and applying this treaty, the European Court of Justice has so far been repeatedly reformed. The latest reform of the judicial system of the European Union, put into effect by the Lisbon Treaty, largely relies on solutions contained in the unaccepted Treaty on the Constitution for Europe. Novelties that this treaty brings could be grosso modo divided into several basic categories. First, there are organizational changes related to the different name and composition of the courts, appointment of judges and advocates-general and the formation of specialized courts. The new terminology and organization aims to provide a clear distinction between the Court of Justice of the EU, which is an aggregate term or generic designation for the entire judicial system of the Union, and special judicial bodies that enter into its composition. These are the Court of Justice as the highest authority, the General Court which is actually the renamed Court of First Instance, and specialized courts that replaced the judicial panels. The second category includes changes that expand the jurisdiction of the Court to certain new areas owing to the abolition of the former EU pillar structure and the dissolution of the European Community. On such a basis, an integration of court jurisdiction regarding the first and third pillar ensued, as the Court of Justice was vested with general and compulsory jurisdiction over the entire law created in the newly established area of freedom, security and justice. The exception is the area of common foreign and security policy, in which the Court's jurisdiction still remains excluded. The third type of amendment extends the scope of judicial reviews of the validity of acts adopted by EU institutions and enables authorized subjects an easier access to the Court. Their aim is to strengthen the rule of law within the legal system of

  10. Restorative Justice as Social Justice for Victims of Gendered Violence: A Standpoint Feminist Perspective

    Science.gov (United States)

    van Wormer, Katherine

    2009-01-01

    This article provides an overview of restorative justice as a process and examines its relevance to women who have been victimized by physical and sexual abuse. The starting point is the justice system with its roots in adversarial, offender-oriented practices of obtaining justice. The widespread dissatisfaction by battered women and rape victims…

  11. Tailoring ISO/IEC 27001 for SMEs: A Guide to Implement an Information Security Management System in Small Settings

    Science.gov (United States)

    Valdevit, Thierry; Mayer, Nicolas; Barafort, Béatrix

    While Information Security Management Systems (ISMS) are being adopted by the biggest IT companies, it remains quite difficult for smaller entities to implement and maintain all the requirements of ISO/IEC 27001. In order to increase information security in Luxembourg, the Public Research Centre Henri Tudor has been charged by the Luxembourg Ministry of Economy and Foreign Trade to find solutions to facilitate ISMS deployment for SMEs. After an initial experiment aiming at assisting a SME in getting the first national ISO/IEC 27001 certification for a private company, an implementation guide for deploying an ISMS, validated by local experts and experimented in SMEs, has been released and is presented in this paper.

  12. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  13. PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance

    CERN Document Server

    Chuvakin, Anton

    2010-01-01

    Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant?. Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the curre

  14. Pushing the frontiers of equity as a means for environmental justice ...

    African Journals Online (AJOL)

    Whilst the usage of this principle to achieve environmental justice in other jurisdictions has been popularized, the reason for poor implementation of the principle in an African context is exacerbated by the placement of same constitutional environmental provision. The South African jurisdiction exemplifies a means to ...

  15. Secure software development training course

    Directory of Open Access Journals (Sweden)

    Victor S. Gorbatov

    2017-06-01

    Full Text Available Information security is one of the most important criteria for the quality of developed software. To obtain a sufficient level of application security companies implement security process into software development life cycle. At this stage software companies encounter with deficit employees who able to solve problems of software design, implementation and application security. This article provides a description of the secure software development training course. Training course of application security is designed for co-education students of different IT-specializations.

  16. Risk Communication and Climate Justice Planning: A Case of Michigan’s Huron River Watershed

    Directory of Open Access Journals (Sweden)

    Chingwen Cheng

    2017-10-01

    Full Text Available Communicating climate risks is crucial when engaging the public to support climate action planning and addressing climate justice. How does evidence-based communication influence local residents’ risk perception and potential behavior change in support of climate planning? Built upon our previous study of Climate Justice maps illustrating high scores of both social and ecological vulnerability in Michigan’s Huron River watershed, USA, a quasi-experiment was conducted to examine the effects of Climate Justice mapping intervention on residents’ perceptions and preparedness for climate change associated hazards in Michigan. Two groups were compared: residents in Climate Justice areas with high social and ecological vulnerability scores in the watershed (n=76 and residents in comparison areas in Michigan (n=69. Measurements for risk perception include perceived exposure, sensitivity, and adaptability to hazards. Results indicate that risk information has a significant effect on perceived sensitivity and level of preparedness for future climate extremes among participants living in Climate Justice areas. Findings highlight the value of integrating scientific risk assessment information in risk communication to align calculated and perceived risks. This study suggests effective risk communication can influence local support of climate action plans and implementation of strategies that address climate justice and achieve social sustainability in local communities.

  17. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-08-01

    The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.

  18. The Non-Proliferation Treaty increases security

    International Nuclear Information System (INIS)

    Kahiluoto, K.

    1995-01-01

    Extension of the Nuclear Non-Proliferation Treaty indefinitely was a historic decision. The Treaty is the most extensive international agreement on security policy to date; now its obligations have become a permanent part of international justice. Moreover, the NPT represents a political and moral obligation. Through the NPT, the international community has made a permanent commitment to restrict the proliferation of nuclear weapons. Increasing pressures will be applied to the few countries still outside the NPT, making it more likely that these countries will eventually change their views. The likelihood of regional bans on nuclear weapons in the Middle East and in Asia, too, will increase. The Treaty promotes the establishment of new nuclear-free zones. The nuclear-free zone in Latin America - the countries covered by the Tlatelolco Treaty - is already very close to its full implementation. Finland is firmly committed to the obligations of the Non-Proliferation Treaty. The NPT Conference of 1995 was among the first international meetings in which Finland participated, and took an active role, as a Member State of the European Union. (orig.)

  19. Empowering Energy Justice

    Science.gov (United States)

    Finley-Brook, Mary; Holloman, Erica L.

    2016-01-01

    The U.S. is experiencing unprecedented movement away from coal and, to a lesser degree, oil. Burdened low-income communities and people of color could experience health benefits from reductions in air and water pollution, yet these same groups could suffer harm if transitions lack broad public input or if policies prioritize elite or corporate interests. This paper highlights how U.S. energy transitions build from, and contribute to, environmental injustices. Energy justice requires not only ending disproportionate harm, it also entails involvement in the design of solutions and fair distribution of benefits, such as green jobs and clean air. To what extent does the confluence of state, civic, and market processes assure “just” transitions to clean, low-carbon energy production involving equitable distribution of costs, benefits, and decision-making power? To explore this question we assess trends with (1) fossil fuel divestment; (2) carbon taxes and social cost of carbon measurements; (3) cap-and-trade; (4) renewable energy; and (5) energy efficiency. Current research demonstrates opportunities and pitfalls in each area with mixed or partial energy justice consequences, leading to our call for greater attention to the specifics of distributive justice, procedural justice, and recognition justice in research, policy, and action. Illustrative energy transition case studies suggest the feasibility and benefit of empowering approaches, but also indicate there can be conflict between “green” and “just”, as evident though stark inequities in clean energy initiatives. To identify positive pathways forward, we compile priorities for an energy justice research agenda based on interactive and participatory practices aligning advocacy, activism, and academics. PMID:27657101

  20. Empowering Energy Justice

    Directory of Open Access Journals (Sweden)

    Mary Finley-Brook

    2016-09-01

    Full Text Available The U.S. is experiencing unprecedented movement away from coal and, to a lesser degree, oil. Burdened low-income communities and people of color could experience health benefits from reductions in air and water pollution, yet these same groups could suffer harm if transitions lack broad public input or if policies prioritize elite or corporate interests. This paper highlights how U.S. energy transitions build from, and contribute to, environmental injustices. Energy justice requires not only ending disproportionate harm, it also entails involvement in the design of solutions and fair distribution of benefits, such as green jobs and clean air. To what extent does the confluence of state, civic, and market processes assure “just” transitions to clean, low-carbon energy production involving equitable distribution of costs, benefits, and decision-making power? To explore this question we assess trends with (1 fossil fuel divestment; (2 carbon taxes and social cost of carbon measurements; (3 cap-and-trade; (4 renewable energy; and (5 energy efficiency. Current research demonstrates opportunities and pitfalls in each area with mixed or partial energy justice consequences, leading to our call for greater attention to the specifics of distributive justice, procedural justice, and recognition justice in research, policy, and action. Illustrative energy transition case studies suggest the feasibility and benefit of empowering approaches, but also indicate there can be conflict between “green” and “just”, as evident though stark inequities in clean energy initiatives. To identify positive pathways forward, we compile priorities for an energy justice research agenda based on interactive and participatory practices aligning advocacy, activism, and academics.

  1. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  2. Organizational Justice Perception According to Generations

    Directory of Open Access Journals (Sweden)

    Zeki YÜKSEKBİLGİLİ

    2015-12-01

    Full Text Available Although there are many different researches on the subject of organizational justice, there is no research on organizational justice perception according to generations. In this study, the research subject is defined if there is a difference on the perception of organizational justice between x and y generations. After a conduct of 430 surveys the Organizational Justice Scale is used. As a result, it is proved that there is no significant difference between the organizational justice perceptions according to generations

  3. Social Justice as a Lens for Understanding Workplace Mistreatment.

    Science.gov (United States)

    Moffa, Christine; Longo, Joy

    2016-01-01

    Workplace mistreatment can be viewed as a social injustice that prohibits one from achieving optimal well-being. Cognitive and interpersonal skills required of nurses can be impacted by workplace mistreatment, thus extending injustices by violating the rights of patients to optimal care. The purpose of this article is to view workplace mistreatment through the lens of Powers and Faden's theory of social justice. Workplace mistreatment is explored through the 6 dimensions of well-being, including health, personal security, reasoning, respect, attachment, and self-determination, identified in the theory. The implications for practice and policy are discussed and recommendations for research made.

  4. Trying to restore justice: bureaucracies, risk management, and disciplinary boundaries in New Zealand criminal justice.

    Science.gov (United States)

    Fox, Kathryn J

    2015-05-01

    New Zealand is well known for its restorative justice conferences in the youth justice system. However, restorative justice has yet to overwhelm the adult criminal justice system. Based on interviews in New Zealand with correctional staff, restorative justice providers, and others, this article explores the reason for the modest inroads that restorative practice has made, and suggests that the general context may explain the limits of restorative justice in other places. The article argues that bureaucratic silos make it challenging to determine if restorative practice might fit within a rehabilitation or reintegration framework. In addition, because of the dominance of psychological modes for assessing and treating criminal behavior, an overarching preoccupation with risk management orients correctional practice toward treatment. Moreover, restorative justice's affiliation with victims' perspectives has made its placement within offender reintegration difficult to imagine. Finally, the penal populism that frames correctional practice in New Zealand, and other Anglophone countries, makes alternative to punishment harder to sell. However, the current liminal state of correctional practice creates an opportunity to conceive of more humanistic ways of repairing the harm caused by crime. © The Author(s) 2013.

  5. Juvenile Justice

    OpenAIRE

    International Child Development Centre

    1998-01-01

    The third Innocenti Digest deals with the main issues connected with children and young people coming into conflict with the law and contact with the justice system. It looks at standards and problems from arrest through to the court hearing and sentencing, use of custodial measures and ways of avoiding the child’s unnecessary and counter-productive involvement with the formal justice system. It also covers prevention questions. Like previous publications in the series, it contains practical ...

  6. Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

    Directory of Open Access Journals (Sweden)

    Khaing Mar Htwe

    2015-07-01

    Full Text Available Abstract The main goal of this system is to design a locker security system using RFID and Fingerprint. In this system only authenticated person can open the door. A security system is implemented containing door locking system using passive type of RFID which can activate authenticate and validate the user and unlock the door in real time for secure access. The advantage of using passive RFID is that it functions without a battery and passive tags are lighter and are less expensive than the active tags. This system consists of fingerprint reader microcontroller RFID reader and PC. The RFID reader reads the id number from passive. The fingerprint sensor will check incoming image with enrolled data and it will send confirming signal for C program. If both RFID check and fingerprint image confirmation are matched the microcontroller will drive door motor according to sensors at door edges. This system is more secure than other systems because two codes protection method used.

  7. The Port Security Grant Program: Good Enough, or Can it be Made Better

    Science.gov (United States)

    2016-06-01

    Statement of William O. Jenkins , Jr., Director Homeland Security and Justice, GAO 12-526T (Washington, DC, 2012) 4- 11, http://www.gao.gov/assets/590...127 de Rugy, “What Does Homeland Security Spending Buy?,” 13. 128 Yacov Haimes, Joost Santos, Kenneth Crowther, Matthew Henry ...Preparedness Grants and Assessing National Capabilities: Continuing Challenges Impede FEMA’s Progress, Statement of William O. Jenkins , Jr

  8. Using Goal Achievement Training in juvenile justice settings to improve substance use services for youth on community supervision.

    Science.gov (United States)

    Fisher, Jacqueline Horan; Becan, Jennifer E; Harris, Philip W; Nager, Alexis; Baird-Thomas, Connie; Hogue, Aaron; Bartkowski, John P; Wiley, Tisha

    2018-04-30

    The link between substance use and involvement in the juvenile justice system has been well established. Justice-involved youth tend to have higher rates of drug use than their non-offending peers. At the same time, continued use can contribute to an elevated risk of recidivism, which leads to further, and oftentimes more serious, involvement with the juvenile justice system. Because of these high rates of use, the juvenile justice system is well positioned to help identify youth with substance use problems and connect them to treatment. However, research has found that only about 60% of juvenile probation agencies screen all youth for substance involvement, and even fewer provide comprehensive assessment or help youth enroll in substance use treatment. This paper describes an integrated training curriculum that was developed to help juvenile justice agencies improve their continuum of care for youth probationers with substance use problems. Goal Achievement Training (GAT) provides a platform for continuous quality improvement via two sessions delivered onsite to small groups of staff from juvenile justice and behavioral health agencies. In the first session, participants are taught to identify goals and goal steps for addressing identified areas of unmet need (i.e., screening, assessment, and linkage to treatment services). In the second session, participants learn principles and strategies of data-driven decision-making for achieving these goals. This paper highlights GAT as a model for the effective implementation of cost-efficient training strategies designed to increase self-directed quality improvement activities that can be applied to any performance domain within juvenile justice settings. Efforts to monitor implementation fidelity of GAT within the specific context of the juvenile justice settings are highlighted. Challenges to setting the stage for process improvement generally, as well as specific hurdles within juvenile justice settings are discussed

  9. Performance-based Reward Administration Enhancing Employees’ Feelings of Interactional Justice

    Directory of Open Access Journals (Sweden)

    Azman Ismail

    2017-04-01

    Full Text Available The transformation in international business landscape has changed organizational management especially reward administration. This is done in order to maintain the organization’s competitiveness in global market place. In the field of reward administration, an emerging trend can be observed whereby most organizations are moving toward the application of psychological elements in administering organizational reward system. The ultimate objective of this study is to investigate the association between performance-based reward administration and interactional justice. The proposed model was empirically tested using a sample of 113 employees from fire and rescue agency in Peninsular Malaysia. This study found an evidence that performance-based reward administration (i.e., communication, participation and performance appraisal is positively and significantly associated with interactional justice. This findings proves that the ability of administrators to appropriately implement communication openness, inspire participative decision-making and organize fairness performance appraisal in administering performance-based reward have significantly evoked the feeling of interactional justice when employees perceived that they are being fairly treated in the reward system.

  10. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... the verification and implementation of the system. The translation is semi-automatic because the developer has the option of choosing which implementation to use in order to achieve the specified security requirements. The implementation options are given by plugins defined in the framework. The framework......’s flexibility allows for the addition of constructs that model new security properties as well as new plugins that implement the security properties. In order to provide higher security assurances, the system specification can be verified by formal methods tools such as the Beliefs and Knowledge (BAK) tool...

  11. Commentary: the importance of Medicaid expansion for criminal justice populations in the south.

    Science.gov (United States)

    Zaller, Nickolas D; Cloud, David H; Brinkley-Rubinstein, Lauren; Martino, Sarah; Bouvier, Benjamin; Brockmann, Brad

    2017-12-01

    Though the full implications of a Trump presidency for ongoing health care and criminal justice reform efforts remain uncertain, whatever policy changes are made will be particularly salient for the South, which experiences the highest incarceration rates, highest uninsured rates, and worst health outcomes in the United States. The passage of the Affordable Care Act (ACA) in 2010 was a watershed event and many states have taken advantage of opportunities created by the ACA to expand healthcare coverage to their poorest residents, and to develop partnerships between health and justice systems. Yet to date, only four have taken advantage of the benefits of healthcare reform. Expanding Medicaid would provide Southern states with the opportunity to significantly impact health outcomes for criminal justice-involved individuals. In the context of an uncertain policy landscape, we suggest the use of three strategies, focusing on advancing incremental change while safeguarding existing gains, rebranding Medicaid as a local or statewide initiative, and linking Medicaid expansion to criminal justice reform, in order to implement Medicaid expansion across the South.

  12. Criminal Justice System of Children in The Law Number 11 of 2012 (Restorative Justice

    Directory of Open Access Journals (Sweden)

    Ansori Ansori

    2014-01-01

    Full Text Available The future of the children will determine the future of the nation. The increasing problem of juvenile delinquency in this globalization and information technology era, requires the state to give more attention to the child's future. Application of the criminal justice system for children in Indonesia is as stipulated in Law Number 3 of 1997 potentially detrimental to the child's interests. In practice, the judicial system had many problems, among them is a violation of the rights of children, such as: physical and psychological violence, as well as deprivation of the right to education and welfare. It happened because the juvenile justice system is against to national and international regulations on the protection of children’s rights. Besides that, theory of punishment for the juvenile delinquency still refers to the concept of retribution for the crimes. This concept is not very useful for the development of the child, so the concept need to be repaired with the concept of restorative justice. With this concept, the criminal justice system for the juvenile delinquency, leads to the restoration of the state and the settlement pattern, involving the perpetrator, the victim, their families and engage with the community. This is done with consideration for the protection of children against the law. Whereas in line with this spirit of the restorative justice, it gives birth to the Law No. 11 of 2012 on The Criminal Justice System of Children. How To Cite: Ansori, A. (2014. Criminal Justice System of Children in The Law Number 11 of 2012 (Restorative Justice. Rechtsidee, 1(1, 11-26. doi:http://dx.doi.org/10.21070/jihr.v1i1.95

  13. Security Sector Reform, Local Ownership and Community Engagement

    Directory of Open Access Journals (Sweden)

    Eleanor Gordon

    2014-07-01

    Full Text Available Local ownership is widely considered to be one of the core principles of successful Security Sector Reform (SSR programmes. Nonetheless, there remains a gap between policy and practice. This article examines reasons for this gap, including concerns regarding limited capacity and lack of expertise, time and cost constraints, the allure of quantifiable results and quick wins, and the need to ensure that other principles inherent to SSR are not disregarded. In analysing what is meant by local ownership, this article will also argue that, in practice, the concept is narrowly interpreted both in terms of how SSR programmes are controlled and the extent to which those at the level of the community are actively engaged. This is despite policy guidance underscoring the importance of SSR programmes being inclusive and local ownership being meaningful. It will be argued that without ensuring meaningful and inclusive local ownership of SSR programmes, state security and justice sector institutions will not be accountable or responsive to the needs of the people and will, therefore, lack public trust and confidence. The relationship between the state and its people will be weak and people will feel divorced from the decisions that affect their security and their futures. All this will leave the state prone to further outbreaks of conflict. This article will suggest that the requisite public confidence and trust in state security and justice sector institutions, and ultimately, the state itself, could be promoted by SSR programmes incorporating community safety structures.

  14. Psychology and criminal justice

    OpenAIRE

    Adler, Joanna R.

    2013-01-01

    This chapter is designed to give the reader a flavour of a few areas in which psychology has been applied to criminal justice. It begins by providing some historical context and showing the development of some applications of psychology to criminal justice. The chapter is broadly split into 3 sections: Pre Trial; Trial; and Post Trial. In most of this chapter, the areas considered assess how psychology has had an influence on the law and how psychologists work within criminal justice settings...

  15. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  16. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  17. Understanding Education for Social Justice

    Science.gov (United States)

    Hytten, Kathy; Bettez, Silvia C.

    2011-01-01

    It has become increasingly common for education scholars to claim a social justice orientation in their work. At the same time, education programs seem to be adding statements about the importance of social justice to their mission, and a growing number of teacher education programs are fundamentally oriented around a vision of social justice.…

  18. Tradeable CO{sub 2} emission permits: initial distribution as a justice problem

    Energy Technology Data Exchange (ETDEWEB)

    Kverndokk, S. [Stiftelsen for Samfunns- og Naeringslivsforskning, Oslo (Norway)

    1992-11-01

    Tradeable emission permits are one of the most discussed policy instruments to implement international agreements on CO{sub 2} emission reductions. One characteristic of this instrument is that it separates the questions of efficiency and justice; in an idealised world, efficiency is achieved no matter how the permits are distributed. By assuming separability of inter- and intragenerational justice, the author can discuss the initial distribution of permits as an intragenerational distributive justice problem. In contrast to efficiency, where Pareto Optimality is an overall accepted principle, there is no consensus on a ``best`` equity principle. Different principles lead to different rules for distribution. The framework is to consider what the author believe to be metaprinciples of theories of justice; ethical individualism and presentism, as well as a generally accepted principle of avoiding morally arbitrary components as standards for distribution. Using these principles in an exclusionary way, working with a list of alternative allocation rules, a distribution proportional to population is recommended. Arguments against this rule are discussed, and special attention is paid to political feasibility. Justice and political feasibility may contrast, so also in this case. Even if a distribution based only on population may be politically unacceptable, there may be prospects to use this criterion in combination with other rules, as well as to put more weight on it in the future. 26 refs.

  19. Tradeable CO[sub 2] emission permits: initial distribution as a justice problem

    Energy Technology Data Exchange (ETDEWEB)

    Kverndokk, S. (Stiftelsen for Samfunns- og Naeringslivsforskning, Oslo (Norway))

    1992-11-01

    Tradeable emission permits are one of the most discussed policy instruments to implement international agreements on CO[sub 2] emission reductions. One characteristic of this instrument is that it separates the questions of efficiency and justice; in an idealised world, efficiency is achieved no matter how the permits are distributed. By assuming separability of inter- and intragenerational justice, the author can discuss the initial distribution of permits as an intragenerational distributive justice problem. In contrast to efficiency, where Pareto Optimality is an overall accepted principle, there is no consensus on a ''best'' equity principle. Different principles lead to different rules for distribution. The framework is to consider what the author believe to be metaprinciples of theories of justice; ethical individualism and presentism, as well as a generally accepted principle of avoiding morally arbitrary components as standards for distribution. Using these principles in an exclusionary way, working with a list of alternative allocation rules, a distribution proportional to population is recommended. Arguments against this rule are discussed, and special attention is paid to political feasibility. Justice and political feasibility may contrast, so also in this case. Even if a distribution based only on population may be politically unacceptable, there may be prospects to use this criterion in combination with other rules, as well as to put more weight on it in the future. 26 refs.

  20. Anciens et Modernes ? Idéal de justice et révolution constitutionnelle en Iran (1905-1911 The Ancients and the Moderns? The Ideal of Justice and Constitutional Revolution in Iran (1905-1911

    Directory of Open Access Journals (Sweden)

    Soudabeh Marin

    2009-04-01

    Full Text Available Durant la période de la Révolution constitutionnelle en Perse (1905-1911 divers acteurs politiques et sociaux prônent dans leurs discours et leurs publications des conceptions différentes et variées de la justice, une justice conçue à la fois en tant qu’idéal mais également en tant qu’institution. À travers deux exemples, nous tentons ici d’illustrer ces diverses approches qui expriment pour les unes une vision islamique du droit et du pouvoir et pour les autres une vision laïque et occidentale de l’État et du système judiciaire.During the Persian Constitutional Revolution of 1905-1911, different conceptions and discourses on the notion of justice developed and revealed the political positions of their authors, notably towards Europe. Justice was apprehended as an ideal, religious or secular, that had to be implemented in Iran notably through specific institutions and a rationally organized judiciary system. We will examine here two different points of view, religious and secular, which express the diversity of opinions that characterized this period regarding this important topic of justice.

  1. Teaching and Learning Health Justice: Best Practices and Recommendations for Innovation

    Science.gov (United States)

    Rentmeester, Christy A.; Chapple, Helen S.; Haddad, Amy M.; Stone, John R.

    2016-01-01

    We describe the development and implementation of an online graduate bioethics program that weaves a theme of health justice throughout the curriculum. Our account relies on a constructionist model of curriculum development and adult teaching and learning theory. Our curriculum draws upon core values of Jesuit higher education, including content…

  2. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Science.gov (United States)

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  3. Applying a Social Justice Lens to Youth Mentoring: A Review of the Literature and Recommendations for Practice.

    Science.gov (United States)

    Albright, Jamie N; Hurd, Noelle M; Hussain, Saida B

    2017-06-01

    Youth mentoring interventions are often designed with the intention of promoting improved outcomes among marginalized youth. Despite their promise to reduce inequality through the provision of novel opportunities and increased social capital to marginalized youth, youth mentoring interventions hold the potential to reproduce rather than reduce inequality. In the current review, we explore literature on youth mentoring that has incorporated a social justice lens. We conclude that there is a need for greater attention to principles of social justice in the design, implementation, and evaluation of youth mentoring interventions. After reviewing the literature, we make recommendations for research and practice based on a social justice perspective and explore alternatives to traditional youth mentoring that may allow for better alignment with social justice principles. © Society for Community Research and Action 2017.

  4. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  5. Engineering justice transforming engineering education and practice

    CERN Document Server

    Leydens, Jon A

    2018-01-01

    Using social justice as a catalyst for curricular transformation, Engineering Justice presents an examination of how politics, culture, and other social issues are inherent in the practice of engineering. It aims to align engineering curricula with socially just outcomes, increase enrollment among underrepresented groups, and lessen lingering gender, class, and ethnicity gaps by showing how the power of engineering knowledge can be explicitly harnessed to serve the underserved and address social inequalities. This book is meant to transform the way educators think about engineering curricula through creating or transforming existing courses to attract, retain, and motivate engineering students to become professionals who enact engineering for social justice. Engineering Justice offers thought-provoking chapters on: why social justice is inherent yet often invisible in engineering education and practice; engineering design for social justice; social justice in the engineering sciences; social justice in human...

  6. Impact of Implementing VPN to Secure Wireless LAN

    OpenAIRE

    H. Bourdoucen; A. Al Naamany; A. Al Kalbani

    2009-01-01

    Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards based technologies that can be delivered by Virtual Private Networking (VPN) bein...

  7. Implementation of a security system in the radiotherapy process; Implantacion de un sistema de seguridad en el proceso radioterapico

    Energy Technology Data Exchange (ETDEWEB)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-07-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  8. 77 FR 61275 - Privacy Act of 1974: Implementation

    Science.gov (United States)

    2012-10-09

    ... (FBI) Privacy Act system of records titled FBI Data Warehouse System, JUSTICE/FBI- 022. This system is...)(G), (H), and (I), (5), and (8); (f); and (g) of the Privacy Act: (1) FBI Data Warehouse System... security; disclose information that would constitute an unwarranted invasion of another's personal privacy...

  9. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark

  10. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2004-11-04

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark.

  11. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  12. Innovation in Justice and Security by Treaty of Lisbon

    Directory of Open Access Journals (Sweden)

    Myzafer ELEZI

    2013-11-01

    Full Text Available The Lisbon Treaty is a legal package which includes previous treaties, starting from the year 1957, following the Treaty of Rome and the Treaty of Nice in 2001, summarized in a single text that introduces a number of changes of the way how the European Union works, in order to make it more efficient for its citizens. This Treaty converts the European Union for the first time in a single entity, unifying pillars of its activities which are as follows: the European Communities, Common Foreign and Security Policy, and Judicial Cooperation in Criminal Matters, which so far only the European Communities had the status of judicial person. It modifies the Treaty of European Union, created by the European Union and the Treaty created by the European Community, which is in power, but do not replace them. The new Treaty gives the EU the legal framework, and necessary tools to face the future challenges and to respond to its citizen’s perspectives. The Conference will introduce all the innovations that the Treaty of Lisbon brings not only in the field of security and foreign policy of the EU, but also in those related to police and judicial cooperation regarding criminal matters.

  13. 32 CFR 152.5 - Implementation.

    Science.gov (United States)

    2010-07-01

    ... JUSTICE REVIEW OF THE MANUAL FOR COURTS-MARTIAL § 152.5 Implementation. The foregoing policies and... enforceable at law by any party against the United States, its agencies, its officers, or any person. ...

  14. Social justice in pandemic preparedness.

    Science.gov (United States)

    DeBruin, Debra; Liaschenko, Joan; Marshall, Mary Faith

    2012-04-01

    Pandemic influenza planning in the United States violates the demands of social justice in 2 fundamental respects: it embraces the neutrality of procedural justice at the expense of more substantive concern with health disparities, thus perpetuating a predictable and preventable social injustice, and it fails to move beyond lament to practical planning for alleviating barriers to accessing care. A pragmatic social justice approach, addressing both health disparities and access barriers, should inform pandemic preparedness. Achieving social justice goals in pandemic response is challenging, but strategies are available to overcome the obstacles. The public engagement process of one state's pandemic ethics project influenced the development of these strategies.

  15. Social justice in medical education: strengths and challenges of a student-driven social justice curriculum.

    Science.gov (United States)

    Ambrose, Adrian Jacques H; Andaya, January M; Yamada, Seiji; Maskarinec, Gregory G

    2014-08-01

    In the current rapidly evolving healthcare environment of the United States, social justice programs in pre-medical and medical education are needed to cultivate socially conscious and health professionals inclined to interdisciplinary collaborations. To address ongoing healthcare inequalities, medical education must help medical students to become physicians skilled not only in the biomedical management of diseases, but also in identifying and addressing social and structural determinants of the patients' daily lives. Using a longitudinal Problem-Based Learning (PBL) methodology, the medical students and faculty advisers at the University of Hawai'i John A. Burns School of Medicine (JABSOM) developed the Social Justice Curriculum Program (SJCP) to supplement the biomedical curriculum. The SJCP consists of three components: (1) active self-directed learning and didactics, (2) implementation and action, and (3) self-reflection and personal growth. The purpose of introducing a student-driven SJ curriculum is to expose the students to various components of SJ in health and medicine, and maximize engagement by using their own inputs for content and design. It is our hope that the SJCP will serve as a logistic and research-oriented model for future student-driven SJ programs that respond to global health inequalities by cultivating skills and interest in leadership and community service.

  16. Social Justice in Medical Education: Strengths and Challenges of a Student-Driven Social Justice Curriculum

    Science.gov (United States)

    Andaya, January M; Yamada, Seiji; Maskarinec, Gregory G

    2014-01-01

    In the current rapidly evolving healthcare environment of the United States, social justice programs in pre-medical and medical education are needed to cultivate socially conscious and health professionals inclined to interdisciplinary collaborations. To address ongoing healthcare inequalities, medical education must help medical students to become physicians skilled not only in the biomedical management of diseases, but also in identifying and addressing social and structural determinants of the patients' daily lives. Using a longitudinal Problem-Based Learning (PBL) methodology, the medical students and faculty advisers at the University of Hawai‘i John A. Burns School of Medicine (JABSOM) developed the Social Justice Curriculum Program (SJCP) to supplement the biomedical curriculum. The SJCP consists of three components: (1) active self-directed learning and didactics, (2) implementation and action, and (3) self-reflection and personal growth. The purpose of introducing a student-driven SJ curriculum is to expose the students to various components of SJ in health and medicine, and maximize engagement by using their own inputs for content and design. It is our hope that the SJCP will serve as a logistic and research-oriented model for future student-driven SJ programs that respond to global health inequalities by cultivating skills and interest in leadership and community service. PMID:25157325

  17. Justice Reinvestment: “Motherhood and Apple Pie?”—Matching Ambition to Capacity and Capability

    OpenAIRE

    Wong, Kevin; Christmann, Kris

    2016-01-01

    The idea of '“Justice Reinvestment'” (JR), has been proposed by United Kingdom (UK) policy makers and criminal justice campaigners as a way of responding to the problems arising from the economic crisis in 2007 and 2008. Despite the interest in JR from policy makers, a systematic approach to JR in the UK has yet to be adopted. Instead, the implementation of JR in the UK has been limited to a somewhat piecemeal approach with an uncoordinated set of initiatives, including Payment by Results (Pb...

  18. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  19. The concept of energy justice across the disciplines

    International Nuclear Information System (INIS)

    Heffron, Raphael J.; McCauley, Darren

    2017-01-01

    Over the last decade, ‘Energy Justice’ is a concept that has emerged in research across many disciplines. This research explores the role and value of the energy justice concept across the disciplines. It provides the first critical account of the emergence of the energy justice concept in both research and practice. A diagrammatical image for examining the energy justice concepts is presented and this is a tool for interdisciplinary engagement with the concept. In this context, restorative justice is introduced and how it results in energy justice applying in practice is detailed. Energy research scholarship at universities is assessed and it is clear that through universities there is a platform for energy justice scholarship to build on the interdisciplinary energy scholarship at universities. Further, the role of education is vital to policy-making, and the understanding and development of the energy justice concept. Finally, in analysing how the energy justice concept can impact on policy-making, there is a critical examination of the energy justice and its relationship with economics, and how it can transfer directly into practice by assisting in balancing the competing aims of the energy trilemma. - Highlights: • Presents the value of the energy justice concept itself. • Introduces restorative justice as having a key role across the energy justice concept. • Expresses the need to develop a ‘common approach’ for the energy justice concept Advances the conceptual framework for energy justice – from theory to practice.

  20. Reducing Urban Violence: A Contrast of Public Health and Criminal Justice Approaches.

    Science.gov (United States)

    Cerdá, Magdalena; Tracy, Melissa; Keyes, Katherine M

    2018-01-01

    Cities are investing millions in Cure Violence, a public health approach to reduce urban violence by targeting at-risk youth and redirecting conflict to nonviolent responses. The impact of such a program compared with criminal justice responses is unknown because experiments directly comparing criminal justice and public health approaches to violence prevention are infeasible with observational data. We simulated experiments to test the influence of two interventions on violence: (1) Cure Violence and (2) directed police patrol in violence hot spots. We used an agent-based model to simulate a 5% sample of the New York City (NYC) adult population, with agents placed on a grid representing the land area of NYC, with neighborhood size and population density proportional to land area and population density in each community district. Agent behaviors were governed by parameters drawn from city data sources and published estimates. Under no intervention, 3.87% (95% CI, 3.84, 3.90) of agents were victimized per year. Implementing the violence interrupter intervention for 10 years decreased victimization by 13% (to 3.35% [3.32, 3.39]). Implementing hot-spots policing and doubling the police force for 10 years reduced annual victimization by about 11% (to 3.46% [3.42, 3.49]). Increasing the police force by 40% combined with implementing the violence interrupter intervention for 10 years decreased violence by 19% (to 3.13% [3.09, 3.16]). Combined investment in a public health, community-based approach to violence prevention and a criminal justice approach focused on deterrence can achieve more to reduce population-level rates of urban violence than either can in isolation. See video abstract at, http://links.lww.com/EDE/B298.

  1. Tailoring NIST Security Controls for the Ground System: Selection and Implementation -- Recommendations for Information System Owners

    Science.gov (United States)

    Takamura, Eduardo; Mangum, Kevin

    2016-01-01

    . Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).

  2. Justice as Europe's Signifier

    NARCIS (Netherlands)

    Roy, Suryapratim; Kochenov, Dimitry; de Burca, Grainne; Williams, Andrew

    2015-01-01

    Drawing on the fact that justice is never explained in European legal discourse, but is used in conjunction with other principles and institutional decisions, this contribution argues that justice is used as a rhetorical tool to provide legitimacy to such principles and decisions. An analogous

  3. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  4. 28 CFR 0.92 - National Institute of Justice.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Institute of Justice. 0.92 Section 0.92 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE 1-Office of Justice Programs and Related Agencies § 0.92 National Institute of Justice. The National...

  5. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  6. Design and Implementation of a Secure Modbus Protocol

    Science.gov (United States)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  7. The Geography of Justice: Assessing Local Justice in Colombia’s Post-Conflict Phase

    Directory of Open Access Journals (Sweden)

    Mauricio García-Villegas

    2015-07-01

    Full Text Available This article combines descriptive empirical research with theoretical reflections to offer policy guidelines on what the role of local justice institutions in Colombia’s post-conflict phase should be. The article is divided into two parts. In the first, we present empirical evidence to illustrate the ways in which justice operates differently across the territory. In addition to illustrating these disparities, we also demonstrate the connection between these disparities and some phenomena relevant to understanding the Colombian conflict. Based on these findings, the second part of this article defines the state-building challenge confronted by the Colombian State during the post-conflict phase. Following this part, we propose a solution to this state-building challenge: the State must adopt a combination of efficacy and justice, and we provide guidelines on how a post-conflict justice system can operate to achieve that combination.

  8. Justice et miséricorde

    OpenAIRE

    Heyer, René

    2012-01-01

    On n’imagine pas de justice sans possibilité de faire miséricorde ; inversement, une miséricorde qui ne tiendrait pas compte de la justice ne serait plus la miséricorde. Les deux notions sont liées, mais sur un socle inégal : car la justice inspirée par la loi naturelle déborde la justice positive, de même que la misère des miséreux ne se laisse pas ramener au mal commis par le misérable. En découlent des variations où l’on peut voir se profiler trois moments : 1. La loi coutumière est bouscu...

  9. An investigation of relation between organizational justice and professional commitment of staff: A case study of public organization in Kermanshah

    Directory of Open Access Journals (Sweden)

    Mostafa Emami

    2013-05-01

    Full Text Available This paper presents an empirical study to investigate the relationship between organizational justice and professional commitment in Kermanshah official organizations. The study uses 20 questions to measure professional commitment from a questionnaire originally developed by Spell et al. (2007 [Spell, C. S., & Arnold, T. J. (2007. A multi-level analysis of organizational justice climate, structure, and employee mental health. Journal of Management, 33(5, 724-751.]. In addition, the study adopts 12 questions from another questionnaire developed by Vallas (1999 [Vallas, S. P. (1999. Rethinking post‐Fordism: The meaning of workplace flexibility. Sociological theory, 17(1, 68-101.] to measure organizational justice. Cronbach alpha for organizational justice questionnaire and professional commitment are 0.81 and 0.89, respectively, which are well above the minimum acceptable level. Based on the results of this survey, there is a positive and meaningful relationship between organizational justice and professional commitment. The implementation of the linear regression analysis also reveals that there is a positive and meaningful relationship between inter-organizational justice and professional commitment. The study performs Freedman test to rank three components of organizational justice and the results indicate that interactional justice maintains the highest level of importance while distributive justice comes last in terms of priority.

  10. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  11. The Relevance of the Doctrine on Restorative Justice in the Indonesian Sentencing System

    Directory of Open Access Journals (Sweden)

    Bambang Waluyo

    2015-08-01

    Full Text Available Referring on the development of criminal law recently, it is inevitable to reform the criminal law through changes on the Indonesian Criminal Code (KUHP. Being derived from the foreign law (relic of the colonial era, the Criminal Code has been obsolete, injustice, outmoded and unrealistic irrelevant for the present reality. The type of research employed in this paper is normative research, reviewing the restorative justice principle from the perspective of the criminal law system, with the aim of constructing a restorative justice concept which is ideal to be applied in the Indonesian criminal law system. The concept of restorative justice is an approach of problem solving that emphasizes the recovery of victims and to restore the relationship between the perpetrator and the victim and to their respective communities. By using such approach, the parties are expected to reach a mutual agreement related to the settlement of disputes which expected to harmonize the relationship of the parties prior the occurrence of the crime. On the practical level, the principles on restorative justice for the settlement of criminal case may need to be implemented imminently as part of the criminal system in Indonesia.

  12. Restorative justice and victimology

    African Journals Online (AJOL)

    The growth of restorative justice has sparked debate over the future of the criminal justice system, which has historically adopted a retributive, punitive philosophy and advocated for an individualistic, treatment-orientated approach. This approach has over time failed to address the needs of crime victims, communities and.

  13. Juvenile Justice-Translational Research on Interventions for Adolescents in the Legal System (JJ-TRIALS): a cluster randomized trial targeting system-wide improvement in substance use services.

    Science.gov (United States)

    Knight, Danica K; Belenko, Steven; Wiley, Tisha; Robertson, Angela A; Arrigona, Nancy; Dennis, Michael; Bartkowski, John P; McReynolds, Larkin S; Becan, Jennifer E; Knudsen, Hannah K; Wasserman, Gail A; Rose, Eve; DiClemente, Ralph; Leukefeld, Carl

    2016-04-29

    The purpose of this paper is to describe the Juvenile Justice-Translational Research on Interventions for Adolescents in the Legal System (JJ-TRIALS) study, a cooperative implementation science initiative involving the National Institute on Drug Abuse, six research centers, a coordinating center, and Juvenile Justice Partners representing seven US states. While the pooling of resources across centers enables a robust implementation study design involving 36 juvenile justice agencies and their behavioral health partner agencies, co-producing a study protocol that has potential to advance implementation science, meets the needs of all constituencies (funding agency, researchers, partners, study sites), and can be implemented with fidelity across the cooperative can be challenging. This paper describes (a) the study background and rationale, including the juvenile justice context and best practices for substance use disorders, (b) the selection and use of an implementation science framework to guide study design and inform selection of implementation components, and (c) the specific study design elements, including research questions, implementation interventions, measurement, and analytic plan. The JJ-TRIALS primary study uses a head-to-head cluster randomized trial with a phased rollout to evaluate the differential effectiveness of two conditions (Core and Enhanced) in 36 sites located in seven states. A Core strategy for promoting change is compared to an Enhanced strategy that incorporates all core strategies plus active facilitation. Target outcomes include improvements in evidence-based screening, assessment, and linkage to substance use treatment. Contributions to implementation science are discussed as well as challenges associated with designing and deploying a complex, collaborative project. NCT02672150 .

  14. ConstitutionalJustice: Cases of Protection of Freedom and Personal Security in Colombia

    Directory of Open Access Journals (Sweden)

    Viridiana Molinares Hassan

    2014-07-01

    Full Text Available In this paper we present the results of an investigation about judicial protection of freedom and personal security granted by the Constitutional Court (cc of Colombia, with a comparative analysis between the period 1992-2001, to which governments have appointed period of postconstitucionales, which coincides with the issuance of the 1991 Constitution, and the creation of constitutional jurisdiction, and the period 2002-2010, during which it ran the Democratic Security Policy (dsp as a government policy proposal by former president Álvaro Uribe, whose aim was to achieve peace through the declaration of war to the guerrilla group Revolutionary Armed Forces of Colombia (farc. Our interest is to show that the protection of freedom and personal security as the basis of the Constitutional (ec finds in the cc his greatest guarantor, even against closing courts in other jurisdictions that are still rooted in the failed legal positivist paradigm, ignoring the postulates of neoconstitutionalism dc sufficiently developed from a process of creative interpretation and decision-making. This coupled with the importance for the branches of power and knowledge associated scope of freedom and personal security developed by the cc in the difficult context of irregular warfare that exists in Colombia, yet it is, for universal constitutionalism, an example of the development of legal guarantor in the context of current constitutionalism.

  15. Assessment for Social Justice: The Role of Assessment in Achieving Social Justice

    Science.gov (United States)

    McArthur, Jan

    2016-01-01

    This article provides a rationale for "assessment for social justice", through which a greater focus is given to the role of assessment in achieving the social justice aspirations of higher education. It takes inspiration from work on assessment for learning to propose that as assessment is a powerful driver of how and what students…

  16. Right to access to justice in environmental matters

    Directory of Open Access Journals (Sweden)

    Daniela Gračan

    2010-01-01

    Full Text Available One of the strategic goals of the Republic of Croatia for the following period is its access to the European Union. In order to fulfill it, the Republic of Croatia has in October 2001 signed the Stabilization and Association Agreement and thus overtaken the obligation to strengthen co-operation with European Union member states in struggle against environmental devastation and in promotion of environmental sustainability (Article 103 of Agreement. With the acceptance of the Agreement the process began of the Croatian legislation adjustment to the European Union legal acquirements, and thus of the implementation of numerous European Union Acts into its own legislation. In the area of environmental protection, a large number of regulations, directives, and decisions resolving the objectives regarding further protection were carried out by the competent bodies of the European Union, which the Republic of Croatia must implement in its own legislation during its process of accessing EU. Sure enough, one of the most important questions of environmental protection is the right to approach the legislation on environmental issues by all stakeholders. This paper brings the authors' elaboration on the right to access to justice in matters of environmental protection, its standardizing characteristics, similarities, and differences from the aspect of the Convention on Environmental Information and Public Participation in Environmental Decision-making and Access to Justice in Environmental Matters, European Union Acts, and Croatian legislation.

  17. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  18. Analyzing the politico-moral foundations of the Iran's health system based on theories of justice.

    Science.gov (United States)

    Akrami, Forouzan; Abbasi, Mahmoud; Karimi, Abbas; Shahrivari, Akbar; Majdzadeh, Reza; Zali, Alireza

    2017-01-01

    Public health ethics is a field that covers both factual and ethical issues in health policy and science, and has positive obligations to improve the well-being of populations and reduce social inequalities. It is obvious that various philosophies and moral theories can differently shape the framework of public health ethics. For this reason, the present study reviewed theories of justice in order to analyze and criticize Iran's general health policies document, served in 14 Articles in 2014. Furthermore, it explored egalitarianism as the dominant theory in the political philosophy of the country's health care system. According to recent theories of justice, however, health policies must address well-being and its basic dimensions such as health, reasoning, autonomy, and the role of the involved agencies and social institutions in order to achieve social justice beyond distributive justice. Moreover, policy-making in the field of health and biomedical sciences based on Islamic culture necessitates a theory of social justice in the light of theological ethics. Educating people about their rights and duties, increasing their knowledge on individual agency, autonomy, and the role of the government, and empowering them will help achieve social justice. It is recommended to design and implement a strategic plan following each of these policies, based on the above-mentioned values and in collaboration with other sectors, to clarify the procedures in every case.

  19. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  20. Organization, relational justice and absenteeism.

    Science.gov (United States)

    Stoetzer, Ulrich; Åborg, Carl; Johansson, Gun; Svartengren, Magnus

    2014-01-01

    There is a need for more knowledge on how to manage companies towards healthier and more prosperous organizations with low levels of absenteeism. Relational Justice can be a useful concept when managing such organizations. Organizational factors can help to explain why some companies have relatively low absenteeism rates, even though they are equal to other companies in many other aspects. Previous studies suggest that management may be one important factor. Efficient management may depend on good relations between the leaders and the employees. The concept of Relational Justice is designed to capture these relations. Consequently, a Relational Justice framework may be used to understand why some companies have a low incidence of absenteeism. Managers from a representative body of Swedish companies. Interviews were analyzed to explore whether the items representing the concept of Relational Justice can be used to further understand the strategies, procedures and structures that characterize organizations and management in companies with a low incidence of absenteeism. Strategies, procedures or principles related to Relational Justice were common and highlighted in companies with an incidence of absenteeism. The most frequently occurring factors were; to be treated with kindness and consideration, personal viewpoint considered and to be treated impartially. The results suggested that a Relational Justice framework could be used to increase understanding of the organizational and managerial factors typical for companies with a low incidence of absenteeism. A Relational Justice approach to organizational management may be used to successfully lower absenteeism, change organizations and promote healthy and prosperous companies.

  1. Environmental justice: An issue for states

    Energy Technology Data Exchange (ETDEWEB)

    Murakami, L.K.; Davis, S.; Starkey, D. [National Conference of State Legislatures, Denver, CO (United States)

    1996-12-01

    Environmental justice combines the social justice and the environmental movements. The very term environmental justice is often and inaccurately used interchangeably with environmental racism and environmental equity. Environmental racism refers to any policy, practice or directive, intentional or not, that differentially affects the environment of individuals, groups or communities based on their race. The concept of environmental equity holds that all populations should bear a proportionate share of environmental pollution and health risks. Environmental justice is a broader term that encompasses both these concepts and connotes the laws must be applied with fairness and impartiality. Environmental justice is defined as the achievement of equal protection from environmental and health hazards for all people regardless of race, income, culture or social class.

  2. Environmental justice: An issue for states

    International Nuclear Information System (INIS)

    Murakami, L.K.; Davis, S.; Starkey, D.

    1996-01-01

    Environmental justice combines the social justice and the environmental movements. The very term environmental justice is often and inaccurately used interchangeably with environmental racism and environmental equity. Environmental racism refers to any policy, practice or directive, intentional or not, that differentially affects the environment of individuals, groups or communities based on their race. The concept of environmental equity holds that all populations should bear a proportionate share of environmental pollution and health risks. Environmental justice is a broader term that encompasses both these concepts and connotes the laws must be applied with fairness and impartiality. Environmental justice is defined as the achievement of equal protection from environmental and health hazards for all people regardless of race, income, culture or social class

  3. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... questions and privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0034] Privacy Act of 1974: Implementation of Exemptions...: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security...

  4. Military Justice Study Guide

    Science.gov (United States)

    1990-07-01

    statute within the military system, persons unfamiliar with the military justice system may find the procedure something of a paradox at first blush...Manual for Courts-Martial) Is RM Nemitafinuestlitimelf.(er- V. GRAD*: c. ORGANIZATION dDT FRPR ast eiRO t: fII) EPR LCDR/ Naval Justice School

  5. Malachi’s concern for social justice: Malachi 2:17 and 3:5 and its ethical imperatives for faith communities

    Directory of Open Access Journals (Sweden)

    Blessing O. Bọlọjẹ

    2014-07-01

    Full Text Available Any time humans in any culture consider primary ethical concepts, justice will be to the fore. Much seems to hinge upon it whether human society is to function with any semblance of civil order, security and harmony. When justice is pervasively trampled upon, the very fabric of liveable society crumbles. The apprehension for justice is clearly reflected in almost all of the Old Testament (OT. It is an important theological motif in the OT. This is found in such OT literature as historical, legal, prophetic and wisdom writings. This evidence thus reveals that the apprehension for the issue of justice was one of the many ways by which Israel’s multifaceted social life was knit together throughout its various ancient historical developments. No aspect of the life of Israel was excluded from this kind of apprehension for justice, and Yahweh was understood to be actively involved in its entire phase. This article examines Malachi’s fourth disputation in the light of the lawlessness alluded to in Malachi 2:17 and the corruption of personal and civil morality in Malachi 3:5. In the discussions that follow, this article examines the need for the justice of Yahweh; that is, Yahweh’s righting of past wrongs and the reversal of sinful societal order. The purpose is to enact a communal ethic for those who generously care for the neighbourhood and are firm in their devotion to Him, that is, God.

  6. Organizational Justice as an Outcome of Diversity Management for Female Employees: Evidence From U.S. Federal Agencies

    Directory of Open Access Journals (Sweden)

    Sungchan KIM

    2016-10-01

    Full Text Available Diversity management has been implemented vigorously in organizations with workforce diversity practices. One of the possible outcomes of diversity management is increased fairness in the organization. However, women perceive organizations as still being unfair, even though diverse managerial practices have been adopted to address equity related problems. In this article, we examine how female employees in federal agencies view diversity management and whether they believe that diversity management can lead to organizational justice. By using the 2013 Federal Employee Viewpoint Survey (FEVS data, we found that diversity management leads to a higher level of organizational justice for female employees. However, white female employees have a higher agreement on the effi cacy of diversity management in producing procedural and interactional justice than do non-white female employees. Also, female employees in the regulatory or redistributive agency category perceive less that diversity management leads to organizational justice than those in other agencies. We therefore conclude that diversity management is an effective tool to achieve organizational justice for particular groups.

  7. JUSTICIA RESTAURATIVA Y PROCESO PENAL GARANTÍAS PROCESALES: LÍMITES Y POSIBILIDADES RESTORATIVE JUSTICE AND CRIMINAL JUSTICE PROCEDURAL SAFEGUARDS: LIMITS AND POSSIBILITIES

    Directory of Open Access Journals (Sweden)

    Alejandra Mera González-Ballesteros

    2009-01-01

    Full Text Available Hace ya más de tres décadas que se han venido implementando en diversas jurisdicciones programas de justicia restaurativa en el ámbito de la justicia penal, especialmente en los sistemas de justicia penal juvenil, ofreciendo una alternativa de resolución orientada a la reparación, desjudicialización y el diálogo entre los directamente involucrados en el conflicto. Este vertiginoso desarrollo ha precedido generalmente a la regulación legal y al debate sobre estándares y garantías procesales que deben orientar estos programas. Sin embargo, a medida que los programas de justicia restaurativa han ganado terreno y se han propuesto como mecanismos de resolución en casos de mayor gravedad y de criminalidad adulta, la necesidad de establecer estándares legales se ha hecho urgente. Hasta ahora, a nivel comparado, no existe acuerdo sobre la necesidad o el contenido de las garantías procesales aplicables a los programas de justicia restaurativa. Este trabajo propone que es necesario establecer estándares procesales claros en la implementación de estos programas, pero a su vez, que ellos deben adecuarse a los principios y fines que ésta persigue.Since more than thirty years, many countries have implemented restorative justice programmes to deal with criminal matters, especially with young offenders. This programmes offer different ways to deal with the aftermaths of a crime, through diversion, reparation and the active participation of those involved in the conflict. This dramatic development has occurred, though, without broad legal regulations or deep debates regarding procedural safeguards and standards. Nevertheless, as restorative justice programmes grow and are being used to deal with serious offences and adult offenders, the need for the setting of safeguards is pressing. Until now, there is not agreement in the literature regarding the specific content of procedural safeguards for restorative justice. This paper suggests that

  8. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  9. Juvenile Justice in Mexico

    Directory of Open Access Journals (Sweden)

    Martha Frías Armenta

    2014-08-01

    Full Text Available The first tribunal in Mexico was established in the central state of San Luis Potosi in 1926. The Law Regarding Social Prevention and Juvenile Delinquency for the Federal District and Mexican territories was promulgated in 1928. In 2005, Article 18 of the Mexican Constitution was modified to establish a comprehensive system (“Sistema Integral de justicia” in Spanish of justice for juveniles between 12 and 18 years old who had committed a crime punishable under criminal law. Its objective was to guarantee juveniles all the due process rights established for adults, in addition to the special ones recognized for minors. The constitutional reform also provides a framework that includes special tribunals as well as alternative justice options for juveniles. With these reforms, institutionalization of minors was to be considered an extreme measure applicable only to felonies and to juveniles older than 14. In 2006, all states within the Mexican federation enacted the “Law of justice for adolescents”. This system, at both the federal and state levels, formalizes a new global paradigm with regard to the triangular relationship between children, the State and the Law. It recognizes that children are also bearers of the inherent human rights recognized for all individuals, instead of simply objects in need of protection. However, despite formally aligning Mexican juvenile justice law with the Convention on the Rights of the Child (CRC, issues of actual substantive rights remained and new ones have appeared. For example, juveniles younger than 14 who have not committed a felony are released from institutions without any rehabilitation or treatment options, and alternative forms of justice were included without evaluating their possibilities of application or their conditions for success. In addition, the economic status of most juvenile detainees continues to be one of the most important determining factors in the administration of justice

  10. New frontiers and conceptual frameworks for energy justice

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Burke, Matthew; Baker, Lucy; Kotikalapudi, Chaitanya Kumar; Wlokas, Holle

    2017-01-01

    This article explores how concepts from justice and ethics can inform energy decision-making and highlight the moral and equity dimensions of energy production and use. It defines “energy justice” as a global energy system that fairly distributes both the benefits and burdens of energy services, and one that contributes to more representative and inclusive energy decision-making. The primary contribution of the article is its focus on six new frontiers of future energy justice research. First is making the case for the involvement of non-Western justice theorists. Second is expanding beyond humans to look at the Rights of Nature or non-anthropocentric notions of justice. Third is focusing on cross-scalar issues of justice such as embodied emissions. Fourth is identifying business models and the co-benefits of justice. Fifth is better understanding the tradeoffs within energy justice principles. Sixth is exposing unjust discourses. In doing so, the article presents an agenda constituted by 30 research questions as well as an amended conceptual framework consisting of ten principles. The article argues in favor of “justice-aware” energy planning and policymaking, and it hopes that its (reconsidered) energy justice conceptual framework offers a critical tool to inform decision-making. - Highlights: • We need “justice-aware” energy policy. • A revised energy justice conceptual framework offers a critical tool to inform decision making. • New fields of inquiry for energy justice research and practice exist. • Tradeoffs and weighing competing justice claims occur in practice.

  11. Personality traits and perceptions of organisational justice.

    Science.gov (United States)

    Törnroos, Maria; Elovainio, Marko; Hintsa, Taina; Hintsanen, Mirka; Pulkki-Råback, Laura; Jokela, Markus; Lehtimäki, Terho; Raitakari, Olli T; Keltikangas-Järvinen, Liisa

    2018-01-04

    This study examined the association between five-factor model personality traits and perceptions of organisational justice. The sample for the study comprised 903 participants (35-50 years old; 523 women) studied in 2007 and 2012. Measures used were the Neuroticism, Extraversion, Openness, Five-Factor Inventory questionnaire and the short organisational justice measure. The results showed that high neuroticism was associated with low distributive, procedural and interactional justice. Furthermore, high agreeableness was associated with high procedural and interactional justice and high openness with high distributive justice. This study suggests that neuroticism, agreeableness and openness are involved in perceptions of organisational justice and that personality should be considered in research and in practices at the workplace. © 2018 International Union of Psychological Science.

  12. Restorative Justice: A Changing Community Response

    Science.gov (United States)

    Ryan, Thomas G.; Ruddy, Sean

    2015-01-01

    Our purpose herein is to demonstrate how restorative justice continues to unfold globally and we explain how the use of a restorative justice ideology and intervention leads to a common alternative, not only in criminal justice institutions, but also within social agencies, such as elementary schools, and the related social support systems. We…

  13. Rethinking Discussions of Justice in Educational Research: Formative Justice, Educational Liberalism, and Beyond

    Science.gov (United States)

    Thompson, Winston C.

    2016-01-01

    Background/Context: Educational research tends to borrow accounts of justice from scholarship embedded within the structures and commitments of other disciplines or fields of study. This has created a body of educational research that largely responds to the "justice" goals of those disciplines rather than education qua education.…

  14. Restorative Justice in Indonesia: Traditional Value

    Directory of Open Access Journals (Sweden)

    Eva Achjani Zulfa

    2011-05-01

    Full Text Available “Restorative Justice” is a model approach which emerged in the 1960s in an effort to solve criminal cases. Unlike the approach used in conventional criminal justice system, this approach focuses on the direct participation of perpetrators, victims and society in the settlement process. This theory of the approach is still debated, but the view is in fact growing and it exercises a lot of influence on legal policies and practices in several countries. The UN through its basic principles considers the approach of restorative justice as the approach which could be used in the rational criminal justice system. Restorative justice is a concept of thinking that supports the development of the criminal justice system with emphasis on the required involvement of the community. It is also involving the casualties who with the current criminal justice system are excluded. In several countries, restorative justice has been translated into a variety of formulations to accommodate a variety of values, philosophical basis, terms, strategies, mechanisms, and programs. Good consultation with the perpetrators and the victims themselves may provide the public with a different mindset in preventing emerging problems. This process can involve the police, prosecutorial institution or the traditional institutions. Therefore, without excluding the work in the formal legal system, the institutional mechanism for resolution through consultation was working in the community. In the various principles and models of the restorative justice approach, the process of dialogue between the perpetrator and the victim is a fundamental and the also the most important part of the application of the restorative justice. The direct dialogue between the perpetrator and the victim gave the victim the opportunity to express what he/she felt, hope for human rights and the desire to reach a criminal settlement.

  15. The Principle Of Justice In Magna Carta Libertatum And Its Influence On The Law In General

    Directory of Open Access Journals (Sweden)

    Zendeli Emine

    2015-12-01

    Full Text Available This article aims to expound the principle of justice, as a fundamental value and as an immanent category of law, as well as one of the fundamental human rights, prescribed and guaranteed by a myriad of international instruments and documents. After a brief historical account, by focusing on Article 40 of the Magna Carta Libertatum, which states that: “To No One Will we Sell, To No One Will we refuse or delay, right or justice”, this article claims to show the importance of incorporation of this principle in the provisions of the Magna Carta and its impact on the development of theory and legislation in the past and present. Moreover, the article intends to explore the extent of influence that the priciple of justice has on the functioning of the law in general. Since justice implicates the permanent and constant will to render each person his due, and this achieved through equality, it results that justice means being equal. In this context, the article will explore the concept of equality as a precondition of justice, as well as the conditions and modalities for its implementation.

  16. Expanding a community's justice response to sex crimes through advocacy, prosecutorial, and public health collaboration: introducing the RESTORE program.

    Science.gov (United States)

    Koss, Mary P; Bachar, Karen J; Hopkins, C Quince; Carlson, Carolyn

    2004-12-01

    Problems in criminal justice system response to date-acquaintance rape and nonpenetration sexual offenses include (a) they are markers of a sexual offending career, yet are viewed as minor; (b) perpetrators are not held accountable in ways that reduce reoffense; and (c) criminal justice response disappoints and traumatizes victims. To address these problems, a collaboration of victim services, prosecutors, legal scholars, and public health professionals are implementing and evaluating RESTORE, a victim-driven, community-based restorative justice program for selected sex crimes. RESTORE prepares survivors, responsible persons (offenders), and both parties' families and friends for face-to-face dialogue to identify the harm and develop a redress plan. The program then monitors the offender's compliance for 12 months. The article summarizes empirical data on problems in criminal justice response, defines restorative justice models, and examines outcome. Then the RESTORE program processes and goals are described. The article highlights community collaboration in building and sustaining this program.

  17. "The Path of Social Justice": A Human Rights History of Social Justice Education

    Science.gov (United States)

    Grant, Carl A.; Gibson, Melissa Leigh

    2013-01-01

    Although not often recognized, social justice education in the U.S. is historically and philosophically tied to the twentieth century's human rights initiatives. The efforts of human rights pioneers, such as those who authored the Universal Declaration of Human Rights, have indelibly shaped social justice efforts, including within education, in…

  18. Navigating the Meanings of Social Justice, Teaching for Social Justice, and Multicultural Education

    Science.gov (United States)

    Cho, Hyunhee

    2017-01-01

    This article uses well-received contemporary scholarship--works by Iris Young, Nancy Fraser, Morva McDonald, Connie North, and Geneva Gay--to illuminate a high degree of coherence among the substantive meanings of social justice, teaching for social justice, and multicultural education. Based on these relationships, the article suggests that…

  19. Justice Of The Peace Foreign Experience Of Organization Comparative Legal Analysis

    Directory of Open Access Journals (Sweden)

    Aishat R. Kaitova

    2014-09-01

    Full Text Available In the present article a short comparative analysis of the modern advanced states of the judicial systems is carried out. With considered judicial system's specifics existence it is possible to reveal their common features and tendencies of development. Today, for all states of the world community the process of globalization and universalism is characteristic. Practically all modern Constitutions and laws of states reproduce general approaches to the organization of the judicial systems and trial procedures, which are basis on the principles of the norms of international law, such as the right for fair and public trial in the reasonable time by the independent and impartial court, created on the basis of law. Moreover, today it is already possible to speak not only about declarative fixing of these general approaches, but also about their practical expression in the form of the number of judicial reforms implementation among which the important role is played by the problem of the institute of the justice of the peace formation and development. In this context foreign experience of the institute of the justice of the peace formation and functioning study will allow to reveal the general tendencies and ways of this legal institute improvement in our country. In the conclusion author notes that in the Romano-German family of the legal systems (France, Spain, Anglo-American (USA, Great Britain and mixed (Canada, Australia - justice of the peace carried out justice earlier and still continue to function successfully, at the same time this legal institute not usual for the socialist law. So there were no justices of the peace in the USSR, China, Democratic People's Republic of Korea, Cuba, etc.

  20. Genetics, criminal justice, and the minority community: An introduction for professionals in criminal justice. A report on the third annual convocation of the Justice George Lewis Ruffin Society

    Energy Technology Data Exchange (ETDEWEB)

    Croatti, R.D.

    1994-10-15

    The Justice George Lewis Ruffin Society is an organization founded in 1984 to support minority professionals in the Massachusetts criminal justice system. The Society began the sponsorship of statewide Convocations in 1992. These events provide minority criminal justice professionals with the opportunity to focus on pertinent topics through expert presentations, panel discussions, and peer interactions. Because of its increasing importance in the criminal justice process at large, and growing significance to the minority community in particular, the committee determined that the 1994 Convocation would focus on DNA. A decision was made to concentrate both on the science and the ethical and moral considerations pertinent to its application. The committee determined that along with expert presentations, a large portion of each day`s program should be devoted to workshops, designed to provide participants with an opportunity to review, test and discuss the material in a small group environment. Overall objectives of the Convocation were to provide minority and non-minority criminal justice professionals with a basic foundation in the science of genetics as well as current developments in genetic diagnostic technology, to highlight the actual and potential application of DNA technology to the criminal justice system and elsewhere, and to underscore the implications of these developments for criminal justice policy and the law.

  1. Implementation guidance for industrial-level security systems using radio frequency alarm links

    Energy Technology Data Exchange (ETDEWEB)

    Swank, R.G.

    1996-07-12

    Spread spectrum (SS) RF transmission technologies have properties that make the transmitted signal difficult to intercept, interpret, and jam. The digital code used in the modulation process results in a signal that has high reception reliability and supports multiple use of frequency bands and selective addressing. These attributes and the relatively low installation cost of RF systems make SSRF technologies candidate for communications links in security systems used for industrial sites, remote locations, and where trenching or other disturbances of soil or structures may not be desirable or may be costly. This guide provides a description of such a system and presents implementation methods that may be of engineering benefit.

  2. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  3. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC) Level...

  4. Towards a Capability-Based Theory of Social Justice for Education Policy-Making

    Science.gov (United States)

    Walker, Melanie

    2006-01-01

    Increasingly there is interest in development studies and specifically in the field of education in taking up Amartya Sen's capability approach as a framework for theorizing, implementing and evaluating education policy as a matter of social justice. This paper sets out to contribute to the emerging debate and to show how the capability approach…

  5. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  6. What is justice in education? Sketch of answer based on theories of justice and economics.

    OpenAIRE

    D. Waltenberg , Fábio

    2004-01-01

    D. Waltenberg, F. (2004). What is justice in education? Sketch of answer based on theories of justice and economics. Les Cahiers de Recherche du Girsef, 32.; What is justice in education? How can we evaluate whether given distributions of educational inputs or educational outcomes are just or not? How should a society distribute its educational resources? How can we evaluate the level of (un)fairness of a schooling system? In this paper, we try to provide a basic framework for thinking about ...

  7. Organization structure as a moderator of the relationship between procedural justice, interactional justice, perceived organizational support, and supervisory trust.

    Science.gov (United States)

    Ambrose, Maureen L; Schminke, Marshall

    2003-04-01

    Organizational justice researchers recognize the important role organization context plays in justice perceptions, yet few studies systematically examine contextual variables. This article examines how 1 aspect of context--organizational structure--affects the relationship between justice perceptions and 2 types of social exchange relationships, organizational and supervisory. The authors suggest that under different structural conditions, procedural and interactional justice will play differentially important roles in determining the quality of organizational social exchange (as evidenced by perceived organizational support [POS]) and supervisory social exchange (as evidenced by supervisory trust). In particular, the authors hypothesized that the relationship between procedural justice and POS would be stronger in mechanistic organizations and that the relationship between interactional justice and supervisory trust would be stronger in organic organizations. The authors' results support these hypotheses.

  8. [AN EVALUATION OF JUSTICE AND RIGHT TO HEALTH CONCEPTS IN THE PERSPECTIVES OF ETHICAL THEORIES].

    Science.gov (United States)

    Ekmekçi, Perihan Elif; Arda, Berna

    Right to health is considered as a fundamental human right. However the realization of right to health is facing obstacles due to the scarce resources which are needed for the provision of health services. Besides the vast technological improvements in medical area leads to the development of diagnosis and treatment possibilities each and every day. Thus, the provision of health services becomes a subject of distributive justice. To define the concept of justice, first one should identify the conditions of demanding right to have something and then determine how and who is obliged to give the deserved. Ethical theories form their own paradigms of acting right regarding their anchor points and priority values. The basic concepts such as justice or right to health are considered and conceptualized within the paradigms of the ethical theories. Thus some ethical theories consider right to health as a natural constituent of human being, while some may consider it contextual and others may reject it completely. In a similar vein, justice and related concepts of justice such as formal and material principles of justice differ regarding the paradigm of the ethical theory in which we position ourselves. The paradigms of ethical theories demand different approaches from each other both in defining the concepts and implementations in practical life. This paper sets forth how justice and right to health is conceptualized in the virtue ethics, deontological ethics, liberal ethical theory and communitarian ethical theories. To this end first the general frame of each ethical theory and how justice is conceptualized within this frame is defined. Following that a discussion of the possibility of justification of the right to health within the context of ethical theory is perused.

  9. Analyzing the politico-moral foundations of the Iran’s health system based on theories of justice

    Science.gov (United States)

    Akrami, Forouzan; Abbasi, Mahmoud; Karimi, Abbas; Shahrivari, Akbar; Majdzadeh, Reza; Zali, Alireza

    2017-01-01

    Public health ethics is a field that covers both factual and ethical issues in health policy and science, and has positive obligations to improve the well-being of populations and reduce social inequalities. It is obvious that various philosophies and moral theories can differently shape the framework of public health ethics. For this reason, the present study reviewed theories of justice in order to analyze and criticize Iran’s general health policies document, served in 14 Articles in 2014. Furthermore, it explored egalitarianism as the dominant theory in the political philosophy of the country’s health care system. According to recent theories of justice, however, health policies must address well-being and its basic dimensions such as health, reasoning, autonomy, and the role of the involved agencies and social institutions in order to achieve social justice beyond distributive justice. Moreover, policy-making in the field of health and biomedical sciences based on Islamic culture necessitates a theory of social justice in the light of theological ethics. Educating people about their rights and duties, increasing their knowledge on individual agency, autonomy, and the role of the government, and empowering them will help achieve social justice. It is recommended to design and implement a strategic plan following each of these policies, based on the above-mentioned values and in collaboration with other sectors, to clarify the procedures in every case. PMID:29291037

  10. The future of morality and international justice

    Directory of Open Access Journals (Sweden)

    Rakić Vojin

    2010-01-01

    Full Text Available The focus of this paper will be on the issue of justice, specifically in international relations. In that context, a number of existing theories of international justice will be briefly reviewed. Afterwards, I will turn to the question of what justice actually is. The assertion that justice is based on the idea of freedom will be substantiated. I will attempt to support my position with Doyle's and Kant's argumentation. It will be concluded that there are robust arguments in favor of the thesis that our historical development is marked by a gradual expansion of freedom and justice. Furthermore, we have strong reasons to aspire liberal internationalism based on the idea of humanity's gradual approximation of some form of global state because such a conception might be the best warrant of justice in international relations.

  11. Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    Nuclear material accounting and control (NMAC) works in a complementary fashion with the international safeguards programme and physical protection systems to help prevent, deter or detect the unauthorized acquisition and use of nuclear materials. These three methodologies are employed by Member States to defend against external threats, internal threats and both state actors and non-state actors. This publication offers guidance for implementing NMAC measures for nuclear security at the nuclear facility level. It focuses on measures to mitigate the risk posed by insider threats and describes elements of a programme that can be implemented at a nuclear facility in coordination with the physical protection system for the purpose of deterring and detecting unauthorized removal of nuclear material

  12. What Justice for Rwanda? Gacaca versus Truth Commission?

    OpenAIRE

    Reuchamps, Min

    2008-01-01

    In post-genocide Rwanda, in addition to gacaca courts, a truth commission is needed in order to promote justice and foster reconciliation. In the context of transitional justice, retributive justice, which seeks justice and focuses on the perpetrators, appears to be inadequate to lead a society towards reconciliation. Therefore, some forms of restorative justice, which emphasize the healing of the whole society, seem necessary. In Rwanda, gacaca courts and a truth commission are complementary...

  13. Social and psychological aspects of criminal juvenile justice in the world practice (Anglo-Saxon model of juvenile justice

    Directory of Open Access Journals (Sweden)

    D.S. Oshevsky

    2013-10-01

    Full Text Available The article is the final part of the review of existing foreign models of juvenile criminal justice system. We analyze the principles of juvenile justice in the criminal trial: protective orientation, personalization and social richness of the trial, the emphasis on educational influences. We present the foreign experience of incorporating social, psychological and clinical special knowledge into specialized justice concerning juvenile offenders. We analyze modern trends in the development of juvenile justice in the United States and Canada. We present material related to methods of risk assessment of re-offending among adolescents. We highlight approaches to complex long-term follow-up of juvenile offenders in Anglo-Saxon juvenile justice. We describe some aspects of the probation service using the method of case management. In the context of the accepted “National Strategy for Action for the Benefit of Children for 2012-2017”, the prospects for the development of specialized criminal justice for young offenders in the Russian Federation are discussed

  14. The antecedents of buyers' perceived justice in online markets.

    Science.gov (United States)

    Chiu, Shun-Po; Chou, Huey-Wen; Chiu, Chao-Min

    2013-07-01

    The success of a business largely depends upon customers' intentions to continue to purchase, but this can be a challenge for vendors in online markets. This study proposes a model which identifies an initial set of justice antecedents and evaluates their relation to perceived justice, trust, and repurchase intention in online markets. The theoretical model is tested by using structural equation modeling on a data set of 424 buyers in Yahoo! Kimo online auction market. The results demonstrate that three dimensions of justice (distributive, procedural, and interactional) are positively and significantly related to trust, which in turn affects buyers' intention to repurchase. Moreover, among the three dimensions of justice judgments, distributive justice and interactional justice are relatively more important than procedural justice in predicting buyers' trust in sellers. In terms of the antecedents of justice, this study provides evidence that product quality and delivery performance are significantly related to distributive justice, while information quality and contact channel are important antecedents of procedural justice. This study also finds that responsiveness is important in enhancing buyers' judgments of interactional justice.

  15. Engaging Global Justice Through Internships (Penultimate Draft)

    OpenAIRE

    Ericka Tucker

    2014-01-01

    Engaging with Global Justice through InternshipsGlobal justice, on its face, seems like an impossible task. As individuals, even citizens of wealthy and powerful countries, the task of economic, social and political justice seems to outstrip our intellectual, practical and emotional abilities. Considering the scope of 'global' justice, it would appear that a massive coordinated effort would be necessary to overcome the problems of global injustice, yet it would seem such coordination may be i...

  16. Transgenerational epigenetics and environmental justice.

    Science.gov (United States)

    Rothstein, Mark A; Harrell, Heather L; Marchant, Gary E

    2017-07-01

    Human transmission to offspring and future generations of acquired epigenetic modifications has not been definitively established, although there are several environmental exposures with suggestive evidence. This article uses three examples of hazardous substances with greater exposures in vulnerable populations: pesticides, lead, and diesel exhaust. It then considers whether, if there were scientific evidence of transgenerational epigenetic inheritance, there would be greater attention given to concerns about environmental justice in environmental laws, regulations, and policies at all levels of government. To provide a broader perspective on environmental justice the article discusses two of the most commonly cited approaches to environmental justice. John Rawls's theory of justice as fairness, a form of egalitarianism, is frequently invoked for the principle that differential treatment of individuals is justified only if actions are designed to benefit those with the greatest need. Another theory, the capabilities approach of Amartya Sen and Martha Nussbaum, focuses on whether essential capabilities of society, such as life and health, are made available to all individuals. In applying principles of environmental justice the article considers whether there is a heightened societal obligation to protect the most vulnerable individuals from hazardous exposures that could adversely affect their offspring through epigenetic mechanisms. It concludes that unless there were compelling evidence of transgenerational epigenetic harms, it is unlikely that there would be a significant impetus to adopt new policies to prevent epigenetic harms by invoking principles of environmental justice.

  17. Apology in the criminal justice setting: evidence for including apology as an additional component in the legal system.

    Science.gov (United States)

    Petrucci, Carrie J

    2002-01-01

    The criminal justice system has reached unprecedented scope in the United States, with over 6.4 million people under some type of supervision. Remedies that have the potential to reduce this number are continually being sought. This article analyzes an innovative strategy currently being reconsidered in criminal justice: the apology. Despite a legal system that only sporadically acknowledges it, evidence for the use of apology is supported by social science research, current criminal justice theories, case law, and empirical studies. Social psychological, sociological and socio-legal studies pinpoint the elements and function of apology, what makes apologies effective, and concerns about apology if it were implemented in the criminal justice system. Theoretical evidence is examined (including restorative justice, therapeutic jurisprudence, crime, shame, and reintegration) to explore the process of apology in the criminal justice context. Attribution theory and social conduct theory are used to explain the apology process specifically for victims and offenders. A brief examination of case law reveals that though apology has no formal place in criminal law, it has surfaced recently under the federal sentencing guidelines. Finally, empirical evidence in criminal justice settings reveals that offenders want to apologize and victims desire an apology. Moreover, by directly addressing the harmful act, apology may be the link to reduced recidivism for offenders, as well as empowerment for victims. This evidence combined suggests that apology is worthy of further study as a potentially valuable addition to the criminal justice process. Copyright 2002 John Wiley & Sons, Ltd.

  18. Asserting their Justice. The Shuar Vindicatory System and the Development of Indigenous Justice

    Directory of Open Access Journals (Sweden)

    Raúl Márquez Porras

    2018-06-01

    Full Text Available In Ecuador, the State’s recognition of indigenous justice systems takes place in a context where the legal framework is only partially made explicit, native communities debate their own legal model and their relationship with the State legal system remains ambiguous. This paper addresses the legal realities of one of these groups, the Shuar, drawing on a case study carried out in Nangaritza and on bibliographic work. First, a characterisation of the Shuar traditional justice is attempted. Then, certain dynamics of change, as well as the relationship between the Shuar and the State’s representatives, is described. Finally, hypotheses are proposed concerning the adaptation of Shuar justice to the new constitutional framework and its formalisation process.

  19. Love and justice's dialectical relationship: Ricoeur's contribution on the relationship between care and justice within care ethics.

    Science.gov (United States)

    Van Stichel, Ellen

    2014-11-01

    The relationship between love/care and justice was one of the key tensions from which care ethics originated; to this very day it is subject of debate between various streams of thought within care ethics. With some exceptions (e.g. Christa Schnabl) most approaches have in common the belief that care and justice are mutually exclusive concepts, or at least as so different that their application is situated on different levels. Hence, both are complementary, but distinct, so that there is no real interaction. This paper aims to investigate whether, and if so, how, a deeper understanding of Ricoeur's thoughts on this matter enriches the relationship between care and justice with respect to care ethics. This connection suggests itself from Ricoeur's interpretation of the relationship as a dialectical one in which the logic of superabundance (love) and the logic of equivalence (justice) meet. Care enables people to see the face and individuality of the one, 'le chacun,' within the anonymous structures of justice that tend to reduce all human beings to the anonymous each, 'le on'; justice in its turn is the precondition for love to become incarnated and made real. What may this view--of care and justice standing in close connection, in which they correct and strengthen each other--add to the understanding of concrete practices of care?

  20. Advancing Social Justice in Urban Schools through the Implementation of Transformative Groups for Youth of Color

    Science.gov (United States)

    Shin, Richard Q.; Rogers, Jennifer; Stanciu, Amalia; Silas, Melany; Brown-Smythe, Claudette; Austin, Brenda

    2010-01-01

    The unique challenges faced by some youth of color living in high poverty contexts necessitate the creation of innovative, culturally relevant, group interventions. Framing the work of group counselors from a social justice perspective provides a structure for emphasizing the complex intersection of economic, political, and socio-historical issues…

  1. Gendering agency in transitional justice

    DEFF Research Database (Denmark)

    Björkdahl, Annika; Selimovic, Johanna Mannergren

    2015-01-01

    -Herzegovina, where we point out instances of critical, creative, and transformative agency performed by women that challenge or negotiate patterns of gendered relations of domination. We collect women’s oral narratives and explore new sets of questions to capture women’s unique experiences in doing justice......Mainstream transitional justice and peacebuilding practices tend to re-entrench gendered hierarchies by ignoring women or circumscribing their presence to passive victims in need of protection. As a consequence we have limited knowledge about the multifaceted ways women do justice and build peace....... To address this lacuna we conceptualize and unpack the meaning of gendered agency, by identifying its critical elements and by locating it in space and in time. The conceptual work that we undertake is underpinned by empirical mapping of the transitional justice spaces in post-conflict Bosnia...

  2. Measuring Intergenerational Justice

    Directory of Open Access Journals (Sweden)

    Laurence J. Kotlikoff

    2017-12-01

    Full Text Available Concern with intergenerational justice has long been a focus of economics. This essay considers the effort, over the last three decades, to quantify generational fiscal burdens using label-free fiscal gap and generational accounting. It also points out that government debt -- the conventional metric for assessing generational fiscal justice,– has no grounding in economic theory. Instead, official debt is the result of economically arbitrary government labelling decisions: whether to call receipts “taxes” rather than “borrowing” and whether to call payments “transfer payments” rather than “debt service”. Via their choice of words, governments decide which obligations to put on, and which to keep off, the books. The essay also looks to the future of generational fiscal-justice analysis. Rapid computational advances are permitting economists to understand not just direct government intergenerational redistribution, but also how such policies impact the economy that future generations will inherit.

  3. Perception on justice, trust and tax compliance behavior in Malaysia

    Directory of Open Access Journals (Sweden)

    Sellywati Mohd Faizal

    2017-09-01

    Full Text Available The relationship between justice and trust with tax compliance behavior in Malaysia was studied. Previous studies have acknowledged the perception that justice does have an impact on tax compliance. This study distinguishes justice into procedural justice, distributive justice, and retributive justice. Therefore, this study examined the effect of these three types of justice on tax compliance. Trust also influences the act of tax compliance and it also has a relationship to the element of justice. Perceptions from individual taxpayers were gathered using questionnaires from previous studies. The findings suggest only procedural justice and trust affect tax compliance and procedural justice was positively and significantly correlated to trust. However, trust does not mediate the relationship between justice and compliance. This research will contribute to the tax literature with widened scope on justice in Malaysia.

  4. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  5. 28 CFR 0.93 - Bureau of Justice Statistics.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Bureau of Justice Statistics. 0.93...-Office of Justice Programs and Related Agencies § 0.93 Bureau of Justice Statistics. The Bureau of Justice Statistics is headed by a Director appointed by the President. Under the general authority of the...

  6. Secure integrated circuits and systems

    CERN Document Server

    Verbauwhede, Ingrid MR

    2010-01-01

    On any advanced integrated circuit or 'system-on-chip' there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area,

  7. Globalization and Social Justice in OECD Countries

    OpenAIRE

    Björn Kauder; Niklas Potrafke

    2015-01-01

    Social justice is a topic of importance to social scientists and also political decision makers. We examine the relationship between globalization and social justice as measured by a new indicator for 31 OECD countries. The results show that countries that experienced rapid globalization enjoy social justice. When the KOF index of globalization increases by one standard deviation, the social justice indicator increases by about 0.4 points (on a scale from 1 to 10). The policy implication is t...

  8. Implementation of chaotic secure communication systems based on OPA circuits

    International Nuclear Information System (INIS)

    Huang, C.-K.; Tsay, S.-C.; Wu, Y.-R.

    2005-01-01

    In this paper, we proposed a novel three-order autonomous circuit to construct a chaotic circuit with double scroll characteristic. The design idea is to use RLC elements and a nonlinear resistor. The one of salient features of the chaotic circuit is that the circuit with two flexible breakpoints of nonlinear element, and the advantage of the flexible breakpoint is that it increased complexity of the dynamical performance. Here, if we take a large and suitable breakpoint value, then the chaotic state can masking a large input signal in the circuit. Furthermore, we proposed a secure communication hyperchaotic system based on the proposed chaotic circuits, where the chaotic communication system is constituted by a chaotic transmitter and a chaotic receiver. To achieve the synchronization between the transmitter and the receiver, we are using a suitable Lyapunov function and Lyapunov theorem to design the feedback control gain. Thus, the transmitting message masked by chaotic state in the transmitter can be guaranteed to perfectly recover in the receiver. To achieve the systems performance, some basic components containing OPA, resistor and capacitor elements are used to implement the proposed communication scheme. From the viewpoints of circuit implementation, this proposed chaotic circuit is superior to the Chua chaotic circuits. Finally, the test results containing simulation and the circuit measurement are shown to demonstrate that the proposed method is correct and feasible

  9. Social Justice for Crossover Youth: The Intersection of the Child Welfare and Juvenile Justice Systems.

    Science.gov (United States)

    Kolivoski, Karen M; Goodkind, Sara; Shook, Jeffrey J

    2017-10-01

    Social workers are critical to promoting racial and social justice. "Crossover youth," a term used to describe youths who have contact with both the child welfare and juvenile justice systems, are an especially vulnerable but often overlooked population with whom social workers engage. A disproportionate number of crossover youth are African American. Empirical research on crossover youth is growing, but such scholarship rarely engages with a human rights and social justice perspective. African American children and youths have a distinct place within the history and current context of the child welfare and juvenile justice systems. These systems have historically excluded them or treated them differently; now, African American youths are overrepresented in each of them, and evidence suggests they are more likely to cross over. The purpose of this article is to describe the historical and current context of crossover youth, with a particular focus on African American youths, to provide the foundation for a discussion of what social workers can do to promote racial and social justice for crossover youth, including specific implications for practice and policy, as well as broader implications for human and civil rights. © 2017 National Association of Social Workers.

  10. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  11. 75 FR 9613 - Draft NIJ Restraints Standard for Criminal Justice

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF JUSTICE Office of Justice Programs [OJP (NIJ) Docket No. 1512] Draft NIJ Restraints Standard for Criminal Justice AGENCY: National Institute of Justice, Office of Justice Programs, DOJ. ACTION: Notice of Draft NIJ Restraints Standard for Criminal Justice and Certification Program...

  12. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

    OpenAIRE

    Kalaiprasath, R.; Elankavi, R.; Udayakumar, R.

    2017-01-01

    The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether thes...

  13. Looking to Hume for justice: on the utility of Hume's view of justice for American health care reform.

    Science.gov (United States)

    Churchill, L R

    1999-08-01

    This essay argues that Hume's theory of justice can be useful in framing a more persuasive case for universal access in health care. Theories of justice derived from a Rawlsian social contract tradition tend to make the conditions for deliberation on justice remote from the lives of most persons, while religiously-inspired views require superhuman levels of benevolence. By contrast, Hume's theory derives justice from the prudent reflections of socially-encumbered selves. This provides a more accessible moral theory and a more realistic path to the establishment of universal access.

  14. Doing Justice to Human Security: A Textbook in Tune with its Time

    Directory of Open Access Journals (Sweden)

    Deane Edward Neubauer

    2013-01-01

    Full Text Available I begin this brief review of this important volume with the confession that I have not personally pursued a teaching style that has employed a self-acclaimed textbook for many, many years, preferring to construct courses around monographs, articles and other visual materials. However, were I provided the opportunity to teach a course at the upper division undergraduate level or early gradate level in the subject of human security, this would certainly be the book I would choose (with the caveat introduced below. Alex and Sabina Lautensach have given careful and thoughtful consideration to every aspect of the text: the preface and introduction, written by the editors, lay out both the logic of the text and frame the subject matter that will locate the reader firmly in the midst of the vast challenges that consti­tute the issue of human security. They do so by em­phasizing both the multiple dimensions along which the issue of human security can be located and the inseparable nature of these as they interact with each other in complex ways. In many respects this strikes me as one of the most important contributions to the text—its steady insistence that human security as a construct is in a discursive state of constant emer­gence, such that in some important ways all its varied dimensions insistently co-vary. To make such a claim is in itself daunting—to demonstrate its validity and mutual engagements through the complex subject matters of its 20 chapters, is a tour de force. Their conclusion is sufficiently rich to stand alone as an illustrative text in other course materials.

  15. Commentary: School Psychologists as Advocates for Racial Justice and Social Justice: Some Proposed Steps

    Science.gov (United States)

    Shriberg, David

    2016-01-01

    In this commentary, Shriberg acknowledges that social justice and racial justice are critical frameworks from which to view school psychology. Individually and collectively, the works in this special issue of "School Psychology Forum" have added a tremendous service to the field. In addition to advancing research, the articles challenge…

  16. Design and Implementation of Wiki Services in a Multilevel Secure Environment

    National Research Council Canada - National Science Library

    Ong, Kar L

    2007-01-01

    The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...

  17. Demos as an Explanatory Lens in Teacher Educators' Elusive Search for Social Justice

    Science.gov (United States)

    Oikonomidoy, Eleni M.; Brock, Cynthia H.; Obenchain, Kathryn M.; Pennington, Julie L.

    2013-01-01

    Borrowing insights from the Ancient Greek ideal conceptions of a democratic civic space (demos), this article examines the applicability of this framework to four teacher educators' journey to implement social justice in their programs. It is proposed that the three constitutive dimensions of demos (freedom of speech, equality to vote and hold…

  18. Possibilities and restrictions of the implementation of mediation in domestic violence cases

    Directory of Open Access Journals (Sweden)

    Despotović-Stanarević Vera

    2010-01-01

    Full Text Available This paper presents a model of the implementation of mediation in cases where a power disbalance between partners exists. The model includes relevant theoretical concepts which are important for understanding of violence phenomenon in the family, and the contemporary approaches to the work on balancing unequal power in relationships. In creating the model of family mediation in cases including violence, some basic concepts of mediation procedures are modified or adjusted (neutrality, confidentiality, as well as the concept of circular causality and complementary relationships from a systemic perspective. Implementation of interdisciplinary approach is proposed for efficient work on balancing the power in relations and using various working domains. The confession of violent behavior and the acceptance of personal responsibility by the offender, and the readiness of both sides to take part in restoration of a relationship are basic principles of restorative justice that is fundamental for victim- offender mediation. Therefore, those conditions are also necessary for a family mediation in cases including elements of violence, if the security for the victim is provided and guaranteed.

  19. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  20. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  1. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  2. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  3. Common Frame of Reference and social justice

    NARCIS (Netherlands)

    Hesselink, M.W.; Satyanarayana, R.

    2009-01-01

    The article "Common Frame of Reference and Social Justice" by Martijn W. Hesselink evaluates the Draft Common Frame of Reference (DCFR) of social justice. It discusses the important areas, namely a common frame of Reference in a broad sense, social justice and contract law, private law and

  4. Restorative Justice at Work: Examining the Impact of Restorative Justice Resolutions on Juvenile Recidivism

    Science.gov (United States)

    Rodriguez, Nancy

    2007-01-01

    Programs with restorative justice ideals attempt to incorporate victims and community members into the administration of justice. Although these programs have become increasingly popular, only a few programs in the United States have been the focus of prior studies. Using official juvenile court data from an urban, metropolitan area, this study…

  5. Obstacle of Team Teaching and Collaborative Learning in Information Security

    Directory of Open Access Journals (Sweden)

    Marn-Ling Shing

    2007-10-01

    Full Text Available The field of information security includes diverse contents such as network security and computer forensics which are highly technical-oriented topics. In addition, information forensic requires the background of criminology. The information security also includes non-technical content such as information ethics and security laws. Because the diverse nature of information security, Shing et al. has proposed the use of team teaching and collaborative learning for the information security classes. Although team teaching seems to be efficient in information security, practically it needs a few challenges. The Purdue's case mentioned in Shing's paper has funding support of National Security Agency (NSA. However, a vast amount of resources may not be available for an instructor in a normal university. In addition, many obstacles are related to the administration problems. For example, how are the teaching evaluations computed if there are multiple instructors for a single course? How will instructors in a computer forensics class prepare students (criminal justice majors and information technology majors before taking the same class with diverse background? The paper surveyed approximately 25 students in a university in Virginia concerning the satisfaction of team-teaching. Finally, this paper describes ways to meet those challenges.

  6. Climate Justice and the Paris Agreement

    International Nuclear Information System (INIS)

    Michelot, Agnes

    2016-01-01

    The concept of climate justice has been, for the first time, used in an international agreement - namely, the Paris Agreement. But this recognition of the notion of climate justice is extremely restricted by the very way it is formulated. Preamble of the Paris Agreement 'notes' that climate justice is recognized by 'certain cultures'. Does it mean that particular and concrete stakes of climate justice of the pre-COP21 agenda have been recognized or, on the contrary, that the notion so introduced is actually an empty shell without any genuine legal perspective? Considering this uncertainty, it appears relevant to analyze the Paris Agreement through the claims of various groups and coalitions, which influenced the COP21 negotiations

  7. Restorative justice: a changing community response

    Directory of Open Access Journals (Sweden)

    Thomas G Ryan

    2015-03-01

    Full Text Available Our purpose herein is to demonstrate how restorative justice continues to unfold globally and we explain how the use of a restorative justice ideology and intervention leads to a common alternative, not only in criminal justice institutions, but also within social agencies, such as elementary schools, and the related social support systems. We draw attention to this emerging trend via current research and resources that enable us to put forward a definition, theoretical background and list the characteristic traits of this alternative mode of life consequence. Finally, we argue that the use of restorative justice in schools is a focus that is really a paradigm shift within the landscape of the educational enterprise.

  8. The Criminal justice system in Northern Ireland

    OpenAIRE

    Carr, Nicola

    2017-01-01

    As with any country, crime and justice and the contours of criminal justice have to be situated within the particular historical, social, and political context. Nowhere is this truer than in Northern Ireland, where the criminal justice system that has emerged has been shaped by a violent political conflict which spanned over three decades (from the late 1960s to the late 1990s). In the transition to peace, the reform of criminal justice agencies has been central—to a wider project of state le...

  9. International criminal justice and the erosion of sovereignty

    Directory of Open Access Journals (Sweden)

    Miguel de Serpa Soares

    2013-11-01

    Full Text Available The author states that any form of international justice always represents a means of limiting national sovereignty. In the case of International Criminal Law, this limiting is even more evident by compromising elements essential to the classical paradigm of International Law, as for example the punishing monopoly of States or the concept of a quasi-absolute State sovereignty. International criminal tools, crimes, sentences, jurisdictions, are all able to be, at least partially, a legal alternative to the issues of peace-keeping and national security, exclusively political and diplomatic. This alternative inevitable leads to tensions with a power structure that has not been altered since 1945. However, for this legal criminal alternative to be put in place, a long period of maturation will be required based on irrefutable technical and legal credibility.

  10. Organizational Justice as an Antecedent of Job Performance

    Directory of Open Access Journals (Sweden)

    Aizzat Mohd. Nasurdin

    2013-06-01

    Full Text Available The present research examines the influence of organizational justice (distributive justice and procedural justice on predicting job performance (task performance and contextual performance. Survey data were drawn from a sample of 136 customer-contact employees within the telecommunications industry in Malaysia. Results of the regression analysis illustrate that distributive justice alone has a significant and positive relationship with task performance. On the other hand, only procedural justice is found to be significantly and positively related to contextual performance. Implications of the findings and directions for future research are highlighted.

  11. Jeksternalizacija migracionnogo kontrolja v Evropejskom sojuze: pervye shagi po formirovaniju vneshnepoliticheskogo izmerenija prostranstva svobody, bezopasnosti i pravosudija [The externalisation of migration control in the European Union: first steps towards the external dimension of the space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ryabov Yury

    2012-01-01

    Full Text Available The creation of an area of freedom, security and justice is one of the most rapidly developing aspects of European integration. It this paper, we take a look at the foreign policies involved in this process — aside from the internal development of the European Union, they concern a significant number of third countries, including Russia. In our view, the efforts to manage the flow of migrants and asylum seekers constitute a viable part of the external dimension within the AFSJ policies. Much of this article is based on the theoretical postulates introduced by the scholars of the Paris School, a school within the discipline of security studies that conceptualized the connection between migration, terrorism, asylum, crime and ethnic clashes, and its role as a major threat facing the European Union. Externalization of this complex threat (that is, externalization in relation to the European Union is thus seen as one of the key prerequisites to advancement of migration management activities beyond the EU (i. e. externalization of migration management. In this article, we analyze the role the EU plays at the international scene and categorize the actions it took to manage the influx of migrants and asylum seekers from the 1980s until the time when supranational administrative bodies were granted mandates in the spheres of Justice and Home Affairs (JHA of the EU Member States. We conclude that it was as early as the 1990-s that th

  12. Report on International Roundtable Meeting on Collection Security held at the British Library

    OpenAIRE

    Andy Stephens; Helen Shenton

    2008-01-01

    Anonymised report on some of the issues raised at an international roundtable on collection security of thirteen major research libraries and national libraries from Europe and North America. Recurring themes of case studies included: 1) perpetrator profiling; 2) relations with the criminal justice system; 3) systems; 4) looking out; 5) aftermath.

  13. A New DEEL for An Old Problem: Social Justice at the Core

    Science.gov (United States)

    Storey, Valerie A.; Beeman, Tom

    2006-01-01

    New DEEL does not refer to a specific policy or reform, but rather to an ideology, unencumbered by international borders and domestic politics. In this paper, we first endeavor to identify the rhetoric of New DEEL and social justice, and the reality of its implementation in schools today; spending time on the NCLB Act which we postulate is a major…

  14. [The comparative evaluation of level of security culture in medical organizations].

    Science.gov (United States)

    Roitberg, G E; Kondratova, N V; Galanina, E V

    2016-01-01

    The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.

  15. Restorative justice innovations in Canada.

    Science.gov (United States)

    Wilson, Robin J; Huculak, Bria; McWhinnie, Andrew

    2002-01-01

    As many jurisdictions move towards more retributive measures as a means to address public discontent with crime, a parallel movement has developed in regard to restorative justice. This article presents three restorative initiatives currently in use in Canada. Each initiative addresses offender behavior and community engagement at a different point in the justice continuum. The use of Sentencing Circles is an example of how restorative justice principles can be instituted at the front end, prior to an offender becoming lodged in the system. The Restorative Justice Options to Parole Suspension project demonstrates how community engagement can assist in preventing offenders from being returned to the system once they have achieved conditional release. The Circles of Support and Accountability project has enlisted the support of professionally supported volunteers in the community reintegration of high-risk sexual offenders. These initiatives are presented within a framework of effective correctional interventions and increased empowerment for a variety of stakeholders. Copyright 2002 John Wiley & Sons, Ltd.

  16. Leadership Education and Development for Justice Using the Canonical Framework of John Rawls's, "A Theory of Justice"

    Science.gov (United States)

    Kliewer, Brandon; Zacharakis, Jeff

    2015-01-01

    Higher education that presupposes a specific conception of justice does well in preparing students to make claims of justice from specific perspectives or positions. However, civic leadership students with a strong background in specific conceptions of justice are often not equipped with necessary skills, dispositions, and habits to exercise…

  17. The Development of Four Leading Principles of the Convention on the Rights of the Child in Vietnam´s Juvenile Justice

    Directory of Open Access Journals (Sweden)

    Duc Nguyen

    2017-01-01

    Full Text Available The paper sheds light on the latest development of four CRC principles in the administration of Vietnam’s juvenile justice after the recent amendment of the Penal Code and Criminal Procedural Code of Vietnam. It also assesses the compatibility of the Vietnamese juvenile justice system compared to international standards elaborated by the CRC Committee. At the same time, certain issues are raised regarding the implementation of such principles in practice. Finally, concluding remarks will be provided together with recommendations on how to develop the juvenile justice system in Vietnam. Keywords: Vietnam’s juvenile justice; Children’s rights; CRC leading principles; juvenile offenders; the rights of the child; non-discrimination; best interests of the child; children’s right to life; survival and development; children’s right to be heard.

  18. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  19. 9 CFR 121.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  20. Educational Justice and Big Data

    Science.gov (United States)

    Ben Shahar, Tammy Harel

    2017-01-01

    This article examines the effects of incorporating information and communication technologies in schools in terms of distributive justice. To do so, four issues that are central to educational justice are discussed: scarcity of resources, the positional nature of education, peer effects, and biases in educational decision-making. The discussion…

  1. Gender Justice and School Education

    Science.gov (United States)

    Gao, Desheng

    2009-01-01

    Gender justice includes three basic dimensions: gender equality, respect for difference, and free choice. In reality, schools construct and reproduce the gender injustice of the social culture through multiple dimensions that include the visible and the invisible curriculum, and the teacher's behaviour. In terms of gender justice, the social…

  2. An Elective Course Exploring Occupational Justice Through Occupational Storytelling and Story Making

    Directory of Open Access Journals (Sweden)

    Julie Bednarski

    2016-01-01

    Full Text Available The purpose of this study was to examine whether second-year Master of Occupational Therapy (MOT students who enroll in the elective course “Occupation in Long-Term Care (LTC” would be able to apply concepts of occupational justice in the nursing home environment through engaging residents in occupational storytelling and story making in order to facilitate resident self-advocacy for participation in a valued occupation. The occupational therapy elective course was developed and implemented with students alternating between the classroom and the nursing home environments. Outcome evaluation measurements included analysis of student reflective journaling to obtain qualitative data. The researcher found that students are able to understand the concepts and issues of occupational justice in the nursing home population and apply knowledge to facilitate the resident’s participation in meaningful occupations.

  3. Project-Based Social Justice Mathematics: A Case Study of Five 6th Grade Students

    Science.gov (United States)

    McHugh, Maighread L.

    2015-01-01

    The purpose of this qualitative multiple case study was to explore how five sixth grade female students navigated the process of project-based learning as they designed and implemented their own project centered on mathematics while using a social justice lens. The theoretical frameworks of Authentic Intellectual Work and Social Justice…

  4. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  5. Just Security and the Crisis of Global Governance

    OpenAIRE

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade into others. Managing them so as to avoid such failures is an essential function of global governance. Public space is the home of governance (formal and informal) and of rights-exercising groups and ...

  6. New jurisdiction of the European Court of Justice in resolving monetary and fiscal disputes

    Directory of Open Access Journals (Sweden)

    Dimitrijević Marko

    2016-01-01

    Full Text Available The global financial crisis has caused the need for a stronger positioning of the European Court of Justice in the new model of economic governance in the European Union. The Jurisdiction of the European Court of Justice contributes in creating the optimal legal control mechanism of budget spending in the European monetary law and ensure maintenance of euro-zone fiscal framework. The role of the European Court of Justice in the EMU in earlier periods was secondary, but in times of crisis, it points to the growing need of Jurisdiction's extending in the field of monetary relations between member states and respect of convergence rules. Court's Jurisdiction in resolving of monetary and fiscal disputes is increasingly implemented in determining the legal nature of international agreements, whose ratio is economic stability, where the Judgments regarding complementarities of these legal documents with primary law provisions have the crucial impact on the future direction of national fiscal policies coordination. Although, the Court's Jurisdiction in this area is still underdeveloped and Judgments are often conditioned by pragmatism reasons, by development of credible macroeconomic dialogue between Court of Justice, European Central Bank and European Court of Auditors may establish conditions for fullfiling legal gaps in the performance of monetary and fiscal Jurisdiction of the Court.

  7. Educational Administration and Social Justice

    Science.gov (United States)

    Bates, Richard

    2006-01-01

    After observing that texts in educational administration have largely failed to address the problem of the justice and fairness of social and educational arrangements, this article goes on to examine the necessary relationships between ethical leadership, community and the notion of social justice. Such relationships are argued to be necessarily…

  8. 42 CFR 73.11 - Security.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  9. The Administration of Justice in al-Andalus and the Principles of Justice in Constitutional Democracies

    DEFF Research Database (Denmark)

    Abat Ninet, Antoni

    2018-01-01

    exanimating some of the distinctive elements of the Andalusian administration of justice and the role that specialized judges developed. The paper then exposes the meaning and scope of modern principles of justice, as prescribed by Article 10 of the Universal Declaration of Human Rights and in Article 14...

  10. “Judge-Only” Justice V. Collaborators: Introduction

    Directory of Open Access Journals (Sweden)

    Maria Cristina Reale

    2011-12-01

    Full Text Available Who and how many are the collaborators of judges? The answer may differ according to the perspective under which Justice is considered. In this introduction, and in the light of the papers submitted in the first session of the workshop, a distinction is proposed between “direct” and “indirect” collaborators of judges, according to the side of Justice observed. If Justice is confined simply to the classical function performed by courts, i.e. deciding cases according to the law, it seems quite obvious to remark that judges never act alone, since they normally benefit from the help of different kinds of assistants who, at different levels, help them in their daily work. But when paying attention to the facet of Justice concerning the concrete enforcement of decision, it becomes inevitable to take into account different categories of subjects involved in the “administration” of justice. Under this second perspective, justice is a matter for everyone: not only judges and prosecutors, but other professionals and bodies, including also Governments and other public institutions, since their decisions concerning, for example, human and material resources assigned to the judicial system have inevitably an impact on Justice considered as a public service. Lastly, the aptitude of the public opinion cannot be ignored: the degree of public satisfaction with the judicial system may influence the demand of justice as well as its material functioning. Accordingly, even common citizens could be seen as a very peculiar sort of “collaborators” of judges.

  11. Addressing elder abuse: the Waterloo restorative justice approach to elder abuse project.

    Science.gov (United States)

    Groh, Arlene; Linden, Rick

    2011-04-01

    The Community Care Access Centre (CCAC) of Waterloo Region, in partnership with a number of other social service agencies, designed and implemented a restorative justice model applicable to older adults who have been abused by an individual in a position of trust. The project was very successful in building partnerships, as many community agencies came together to deal with the problem of elder abuse. The program also raised the profile of elder abuse in the community. However, despite intensive efforts, referrals to the restorative justice program were quite low. Because of this, the program moved to a new organizational model, the Elder Abuse Response Team (EART), which has retained the guiding philosophy of restorative justice but has broadened the mandate. The team has evolved into a conflict management system that has multiple points of entry for cases and multiple options for dealing with elder abuse. The team has developed a broad range of community partners who can facilitate referrals to the EART and also can help to provide an individualized response to each case. The transition to the EART has been successful, and the number of referrals has increased significantly. Copyright © Taylor & Francis Group, LLC

  12. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  13. Environmental justice and healthy communities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    The environmental justice movement has come a long way since its birth a decade ago in rural and mostly African American Warren County, North Carolina. The selection of Warren County for a PCB landfill, they brought national attention to waste facility siting inequities and galvanized African American church and civil rights leaders` support for environmental justice. The demonstrations also put {open_quotes}environmental racism{close_quotes} on the map and challenged the myth that African Americans are not concerned about or involved in environmental issues. Grassroots groups, after decades of struggle, have grown to become the core of the multi-issue, multiracial, and multi-regional environmental justice movement. Diverse community-based groups have begun to organize and link their struggles to issues of civil and human rights, land rights and sovereignty, cultural survival , racial and social justice, and sustainable development. The impetus for getting environmental justice on the nations`s agenda has come from an alliance of grassroots activists, civil rights leaders, and a few academicians who questioned the foundation of the current environmental protection paradigm--where communities of color receive unequal protection. Whether urban ghettos and barrios, rural {open_quotes}poverty pockets,{close_quotes} Native American reservations, or communities in the Third World, grassroots groups are demanding an end to unjust and nonsustainable environmental and development policies.

  14. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  15. Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

    Directory of Open Access Journals (Sweden)

    Hongsong Chen

    2015-01-01

    Full Text Available Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system. Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system.

  16. Privileged Pursuits of Social Justice: Exploring Privileged College Students' Motivation for Engaging in Social Justice

    Science.gov (United States)

    Howard, Adam

    2011-01-01

    The author of this article explores the motivation factors that lead privileged college students to be involved in social justice efforts. The students participating in this study identified multiple reasons for their initial and continued involvement in social justice work, but all students identified three main sources of motivation: responding…

  17. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  18. AES Cardless Automatic Teller Machine (ATM) Biometric Security System Design Using FPGA Implementation

    Science.gov (United States)

    Ahmad, Nabihah; Rifen, A. Aminurdin M.; Helmy Abd Wahab, Mohd

    2016-11-01

    Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.

  19. Mãori Customary Law: A Relational Approach to Justice

    Directory of Open Access Journals (Sweden)

    Stephanie Vieille

    2012-03-01

    Full Text Available This research paper examines the philosophy of justice embodied in tikanga Mãori, the Mãori traditional mechanism and approach to doing justice. Based on several months of fieldwork in New Zealand, this study contends that the Mãori approach to justice adopts a holistic and relational lens, which requires that justice be seen in the context of relationships and crimes dealt with in terms of the relationships they have affected. As a result, justice must be carried out within the community and the process owned by community members. Further discussion draws attention to the response of Mãori communities to the New Zealand government’s attempt to accommodate their traditions and warns against the global tendency to render traditional Indigenous approaches to justice ahistorical through their representation as restorative justice mechanisms.

  20. 44 CFR 11.17 - Referral to Department of Justice.

    Science.gov (United States)

    2010-10-01

    ... Justice. 11.17 Section 11.17 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... Referral to Department of Justice. When Department of Justice approval or consultation is required under § 11.16, the referral or request shall be transmitted to the Department of Justice by the Chief Counsel...

  1. 28 CFR 0.85a - Criminal justice policy coordination.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Criminal justice policy coordination. 0.85a Section 0.85a Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Federal Bureau of Investigation § 0.85a Criminal justice policy coordination. The Federal Bureau...

  2. DATA WAREHOUSES SECURITY IMPLEMENTATION

    Directory of Open Access Journals (Sweden)

    Burtescu Emil

    2009-05-01

    Full Text Available Data warehouses were initially implemented and developed by the big firms and they were used for working out the managerial problems and for making decisions. Later on, because of the economic tendencies and of the technological progress, the data warehou

  3. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an o...

  4. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  5. Experiential Social Justice Judgment Processes

    NARCIS (Netherlands)

    Maas, M.

    2008-01-01

    Social justice can be thought of as an idea that exists within the minds of individuals and that concerns issues like what is right and wrong, what ought to be or not to be, and what is fair or unfair. This subjective quality of the justice judgment process makes it rather unpredictable how people

  6. Imagining Global Health with Justice: In Defense of the Right to Health.

    Science.gov (United States)

    Friedman, Eric A; Gostin, Lawrence O

    2015-12-01

    The singular message in Global Health Law is that we must strive to achieve global health with justice--improved population health, with a fairer distribution of benefits of good health. Global health entails ensuring the conditions of good health--public health, universal health coverage, and the social determinants of health--while justice requires closing today’s vast domestic and global health inequities. These conditions for good health should be incorporated into public policy, supplemented by specific actions to overcome barriers to equity. A new global health treaty grounded in the right to health and aimed at health equity--a Framework Convention on Global Health (FCGH)--stands out for its possibilities in helping to achieve global health with justice. This far-reaching legal instrument would establish minimum standards for universal health coverage and public health measures, with an accompanying national and international financing framework, require a constant focus on health equity, promote Health in All Policies and global governance for health, and advance the principles of good governance, including accountability. While achieving an FCGH is certainly ambitious, it is a struggle worth the efforts of us all. The treaty’s basis in the right to health, which has been agreed to by all governments, has powerful potential to form the foundation of global governance for health. From interpretations of UN treaty bodies to judgments of national courts, the right to health is now sufficiently articulated to serve this role, with the individual’s right to health best understood as a function of a social, political, and economic environment aimed at equity. However great the political challenge of securing state agreement to the FCGH, it is possible. States have joined other treaties with significant resource requirements and limitations on their sovereignty without significant reciprocal benefits from other states, while important state interests would

  7. Globalizing Social Justice Education: The Case of The Global Solidarity Network Study e-Broad Program

    Science.gov (United States)

    Harrison, Yvonne D.; Kostic, Kevin; Toton, Suzanne C.; Zurek, Jerome

    2010-01-01

    This paper documents the development, implementation, and evaluation of "The Global Solidarity Network Study e-Broad Program (GSNSeBP)", an online social justice educational program that is blended into an onsite academic course. This global electronic program, which was developed through a partnership between Catholic Relief Services (CRS) and…

  8. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  9. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  10. 5 CFR 177.108 - Referral to Department of Justice.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Referral to Department of Justice. 177... ADMINISTRATIVE CLAIMS UNDER THE FEDERAL TORT CLAIMS ACT § 177.108 Referral to Department of Justice. When Department of Justice approval or consultation is required, or the advice of the Department of Justice is...

  11. Strengthening the Security of ESA Ground Data Systems

    Science.gov (United States)

    Flentge, Felix; Eggleston, James; Garcia Mateos, Marc

    2013-08-01

    A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.

  12. Report on International Roundtable Meeting on Collection Security held at the British Library

    Directory of Open Access Journals (Sweden)

    Andy Stephens

    2008-09-01

    Full Text Available Anonymised report on some of the issues raised at an international roundtable on collection security of thirteen major research libraries and national libraries from Europe and North America. Recurring themes of case studies included: 1 perpetrator profiling; 2 relations with the criminal justice system; 3 systems; 4 looking out; 5 aftermath.

  13. Evidence-based treatment and supervision practices for co-occurring mental and substance use disorders in the criminal justice system.

    Science.gov (United States)

    Peters, Roger H; Young, M Scott; Rojas, Elizabeth C; Gorey, Claire M

    2017-07-01

    Over seven million persons in the United States are supervised by the criminal justice system, including many who have co-occurring mental and substance use disorders (CODs). This population is at high risk for recidivism and presents numerous challenges to those working in the justice system. To provide a contemporary review of the existing research and examine key issues and evidence-based treatment and supervision practices related to CODs in the justice system. We reviewed COD research involving offenders that has been conducted over the past 20 years and provide an analysis of key findings. Several empirically supported frameworks are available to guide services for offenders who have CODs, including Integrated Dual Disorders Treatment (IDDT), the Risk-Need-Responsivity (RNR) model, and Cognitive-Behavioral Therapy (CBT). Evidence-based services include integrated assessment that addresses both sets of disorders and the risk for criminal recidivism. Although several evidence-based COD interventions have been implemented at different points in the justice system, there remains a significant gap in services for offenders who have CODs. Existing program models include Crisis Intervention Teams (CIT), day reporting centers, specialized community supervision teams, pre- and post-booking diversion programs, and treatment-based courts (e.g., drug courts, mental health courts, COD dockets). Jail-based COD treatment programs provide stabilization of acute symptoms, medication consultation, and triage to community services, while longer-term prison COD programs feature Modified Therapeutic Communities (MTCs). Despite the availability of multiple evidence-based interventions that have been implemented across diverse justice system settings, these services are not sufficiently used to address the scope of treatment and supervision needs among offenders with CODs.

  14. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  15. 40 CFR 1620.8 - Referral to Department of Justice.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Referral to Department of Justice... ADMINISTRATIVE CLAIMS ARISING UNDER THE FEDERAL TORT CLAIMS ACT § 1620.8 Referral to Department of Justice. When Department of Justice approval or consultation is required, or the advice of the Department of Justice is...

  16. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  17. Building e-Justice in Continental Europe: The TéléRecours Experience in France

    Directory of Open Access Journals (Sweden)

    Marco Velicogna

    2013-01-01

    Full Text Available The growing number of studies on ICT innovation experiences in the justice sector report a few easy successes and, far more frequently, difficult (and long struggles to overcome multiple and often unexpected problems. Empirical analysis shows that these problems are the result of the complex interplay between technological, institutional, organizational and normative components of e-justice. What has been discovered is that the techno-institutional systems that are developed in the making of e-justice need not to be just technically functional, but also institutionally, organizationally and normatively compatible with the justice system. As the implementation of such systems breaks established practices and shared visions of what should be done, how and by whom, innovation requires the re-establishment of such agreements in the new situation. Cognitive, social and institutional features of the domain in which the innovation takes place thus play a paramount role in the innovation effort. This paper shows the interesting case of the development of an e-filing system, TéléRecours, in the French administrative justice sector. The system has been developed following a functional simplification strategy to cope with the technological, organizational and normative complexity of the endeavour. Such a strategy had been successfully adopted by several Northern European countries, but generally it had not been followed in Continental Europe, where much less successful attempts to create functional equivalents of paper-based procedures had been made. As the paper will attempt to explain, the functional simplification approach allowed the French justice administration to develop a functioning technology which is appreciated by the limited number of those who use it but that, due to its incapability of attaining institutional compatibility, is failing to exit the experimental phase.

  18. Social welfare and restorative justice

    OpenAIRE

    Fox, Darrell

    2009-01-01

    "This paper explores the links and connections between social work and restorative justice. After a brief description of social work, restorative justice and family group conferencing, I will explore some the complementary theoretical links and practice applications, critically examining the potential implications and opportunities for social work practitioners and academics in relation to practice." [author's abstract

  19. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  20. Psychometric properties of a four-component Norwegian Organizational Justice Scale.

    Science.gov (United States)

    Olsen, Olav Kjellevold; Myrseth, Helga; Eidhamar, Are; Hystad, Sigurd W

    2012-04-01

    Organizational justice has attracted attention as a predictor of employees' mental and physical health as well as commitment and work outcomes. The lack of a Norwegian translation of an organizational justice scale has precluded its use in Norway. Four dimensions of the organizational justice construct were examined in a Norwegian military context, including facet measures of distributional, interpersonal, and informational justice developed by Colquitt in 2001, in addition to procedural justice developed by Moorman in 1991. Confirmatory factor analyses supported a four-dimensional structure with good internal consistency. Follow-up analyses have suggested that the four dimensions were nested beneath a general, latent organizational justice factor. A positive relationship between organizational justice and self-sacrificial behavior was found, indicating satisfactory construct validity. The results demonstrate that the Norwegian Organizational Justice Scale is a reliable and construct-valid measure of organizational justice in a Norwegian setting.