WorldWideScience

Sample records for ngo security training

  1. African Security Challenges: Now and Over the Horizon - Voices from the NGO Community

    Science.gov (United States)

    2010-11-01

    economies will have a tendency to shift back to dependence on unskilled sectors such as mining, black -market or informal trading and international aid...PEPFAR Watch. Pepfarwatch.org. Rice , A. 2007. “An African Solution.” Nation, June 11. Voices from the NGO Community - 5.19 - African Security...oversight role in this area by parliaments, regardless of formal mandates, roles and responsibilities. In order to avoid the risk of cosmetic changes

  2. The promise of acceptance as an NGO security management approach.

    Science.gov (United States)

    Fast, Larissa; Freeman, Faith; O'Neill, Michael; Rowley, Elizabeth

    2015-04-01

    This paper explores three questions related to acceptance as a security management approach. Acceptance draws upon relationships with community members, authorities, belligerents and other stakeholders to provide consent for the presence and activities of a non-governmental organisation (NGO), thereby reducing threats from these actors. Little is documented about how NGOs gain and maintain acceptance, how they assess and monitor the presence and degree of acceptance, or how they determine whether acceptance is effective in a particular context. Based on field research conducted in April 2011 in Kenya, South Sudan and Uganda, we address each of these three issues and argue that acceptance must be actively sought as both a programme and a security management strategy. In the paper we delineate elements common to all three contexts as well as missed opportunities, which identify areas that NGOs can and should address as part of an acceptance approach. © 2015 The Author(s). Disasters © Overseas Development Institute, 2015.

  3. Sustainability of NGO capacity building in southern Africa: successes and opportunities.

    Science.gov (United States)

    Humphries, Debbie; Gomez, Ligia; Hartwig, Kari

    2011-01-01

    Despite an increase in organizational capacity building efforts by external organizations in low and middle income countries, the documentation of these efforts and their effects on health programs and systems remains limited. This paper reviews key frameworks for considering sustainability of capacity building and applies these frameworks to an evaluation of the sustainability of an AIDS non-governmental organization (NGO) capacity building initiative. From 2004-2007 Bristol-Myers Squibb Foundation's Secure the Future(TM) initiative in southern Africa funded a five country program, the NGO Training Institute (NGOTI), to build capacity of NGOs working to address HIV/AIDS. Lessons learned from this project include issues of ownership, the importance of integrating planning for sustainability within capacity-building projects, and the value of identifying primary capacity-building objectives in order to select sustainability strategies that are focused on maintaining program benefits. Sustainability for capacity building projects can be developed by discussing key issues early in the planning process with all primary stakeholders. Copyright © 2010 John Wiley & Sons, Ltd.

  4. Parallel NGO networks for HIV control: risks and opportunities for NGO contracting.

    Science.gov (United States)

    Zaidi, Shehla; Gul, Xaher; Nishtar, Noureen Aleem

    2012-12-27

    Policy measures for preventive and promotive services are increasingly reliant on contracting of NGOs. Contracting is a neo-liberal response relying on open market competition for service delivery tenders. In contracting of health services a common assumption is a monolithic NGO market. A case study of HIV control in Pakistan shows that in reality the NGO market comprises of parallel NGO networks having widely different service packages, approaches and agendas. These parallel networks had evolved over time due to vertical policy agendas. Contracting of NGOs for provision of HIV services was faced with uneven capacities and turf rivalries across both NGO networks. At the same time contracting helped NGO providers belonging to different clusters to move towards standardized service delivery for HIV prevention. Market based measures such as contracting need to be accompanied with wider policy measures that facilitate in bringing NGOs groups to a shared understanding of health issues and responses.

  5. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  6. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  7. NGO field workers in Pakistan

    Directory of Open Access Journals (Sweden)

    Muhammad Haroon SIDDIQUE

    2009-06-01

    Full Text Available NGOs came into the society in their present form after World War II and more precisely in 1960s. Before that also different forms of philanthropy existed. Like elsewhere in the world, in Pakistan also state and the market were the two sectors catering for different needs of the people. When foreign funding started coming into the poor countries, the channel of NGOs was considered more appropriate including the fact they had roots in the society and the benefit could reach the far flung areas. NGO field workers are the real actors in the NGOs’ activities but sadly the NGOs those raise the slogans of working for the destitute do not bother to facilitate the NGO field workers. Eventually the NGO field workers are facing problems of job insecurity, poor salary structure, unhealthy working environment and even harassment especially in case of women NGO field workers in Pakistan

  8. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  9. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  10. Game Based Cyber Security Training: are Serious Games suitable for cyber security training?

    Directory of Open Access Journals (Sweden)

    Maurice Hendrix

    2016-03-01

    Full Text Available Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security professionals. Thus cyber security seems especially well-suited to Serious Games. This paper investigates whether games can be effective cyber security training tools. The study is conducted by means of a structured literature review supplemented with a general web search.While there are early positive indications there is not yet enough evidence to draw any definite conclusions. There is a clear gap in target audience with almost all products and studies targeting the general public and very little attention given to IT professionals and managers. The products and studies also mostly work over a short period, while it is known that short-term interventions are not particularly effective at affecting behavioural change.

  11. Secure software development training course

    Directory of Open Access Journals (Sweden)

    Victor S. Gorbatov

    2017-06-01

    Full Text Available Information security is one of the most important criteria for the quality of developed software. To obtain a sufficient level of application security companies implement security process into software development life cycle. At this stage software companies encounter with deficit employees who able to solve problems of software design, implementation and application security. This article provides a description of the secure software development training course. Training course of application security is designed for co-education students of different IT-specializations.

  12. Impact of NGO training and support intervention on diarrhoea management practices in a rural community of Bangladesh: an uncontrolled, single-arm trial.

    Science.gov (United States)

    Rahman, Ahmed S; Islam, Mohammad Rafiqul; Koehlmoos, Tracey P; Raihan, Mohammad Jyoti; Hasan, Mohammad Mehedi; Ahmed, Tahmeed; Larson, Charles P

    2014-01-01

    The evolving Non-Governmental Organization (NGO) sector in Bangladesh provides health services directly, however some NGOs indirectly provide services by working with unlicensed providers. The primary objective of this study was to examine the impact of NGO training of unlicensed providers on diarrhoea management and the scale up of zinc treatment in rural populations. An uncontrolled, single-arm trial for a training and support intervention on diarrhoea outcomes was employed in a rural sub-district of Bangladesh during 2008. Two local NGOs and their catchment populations were chosen for the study. The intervention included training of unlicensed health care providers in the management of acute childhood diarrhoea, particularly emphasizing zinc treatment. In addition, community-based promotion of zinc treatment was carried out. Baseline and endline ecologic surveys were carried out in intervention and control villages to document changes in treatments received for diarrhoea in under-five children. Among surveyed household with an active or recent acute childhood diarrhoea episode, 69% sought help from a health provider. Among these, 62.8% visited an unlicensed private provider. At baseline, 23.9% vs. 22% of control and intervention group children with diarrhoea had received zinc of any type. At endline (6 months later) this had changed to 15.3% vs. 30.2%, respectively. The change in zinc coverage was significantly higher in the intervention villages (pmanagement of under-five children in rural Bangladesh households. ClinicalTrials.gov NCT02143921.

  13. Site security personnel training manual

    International Nuclear Information System (INIS)

    1978-10-01

    As required by 10 CFR Part 73, this training manual provides guidance to assist licensees in the development of security personnel training and qualifications programs. The information contained in the manual typifies the level and scope of training for personnel assigned to perform security related tasks and job duties associated with the protection of nuclear fuel cycle facilities and nuclear power reactors

  14. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  15. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  16. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  17. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  18. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  19. Creating strategic value and sustainable innovation through Business-NGO partnerships

    DEFF Research Database (Denmark)

    Aagaard, Annabeth; Lodsgård, Lise

    A growing body of research emphasizes the potentials of business-NGO partnerships (BNP’s) in developing sustainable innovation. The purpose of this study is to set up a model for defining these business-NGO partnerships and to investigate through a multiple cross-sectoral case-study how the diffe...... the different partnership types are managed to create strategic value through sustainable innovation. The findings reveal different practices, opportunities and challenges in creating SI across the different types of business-NGO partnerships.......A growing body of research emphasizes the potentials of business-NGO partnerships (BNP’s) in developing sustainable innovation. The purpose of this study is to set up a model for defining these business-NGO partnerships and to investigate through a multiple cross-sectoral case-study how...

  20. NGO's moving business : an analysis of contrasting strategies

    NARCIS (Netherlands)

    Huijstee, M.M. van; Glasbergen, P.

    2010-01-01

    In this article, we seek to advance understanding of nongovernmental organization (NGO) strategies with regard to influencing corporations. We study two contrasting NGO strategies (symbolic gain and symbolic damage), which simultaneously target the same corporation on the same issue. In

  1. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  2. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  3. Security personnel training using a computer-based game

    International Nuclear Information System (INIS)

    Ralph, J.; Bickner, L.

    1987-01-01

    Security personnel training is an integral part of a total physical security program, and is essential in enabling security personnel to perform their function effectively. Several training tools are currently available for use by security supervisors, including: textbook study, classroom instruction, and live simulations. However, due to shortcomings inherent in each of these tools, a need exists for the development of low-cost alternative training methods. This paper discusses one such alternative: a computer-based, game-type security training system. This system would be based on a personal computer with high-resolution graphics. Key features of this system include: a high degree of realism; flexibility in use and maintenance; high trainee motivation; and low cost

  4. Virtual-Reality training system for nuclear security

    International Nuclear Information System (INIS)

    Nonaka, Nobuyuki

    2012-01-01

    At the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency, the virtual reality (VR) training system is under development for providing a practical training environment to implement experience-oriented and interactive lessons on nuclear security for wide range of participants in human resource development assistance program mainly to Asian emerging nuclear-power countries. This system electrically recreates and visualizes nuclear facilities and training conditions in stereoscopic (3D) view on a large-scale display (CAVE system) as virtual reality training facility (VR facility) and it provides training participants with effective environments to learn installation and layout of security equipment in the facility testing and verifying visually the protection performances under various situations such as changes in day-night lighting and weather conditions, which may lead to practical exercise in the design and evaluation of the physical protection system. This paper introduces basic concept of the system and outline of training programs as well as featured aspects in using the VR technology for the nuclear security. (author)

  5. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  6. Women NGO's and Women Empowerment in Nigeria | Arum ...

    African Journals Online (AJOL)

    An investigation was carried out into the activities of various women non – governmental organizations (NGO) in Nigeria, as a veritable tool for women empowerment. The results of the research revealed that women NGO's have ventured into areas that were previously ignored by government such areas include female ...

  7. Creating value through CSR across company functions and NGO collaborations

    DEFF Research Database (Denmark)

    Lodsgård, Lise; Aagaard, Annabeth

    2017-01-01

    -NGO partnerships in the creation of sustainable innovation. The purpose of this study is to set up a model for defining these business-NGO partnerships and to investigate through a multiple cross-sectoral case-study how the different partnership types are managed to create strategic value through sustainable...... innovation. The findings reveal different practices, opportunities and challenges in creating sustainable innovation within the different types of business-NGO partnerships....

  8. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  9. IGO-NGO relations and HIV / AIDS: innovation or stalemate?

    Science.gov (United States)

    Jonsson, C; Soderholm, P

    1995-01-01

    This paper is concerned with the emergence of transnational cooperative structures in response to AIDS. Of chief concern are efforts to create and maintain links among and between intergovernmental organizations (IGO) in the UN system and the many heterogenous organizations usually included under the nongovernmental organization (NGO) label. After discussing the nature of the AIDS issue, the authors focus upon the various ways of framing the AIDS issue and the effort by the Global Program on AIDS to coordinate IGO and NGO activities. In closing, they identify lessons and insights of broader applicability emanating from the AIDS case. The paper discusses the nature of AIDS, AIDS as a medical problem, AIDS as a human rights problem, AIDS as a socioeconomic problem, forging IGO-NGO links, an international NGO forum, informal networking, NGOs and AIDS-related foreign assistance, representation, formal versus informal coordination, costs of network building, degree of organization, and expertise.

  10. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Center. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour training aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  11. On James Bond and the importance of NGO accountability

    NARCIS (Netherlands)

    Unerman, J.; O'Dwyer, B.

    2006-01-01

    Purpose - The purpose of this paper is to set out key issues in the academic study of non-governmental organisation (NGO) accountability, and to introduce papers appearing in this special issue on NGO accountability. Design/methodology/approach - This is a discussion paper exploring key issues

  12. Water security at local government level. What do people think it means in eThekwini?

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-12-01

    Full Text Available aspects Negative aspects Helping municipalities to help themselves Working together we can secure our water future Diverse - from national government to local community and NGO People should get involved in securing their own water, for example... secure future Scientists from government, NGO's academia Good water quality will ensure healthy people, environments and livelihoods for now and in the future Surely mines can't use good quality water More for some (forever?) A water supply...

  13. Co-Constructing Knowledge through NGO-Driven Circle Work

    DEFF Research Database (Denmark)

    Agerbæk, Jonas

    This presentation revolves around the question of what degree of control, if any, the users participating in NGO-driven development programs may have over their own development. Based on a multi-sited ethnography of NGO organizing and communication that I conducted in the period of 2010 to 2015......, and with a special analytical focus on the facilitating role of frontline NGO workers in rural East Africa, this presentation discusses enabling and constraining aspects of using circle work to co-produce knowledge in international development. More particularly I am focusing an approach to circle work called......, then participatory approaches such as REFLECT can be used not only to drive changes locally but also bolster the global participatory agenda of defining development practices and politics from the bottom and up...

  14. CEO Emoluments Determination of Non Governmental Organisations (NGO in Melaka: A Concept Paper

    Directory of Open Access Journals (Sweden)

    Hassan Masita

    2017-01-01

    Full Text Available Non-governmental organisations (NGOs are formed by mutual members in conducting activities to enhance social welfare of its members and public. The issue of governance of NGO arises when such social welfare fail to be achieved. Principal-agent theory explains that agent (elected CEO or key committees is responsible to carry out NGO activities aligned with principal’s interest (which described in NGO missions and goals. If CEO or key committees are being paid to govern NGO, emolument is primarily perceived as a signal to level of governance of NGO. This study objectively to determine factors that influence the decision of emoluments paid to elected CEO or key committees. Subsequently, this study is to analyze the level of governance of NGO. NGO registered in Melaka will be selected from Registrar of Societies (ROS in Melaka. Therefore, data for this study will be collected using data from ROS Melaka. 594 registered NGO that located in Melaka will be contacted and interviewed to complete structured questionnaire. Data collected will be analyzed using SPSS software to determine the factors that influences emolument decision. Subsequently, data will be analyzed to determine the level of governance of NGOs in Malaysia, which related to emoluments decision making.

  15. NGO-promoted microcredit programs and women's empowerment in rural Bangladesh: quantitative and qualitative evidence.

    Science.gov (United States)

    Amin, R; Becker, S; Bayes, A

    1998-01-01

    Nongovernmental organizations (NGOs) in rural Bangladesh are reaching out to poor women with collateral-free credit programs aimed at both alleviating poverty and increasing women's status. The present study investigated the hypothesis that participation in credit-related activities by NGO credit members leads to greater empowerment of credit members compared to nonmembers. The sample was comprised of 1164 loanees and 1200 nonloanees from the five NGO areas in Bangladesh and of 1200 nonloanees from non-program areas of rural Bangladesh with no significant NGO presence. NGO credit members had significantly higher scores on all three indices of female empowerment: inter-spouse consultation, autonomy, and authority. Moreover, nonmembers within NGO program areas had higher autonomy and authority scores than nonmembers within the comparison areas. Even after background variables were controlled in the multivariate analysis, NGO credit membership and residence in an NGO program area remained significantly and positively associated with both the autonomy and authority indices. Other variables that exerted a significant positive effect on women's empowerment were concrete or corrugated buildings, area of residence outside the southern or eastern regions, nonagricultural occupation, respondent's education, and age. In focus group discussions, NGO credit loanees reported that the program made them more confident, assertive, intelligent, self-reliant, and aware of their rights. NGO credit programs that target poor women are likely to produce substantial improvements in women's social and economic status, without the long delays associated with education or employment opportunities in the formal sector.

  16. Records and reputations : everyday politics of a Philippine Development NGO

    NARCIS (Netherlands)

    Hilhorst, D.

    2000-01-01

    This study looks into the working of policies, practices and accountability of NGOs. It is based on fieldwork with one development NGO in the Cordillera of the Philippines: the Cordillera Women NGO, or CWNGO (a pseudonym). Through this study I wanted to find out why certain groups of actors

  17. Current status of international training center for nuclear security and security issues in Korea

    International Nuclear Information System (INIS)

    Lee, Jong-UK; Sin, Byung Woo

    2013-01-01

    During the 2010 Nuclear Security Summit (NSS) President Lee declared that Korea will establish an international training center (ITC) for nuclear security near the Korea Institute of Nuclear Nonproliferation and Control (KINAC). It will be open to the world in 2014. The government's long term goal is to make the center a hub for education and training in the nuclear field in Asia. The ITC will accomplish this by establishing facilities for practical and realistic exercises through the use of a test bed and various other experiments. The center will also provide comprehensive educational programs for nuclear newcomers. Its main programs include: a well designed educational program, customized training courses, and on-the-job training. This paper will discuss the current status of the ITC and describe practical plans for solving current security issues in Korea. (authors)

  18. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions ...

  19. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  20. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  1. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, D.

    2005-01-01

    Full text: In support of United States Government (USG) and International Atomic Energy Agency (IAEA) nuclear security programs, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been developed and implemented as the basis for a performance-based methodology for the design and evaluation of physical protection systems against a design basis threat (DBT) for theft and sabotage of nuclear and/or radiological materials. Integrated systems must include technology, people, and the man-machine interface. A critical aspect of the human element is training on the systems-approach for all the stakeholders in nuclear security. Current training courses and workshops have been very beneficial but are still rather limited in scope. SNL has developed two primary international classes - the international training course on the physical protection of nuclear facilities and materials, and the design basis threat methodology workshop. SNL is also completing the development of three new courses that will be offered and presented in the near term. They are vital area identification methodology focused on nuclear power plants to aid in their protection against radiological sabotage, insider threat analysis methodology and protection schemes, and security foundations for competent authority and facility operator stakeholders who are not security professionals. In the long term, we envision a comprehensive nuclear security curriculum that spans policy and technology, regulators and operators, introductory and expert levels, classroom and laboratory/field, and local and offsite training options. This training curriculum will be developed in concert with a nuclear security series of guidance documents that is expected to be forthcoming from the IAEA. It is important to note that while appropriate implementation of systems based on such training and documentation can improve the risk reduction, such a

  2. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  3. HIV-related stigma and NGO-isation in India: a historico-empirical analysis.

    Science.gov (United States)

    Nambiar, Devaki

    2012-06-01

    In response to World Bank critiques in 2007, the Indian Ministry of Health and Family Welfare declared that human immunodeficiency virus (HIV)-related stigma was a barrier to the participation of non-governmental organisations (NGOs) in the implementation of HIV prevention targeted interventions. Taking a deeper view of HIV-related stigma as a historically inflected process of devaluation, this article details the history and transformation of NGO involvement in the HIV epidemic from 1986 through economic liberalisation in the 1990s up to the Second National AIDS Control Programme (NACP II 1999-2006). It additionally examines findings from interviews and participant observation of NGO workers (N = 24) from four targeted intervention NGOs in Delhi funded under NACP II. Analysis reveals that a second wave of HIV-related NGO involvement has mushroomed in the past two decades, affording NGO workers multiple pathways to credibility in the Indian response to the epidemic. Contradictions embedded in the overlap of these pathways produce stigma, reflecting 'adverse incorporation' of the NGO workers. Drawing upon noteworthy exceptions to this trend from the first wave of Indian HIV-related NGOs, the article calls for NGO participation as an explicitly political project of addressing the social inequalities that shape stigma as well as vulnerability to illness writ large. © 2011 The Author. Sociology of Health & Illness © 2011 Foundation for the Sociology of Health & Illness/Blackwell Publishing Ltd.

  4. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  5. Certified training for nuclear and radioactive source security management

    International Nuclear Information System (INIS)

    Johnson, Daniel

    2017-01-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. (author)

  6. Watchdogs of the Invisible Hand: NGO Monitoring, Corporate Social Responsibility, and Industry Equilibrium

    OpenAIRE

    Gani Aldashev; Michela Limardi; Thierry Verdier

    2013-01-01

    Globalization has been accompanied by rising pressure from advocacy non-governmental organizations (NGOs) on multinational firms to act in socially-responsible manner. We analyze how NGO pressure interacts with industry structure, using a simple model of NGO-firm interaction embedded in an industry environment with endogenous markups and entry. We characterize the effect of NGO pressure on the industry equilibrium (intensity of competition, market structure, and the share of socially responsi...

  7. Bedrijven en NGO's effectief in gesprek

    NARCIS (Netherlands)

    Nijhof, A.H.J.; van Pijkeren, Michel; Karsmakers, Pepijn; Jonker, Jan

    2005-01-01

    Voor duurzaam ondernemen is afstemming met non-gouvernementele organisatis (NGO’s) vaak onontbeerlijk. Maar door de verschillende wereldbeelden van deze partijen komt die afstemming moeizaam tot stand. Het via internet gratis te gebruiken Business NGO Interactie-instrument helpt om een duidelijk

  8. Observing extreme-mass-ratio inspirals with eLISA/NGO

    OpenAIRE

    Gair, Jonathan R; Porter, Edward K

    2012-01-01

    The extreme-mass-ratio inspirals (EMRIs) of stellar mass compact objects into massive black holes in the centres of galaxies are an important source of low-frequency gravitational waves for space-based detectors. We discuss the prospects for detecting these sources with the evolved Laser Interferometer Space Antenna (eLISA), recently proposed as an ESA mission candidate under the name NGO. We show that NGO could observe a few tens of EMRIs over its two year mission lifetime at redshifts z < 0...

  9. Cyber Security Training and Awareness Through Game Play

    National Research Council Canada - National Science Library

    Cone, Benjamin D; Thompson, Michael F; Irvine, Cynthia E; Nguyen, Thuy D

    2006-01-01

    Although many of the concepts included in staff cyber-security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization...

  10. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, Doris E.

    2005-01-01

    In support of the US Government and the International Atomic Energy Agency (IAEA) Nuclear Security Programmes, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been implemented as the basis for a performance methodology for the design and evaluation of Physical Protection Systems against a Design Basis Threat (DBT) for theft or sabotage of nuclear and/or radiological materials. Since integrated systems must include people as well as technology and the man-machine interface, a critical aspect of the human element is to train all stakeholders in nuclear security on the systems approach. Current training courses have been beneficial but are still limited in scope. SNL has developed two primary international courses and is completing development of three new courses that will be offered and presented in the near term. In the long-term, SNL envisions establishing a comprehensive nuclear security training curriculum that will be developed along with a series of forthcoming IAEA Nuclear Security Series guidance documents.

  11. Certified Training for Nuclear and Radioactive Source Security Management.

    Science.gov (United States)

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  12. Education and Training, and Knowledge Networks for Capacity-Building in Nuclear Security

    International Nuclear Information System (INIS)

    Mrabit, Khammar

    2014-01-01

    Conclusions: • Capacity Building (CB) is critical for States to establish and maintain effective and sustainable nuclear security regime. • IAEA is a worldwide platform promoting international cooperation for CB in nuclear security involving more than 160 countries and over 20 Organizations and Initiatives. • IAEA Division of Nuclear Security is ready to continue supporting States in developing their CB through: – Comprehensive Training Programme: more than 80 training events annually – International Nuclear Security Training and Support Centre Network (NSSC) – Comprehensive Education Programme – International Nuclear Security Network (INSEN)

  13. Tools & training for more secure software

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Just by fate of nature, software today is shipped out as “beta”, coming with vulnerabilities and weaknesses, which should already have been fixed at the programming stage. This presentation will show the consequences of suboptimal software, why good programming, thorough software design, and a proper software development process is imperative for the overall security of the Organization, and how a few simple tools and training are supposed to make CERN software more secure.

  14. The key drivers and challenges of Business-NGO partnerships in creating sustainable innovation

    DEFF Research Database (Denmark)

    Lodsgård, Lise; Aagaard, Annabeth

    2014-01-01

    A growing body of research emphasizes the potentials of business-NGO partnerships (BNP’s) in developing sustainable innovation. However the business-NGO literature is still at an early stage of development and shrouded in rhetoric with dominant articulations and anecdotes with a lack of empirical...... evidence. One of the main challenges of studying sustainable innovation relates to the fact that there is no established definition and mapping of drivers and internal and external challenges of these collaborations. The observations above and the gab in literature point to the theoretical and empirical...... relevance of exploring business-NGO partnerships in the creation of sustainable innovation. The findings and contributions of this theoretical study are an identification and modeling of six archetypes of Business-NGO partnerships in creating sustainable innovation. Through an exploration of characteristics...

  15. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  16. Maritime Safety and Security Challenges – 3D Simulation Based Training

    Directory of Open Access Journals (Sweden)

    Christoph Felsenstein

    2013-09-01

    Full Text Available Maritime Safety and Security on board ships very much depends on well trained crews. That is why training and exercising emergency response procedures as well as efficiency in reliable management are extremely necessary. On the other hand research as well as technological development in safety and security, tools and other kinds of technical and organizational systems contribute to further improvement and guarantee high levels of safety and security in maritime transportation. Simulation facilities are essential for both exercising and training but also for research and technological development. This paper introduces the innovative concept of a safety and security training simulator (SST7 and describes research work related to the implementation of training scenarios. Selected results of a case study will be presented. A shorter version of this paper was originally presented at the International Conference on “Marine Navigation and Safety of Sea Transportation” at Gdynia in June 2013.

  17. Economic Programmes and Poverty Reduction: NGO Experiences from Tamil Nadu

    OpenAIRE

    D Rajasekhar; P Shobana

    2000-01-01

    The impact of economic programmes of SHARE, an NGO from Tamil Nadu, on poverty reduction is analysed with the help of data from 84 hosueholds. The economic programmes contributed to savings and income increase, and enhanced the leadership qualities, awareness and knowledge. The member group is not significantly different from the comparison group in terms of control over income and decision-making. This suggests that the NGO economic programmes have limitation is bringing about non-economic b...

  18. Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.

    Science.gov (United States)

    de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian

    2017-02-01

    We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives. © 2016 Society for Risk Analysis.

  19. A Video Game for Cyber Security Training and Awareness

    National Research Council Canada - National Science Library

    Cone, Benjamin D; Irvine, Cynthia E; Thompson, Michael F; Nguyen, Thuy D

    2006-01-01

    Although many of the concepts included in cyber security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization...

  20. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  1. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  2. A review of video security training and assessment-systems and their applications

    International Nuclear Information System (INIS)

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups

  3. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  4. Maritime Safety and Security Challenges – 3D Simulation Based Training

    OpenAIRE

    Christoph Felsenstein; Knud Benedict; Michael Baldauf

    2013-01-01

    Maritime Safety and Security on board ships very much depends on well trained crews. That is why training and exercising emergency response procedures as well as efficiency in reliable management are extremely necessary. On the other hand research as well as technological development in safety and security, tools and other kinds of technical and organizational systems contribute to further improvement and guarantee high levels of safety and security in maritime transportation. Simulation faci...

  5. Development of a Virtual Reality (VR) system for nuclear security training

    International Nuclear Information System (INIS)

    Yamaguchi, Yasuo; Hanai, Tasuku

    2014-01-01

    The Integrated Support Center for Nuclear nonproliferation and Nuclear Security (ISCN) under the Japan Atomic Energy Agency (JAEA) began the development of Virtual Reality (VR) training system for the purpose of teaching trainees nuclear security. ISCN set up two VR training courses by 2013. One is for teaching a nuclear security system of nuclear plants. The VR training system allows trainees to have virtual experiences visiting a nuclear plant. Through these experiences, trainees are able to learn how physical protection systems work in the plant. The course focuses on learning fundamental knowledge and is suitable for trainees having little experiences in the field of nuclear security. The other is for teaching fundamental skills corresponding to a contingency plan in a Central Alarm Station (CAS) of nuclear power plant. Computers of the VR training system deploy an intrusion scenario in a virtual space. Trainees in a group sit in front of 3-D screens and play a role play game in a virtual CAS. Through the exercise, trainees are able to learn skills necessary to the contingency case of nuclear plants. In my presentation, I will introduce the two training courses, advantages and disadvantages of the VR training system, reactions of trainees and future plans. (author)

  6. Information Security – Guidance for Manually Completing the Information Security Awareness Training

    Science.gov (United States)

    The purpose of this guidance is to provide an alternative manual process for disseminating EPA Information Security Awareness Training (ISAT) materials and collecting results from EPA users who elect to complete the ISAT manually.

  7. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  8. Carboy Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors

  9. Cyber Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  10. Carboy Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, Daniel [Idaho National Laboratory, Idaho (United States)

    2012-03-15

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  11. Measuring the Effectiveness of Information Security Training: A Comparative Analysis of Computer-Based Training and Instructor-Based Training

    Science.gov (United States)

    Kim, Philip

    2010-01-01

    Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…

  12. Frantic Waiting: NGO Anti-Politics and "Timepass" for Young Syrian Refugees in Jordan

    Directory of Open Access Journals (Sweden)

    Ann-Christin Wagner

    2017-12-01

    Full Text Available Drawing on Sukarieh and Tannock's political economy of youth approach, this paper explores how Syrian refugee youth is constituted in protracted displacement in Jordan. It investigates a juvenile population often overlooked in Forced Migration Studies, disenfranchised rural Syrians, who fail to develop practices of youthfulness, yet in exile are subjected to alternative productions of youth by the aid sector. Depoliticized NGO youth programming overlooks Syrians' limited access to the labour market and higher education. While educational trainings aim to produce entrepreneurial and citizen refugees, they ultimately contribute to the creation of timepass and precarious lives. This research is grounded in fourteen months of ethnographic fieldwork with Syrian refugees in a border town in northern Jordan.

  13. Business-NGO interactions in a multi-stakeholder context

    NARCIS (Netherlands)

    Huijstee, M.M. van; Glasbergen, P.

    2010-01-01

    The main purpose of this paper is to contribute to our understanding of the conditions under which Business– nongovernmental organization (NGO) interactions lead to improvements in corporate social responsibility (CSR), by assessing the role that the stakeholder context of the firm plays in the

  14. Being Untaught: How NGO Field Workers Empower Parents of Children with Disabilities in Dadaab

    Directory of Open Access Journals (Sweden)

    Allyson Krupar

    2016-09-01

    Full Text Available Roughly 350,000 refugees, over 90% of them Somali, lived in five sprawling camps in Dadaab, Kenya in 2015. In the Dadaab refugee camps, families had unique experiences of disability, education, women’s roles, and involvement with International Non-Governmental Organization (INGO programming. INGOs provided a variety of basic services including education such as the program analyzed here for parents of children with disabilities. Many children with disabilities in the refugee camps faced social stigma and lacked access to education. This research draws on practices and literature in family literacy and parental involvement programming to explore how one NGO training sought to empower women learners to send their children with disabilities to school in Kambioos, the smallest and newest refugee camp in Dadaab. Using ethnographic methods, one training program involving parents and children was video-taped. The video was used as a cue to interview field workers about how the training empowered parents, particularly mothers. The study found that empowerment of women through training for parents of children with disabilities centered on parents’ interaction with formal schools and engagement in their communities.

  15. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  16. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  17. Thundercloud: Domain specific information security training for the smart grid

    Science.gov (United States)

    Stites, Joseph

    In this paper, we describe a cloud-based virtual smart grid test bed: ThunderCloud, which is intended to be used for domain-specific security training applicable to the smart grid environment. The test bed consists of virtual machines connected using a virtual internal network. ThunderCloud is remotely accessible, allowing students to undergo educational exercises online. We also describe a series of practical exercises that we have developed for providing the domain-specific training using ThunderCloud. The training exercises and attacks are designed to be realistic and to reflect known vulnerabilities and attacks reported in the smart grid environment. We were able to use ThunderCloud to offer practical domain-specific security training for smart grid environment to computer science students at little or no cost to the department and no risk to any real networks or systems.

  18. Nuclear Regulatory Systems in Africa: Improving Safety and Security Culture Through Education and Training

    International Nuclear Information System (INIS)

    Kazadi Kabuya, F.

    2016-01-01

    The purpose of this paper is to address the important issue of supporting safety and security culture through an educational and training course program designed both for regulatory staff and licensees. Enhancing the safety and security of nuclear facilities may involve assessing the overall effectiveness of the organization's safety culture. Safety Culture implies steps such as identifying and targeting areas requiring attention, putting emphasis on organizational strengths and weaknesses, human attitudes and behaviours that may positively impact an organization's safety culture, resulting in improving workplace safety and developing and maintaining a high level of awareness within these facilities. Following the terrorist attacks of September 11, 2001, international efforts were made towards achieving such goals. This was realized through meetings, summits and training courses events, with main aim to enhance security at facilities whose activities, if attacked, could impact public health and safety. During regulatory oversight inspections undertaken on some licensee's premises, violations of security requirements were identified. They mostly involved inadequate management oversight of security, lack of a questioning attitude, complacency and mostly inadequate training in both security and safety issues. Using training and education approach as a support to raise awareness on safety and security issues in the framework of improving safety and security culture, a tentative training program in nuclear and radiological safety was started in 2002 with the main aim of vulgarizing the regulatory framework. Real first needs for a training course program were identified among radiographers and radiologists with established working experience but with limited knowledge in radiation safety. In the field of industrial uses of radiation the triggering events for introducing and implementing a training program were: the loss of a radioactive source in a mining

  19. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  20. The Role of Non-Governmental Organization (NGO in Advocating the National Security Bill

    Directory of Open Access Journals (Sweden)

    Yusa Djuyandi

    2016-05-01

    Full Text Available The role run by a coalition of NGOs in advocating the National Security Bill aimed at encouraging the birth of national security policy to appropriate to the purpose of reform. However, until now the role of NGOs in advocating National Security Bill has not been able to encourage the authorities to reconstruct the draft of national security policy that is consistent with the objectives of security sector reform. This study is conducted to analyze the role of NGOs in the security sector reform in Indonesia, particularly through the advocacy of the National Security Bill. The method used in this study is a qualitative method. The result shows that NGOs, which are members of the KMSRK, have been running the multiple roles, such as: popularly involved in policy making, providing political education to the community, promoting or encouraging reform, and promoting the interests of the community. The study also suggests the existence of new findings of the role of NGOs, which is forming a coherent unity of interests.

  1. Good practices in provision of nuclear safeguards and security training courses at the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security

    Directory of Open Access Journals (Sweden)

    Kobayashi Naoki

    2017-01-01

    Full Text Available More than five years have passed since the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN was established under the Japan Atomic Energy Agency (JAEA in December 2010 and started its activities, in response to the commitment of Japan at the Nuclear Security Summit in Washington D.C.. The ISCN has been vigorously involved in capacity building assistance on nuclear nonproliferation (safeguards and nuclear security, mainly in the Asian region. It has provided 105 training courses to 2901 participants in total as of August 2016. The ISCN plays a major role in strengthening nuclear nonproliferation and nuclear security in the region, and this can be considered one of the great results of the Nuclear Security Summit process. The ISCN has cooperated with the US Department of Energy/National Nuclear Security Administration (DOE/NNSA and Sandia National Laboratories (SNL to establish a base of instructors, particularly for the Center's flagship two-week courses, the Regional Training Course on Physical Protection of Nuclear Material and Facilities (RTC on PP and the Regional Training Course on State Systems of Accounting for and Control of Nuclear Material (RTC on SSAC. Furthermore, the ISCN has provided training courses for experts in Japan, making the best use of the Center's knowledge and experience of organizing international courses. The ISCN has also started joint synchronized training with the Joint Research Centre of the European Commission (EC JRC on nuclear safeguards. This paper describes the good practices at the ISCN through its five years of activities, focusing on its progress in nuclear safeguards and nuclear security training.

  2. Education and training on nuclear security in Greece

    International Nuclear Information System (INIS)

    Pafilis, C. N.; Kamenopoulou, V.; Maltezos, A.; Seferlis, S.; Dimitriou, P.; Matikas, T. E.

    2009-01-01

    The Greek Atomic Energy Commission is the competent authority responsible for designing, implementing and supervising the radiation protection programme in Greece. According to its statutory law one of its main responsibilities is the provision of education and training to people involved in the national emergency response plan against nuclear and radiological threats. Due to the high requirements demanded for the safe conduct of the Athens 2004 Olympic Games, a nuclear security programme was established and the nuclear security infrastructure of the country was upgraded. Under this framework, GAEC provided training on radiation protection, prevention, detection, emergency preparedness and response to the personnel involved in the emergency plan. Since that time, the GAEC continues to organize seminars frequently addressed to the organizations involved in the emergency plan, in order to establish the sustainability of national operational capability on preparedness and response. (authors)

  3. The NGO/Military Relationship and Complex Contingencies: A Tool Review

    National Research Council Canada - National Science Library

    Wright, Stephanie

    2000-01-01

    .... This is a review of factors driving that involvement and, as a result, the tools that are developing for interagency coordination in cases of complex contingencies with a focus primarily on the NGO...

  4. Measuring the Return on Investment of Nuclear Security Training: The Case of the WINS Academy Professional Society

    International Nuclear Information System (INIS)

    Battistella, B.; Howsley, R.; Johnson, D.

    2015-01-01

    The challenges inherent in managing nuclear and radiological materials are complex and growing; ensuring that such materials remain secure requires competent management supported by ongoing training. The nuclear industry is increasingly becoming aware of the need for nuclear security: numerous dedicated training centres have been established worldwide and the IAEA holds approximately 60 international nuclear security training events annually. International training programmes have been conducted in various fields over decades but assessing their value and having the assurance that these training have had a sustainable impact remain difficult. In the field of nuclear security training, no assessment is being made of the degree to which the investment made is making a difference in building sustainable capacity and capability. This paper aims to discuss a methodology to assess the return on investment of nuclear security training. WINS has established a new professional society called the WINS Academy Alumni, for those individuals who have achieved certification through the WINS Academy. This platform proposes a structure, based on established competency frameworks, through which to measure the return on investment and performance improvement of nuclear security training. The objectives of the WINS Academy society are to stay engaged with certified Alumni, track their continued professional development progress, provide them with additional opportunities, and encourage their continued security competence through recertification. We envision that these certified practitioners will in turn promote certification and continual professional development among their peers to help build a network of security-trained professionals that will lead to meaningful and sustainable changes to security culture worldwide. In the long run (5–10 years), we envision that this group will be at the forefront of new professional requirements for nuclear security competence, with

  5. "Business Continuity and Information Security Maintenance" Masters’ Training Program

    OpenAIRE

    Miloslavskaya , Natalia; Senatorov , Mikhail; Tolstoy , Alexandr; Zapechnikov , Sergei

    2013-01-01

    Part 1: WISE 8; International audience; The experience of preparing for the "Business Continuity and Information Security Maintenance" (BC&ISM) Masters’ program implementation and realization at the "Information Security of Banking Systems" Department of the National Research Nuclear University MEPhI (NRNU MEPhI, Moscow, Russia) is presented. Justification of the educational direction choice for BC&ISM professionals is given. The model of IS Master being trained on this program is described. ...

  6. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  7. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    Science.gov (United States)

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  8. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  9. The promise and challenge of collaboration for CSR: Corporate- NGO engagement

    NARCIS (Netherlands)

    V. Chaudri (Vidhi)

    2015-01-01

    markdownabstractAgainst the backdrop of a new Indian legislation that makes CSR mandatory, this short piece unpacks the pragmatic and ideological tensions and challenges in achieving the promise of corporate-NGO engagement.

  10. Ngo accountability and sustainability issues in the changing global environment

    NARCIS (Netherlands)

    Unerman, J.; O'Dwyer, B.

    2010-01-01

    This article, based on a plenary lecture given at the First International Conference on Sustainable Management of Public and Not for Profit Organizations held at the University of Bologna, Forli Campus, Italy in July 2009, provides an overview of issues in non-governmental organization (NGO)

  11. Entrepreneurship training in Ghana

    DEFF Research Database (Denmark)

    Schmidt, Leila Kæmsgaard Pagh

    2017-01-01

    is that adding a focus on means, attitude and enterprising behaviour skills will increase the value of entrepreneurship training. The study is a design-based research undertaken in collaboration with the local NGO, Youth Empowerment for Life (YEfL). It builds on relevant theory and involves qualitative...... and quantitative research in Northern Ghana. The study reveals the five most crucial constraints for young entrepreneurs in Northern Ghana. Moreover, it proposes a new entrepreneurship model and training manual....

  12. Type III methyltransferase M.NgoAX from Neisseria gonorrhoeae FA1090 regulates biofilm formation and human cell invasion

    Directory of Open Access Journals (Sweden)

    Agnieszka eKwiatek

    2015-12-01

    Full Text Available Neisseria gonorrhoeae is the etiological factor of the sexually transmitted gonorrhea disease that may lead, under specific conditions, to systemic infections. The gonococcal genome encodes many Restriction Modification (RM systems, which main biological role is to defend the pathogen from potentially harmful foreign DNA. However, RM systems seem also to be involved in several other functions. In this study, we examined the effect of inactivation the N. gonorrhoeae FA1090 ngo0545 gene encoding M.NgoAX methyltransferase on the global gene expression, biofilm formation, interactions with human epithelial host cells and overall bacterial growth. Expression microarrays showed at least a two-fold deregulation of a total of 121 genes in the NgoAX knock-out mutant compared to the wt strain under standard grow conditions. As determined by the assay with crystal violet, the NgoAX knock-out strain formed a slightly larger biofilm biomass per cell than the wt strain (OD570/600 = 13.8  2.24 and 9.35  2.06, respectively. SCLM observations showed that the biofilm formed by the gonococcal ngo0545 gene mutant is more relaxed and dispersed than the one formed by the wt strain. Thickness of the biofilm formed by both strains was 48.3 (14.9 µm for the mutant and 28.6 (4.0 µm for the wt. This more relaxed feature of the biofilm in respect to adhesion and bacterial interactions seems advantageous for pathogenesis of the NgoAX-deficient gonococci at the stage of human epithelial cell invasion. Indeed, the overall adhesion of mutant bacterial cells to human cells was lower than adhesion of the wt gonococci (adhesion index = 0.672 ( 0.2 and 2.15 ( 1.53, respectively; yet, a higher number of mutant than wt bacteria were found inside the Hec-1-B epithelial cells (invasion index = 3.38 ( 0.93  105 for mutant and 4.67 ( 3.09  104 for the wt strain. These results indicate that NgoAX-deficient cells have lower ability to attach to human cells

  13. Small NGO Schools in India: Implications for Access and Innovation

    Science.gov (United States)

    Blum, Nicole

    2009-01-01

    In addition to the proliferation of private, fee-paying schools in India, non-governmental organisations (NGOs) play an important role in providing educational services, especially in un-served and under-served communities. This paper uses qualitative research to critically examine the nature and potential of NGO provision of primary schooling in…

  14. The incentive effects of missions - Evidence from experiments with NGO employees and students

    DEFF Research Database (Denmark)

    Gerhards, Leonie

    2015-01-01

    This paper studies the incentive effects of an organization׳s ‘mission’ on the effort provision of agents. Across treatments, I exogenously vary how much the agents׳ and their projects׳ missions match. In the first study, NGO employees are assigned the role of agents in an online, one-shot, princ......This paper studies the incentive effects of an organization׳s ‘mission’ on the effort provision of agents. Across treatments, I exogenously vary how much the agents׳ and their projects׳ missions match. In the first study, NGO employees are assigned the role of agents in an online, one......-agent game with random matching, I do not find a motivational effect of missions, unlike in my first two studies....

  15. NGO Management Case Study: Civitas Foundation for Civil Society

    Directory of Open Access Journals (Sweden)

    Ramona BERE

    2000-06-01

    Full Text Available As idealistic as it may sound, the truth is that NGOs act to make the world a better place. They often do that by taking action in areas where the government fails to succeed or does not do a very good job. In this context I would like to present a very special NGO: CIVITAS Foundation for Civil Society, evaluating its governance and services.

  16. NGO management and health care financing approaches in the Eastern Democratic Republic of the Congo.

    Science.gov (United States)

    Dijkzeul, D; Lynch, C A

    2006-01-01

    The role of cost-sharing in health care is a crucial, yet contentious issue. In conflict situations, cost-sharing becomes even more controversial as health and other institutions are failing. In such situations, NGOs manage health programmes which aim to aid populations in crisis and improve or at least sustain a deteriorating health system. This study looks at the issue of cost-sharing in the wider context of utilization rates and management approaches of three NGOs in the chronic, high-mortality crisis of the eastern DRC. Approaches to increase access to health care were found to exist, yet cost-recovery, even on the basis of maximum utilization rates, would only partially sustain the health system in the eastern DRC. Factors external to the direct management of NGO health programs, such as the wider economic and security situation, local management structures, and international donor policies, need to be taken into account for establishing more integrated management and financing approaches.

  17. In acceptance we trust? Conceptualising acceptance as a viable approach to NGO security management.

    Science.gov (United States)

    Fast, Larissa A; Freeman, C Faith; O'Neill, Michael; Rowley, Elizabeth

    2013-04-01

    This paper documents current understanding of acceptance as a security management approach and explores issues and challenges non-governmental organisations (NGOs) confront when implementing an acceptance approach to security management. It argues that the failure of organisations to systematise and clearly articulate acceptance as a distinct security management approach and a lack of organisational policies and procedures concerning acceptance hinder its efficacy as a security management approach. The paper identifies key and cross-cutting components of acceptance that are critical to its effective implementation in order to advance a comprehensive and systematic concept of acceptance. The key components of acceptance illustrate how organisational and staff functions affect positively or negatively an organisation's acceptance, and include: an organisation's principles and mission, communications, negotiation, programming, relationships and networks, stakeholder and context analysis, staffing, and image. The paper contends that acceptance is linked not only to good programming, but also to overall organisational management and structures. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.

  18. Measuring the Effect of Using Simulated Security Awareness Training and Testing on Members of Virtual Communities of Practice

    Directory of Open Access Journals (Sweden)

    Craig L. Tidwell

    2010-12-01

    Full Text Available Information security (Infosec has become a major challenge for all private and public organizations. The protecting of proprietary and secret data and the proper awareness of what is entailed in protecting this data is necessary in all organizations. How does simulation and training influence virtual communities of practice information security awareness over time and with a variety of security scenarios. Can members of a virtual community be significantly changed in how they respond to routine security processes and attempts to breach security or violate the security policy of their organization? How does deterrence play a role in this prevention and education? A study is planned that will train and test users of a virtual community of practice over a 3 month period of time, via a web interface, and using simulated events, to see if the planned security awareness training will be effective in changing their responses to the events and further testing.

  19. Case of ex-Yugoslavia and struggle for its interpretation: Case of NGO's in Serbia

    Directory of Open Access Journals (Sweden)

    Radojičić Mirjana

    2008-01-01

    Full Text Available In this article author considers the case of disintegration/decomposition of Yugoslavia from the angle of struggle for interpretation that several NGO's have fought on Serbian public scene. Clue of whole matter is in a kind of politic of interpretation engaged by these NGO's as for the near Yugoslav past. After the brief summary of this kind of interpretation author asks for key tenets of alleged "new politicity" that have been formed as a model of civil activity in Serbia during the last decade. In concluding part of the article geopolitical dimension of that phenomena is pointed out as well as importance of its precise legislation needed to restrict this kind of practice considerably.

  20. Transnational NGO, Development and Global Governance

    DEFF Research Database (Denmark)

    Li, Xing; Farah, Abdulkadir Osman

    2014-01-01

    Empirically recent global developments have shown that transnational NGOs operate in between civic mobilization dimension to organizational and institutional dimensions depending on the particular contextual event. NGOs have demonstrated capabilities to move between civic mobilization grass root...... orientations and top down organizational platforms (Stachursky, 2013). In this regard the state remains significant in the process of NGO activities. Although globalizations in the form of mobility and technological advancement diminished state monopoly, NGOs continue to struggle overcoming national priorities...... not just for acquiring funds but also for engaging in an increasingly complex but still state centric world. We can nonetheless agree on the point that Transnational NGOs as non-state actors and have the capacity to simultaneously operate local, global and transnational. On one way these are competent...

  1. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Science.gov (United States)

    2013-06-14

    ... million for training projects. Similarly, under the Intercity Bus Security Grant Program (IBSGP), which... related to the security elements in Table 1, per employee? (Please indicate whether this includes travel... on the size and scope of the exercise, including the phases of an exercise, travel expenses for...

  2. Social housing, multi-ethnic environments and the training of social educators: combined anthropological and educational perspectives

    Directory of Open Access Journals (Sweden)

    Flavia Virgilio

    2014-10-01

    Full Text Available The paper presents part of a broader project that explores the role played by informal citizenship learning in social housing urban environments (SHe and the related educational challenges for social educators, NGO practitioners and also researchers. In this article, in particular, I focus on issues related with social educators’ and NGO practitioners’ professional training. The aim of the paper, in this perspective, is to offer some introductory theoretical and methodological remarks for the training of NGO practitioners working in SHe. The basis for this reflection is the idea of informal learning (Schugurensky, 2000, the concepts of learning for reflexive citizenship and learning for active citizenship (Johnston, 2005 and anthropology of citizenship (Ong, 1999, 2003. In the research process, we have intersected instruments and methodologies coming from the different fields of anthropology and educational sciences. Our hypothesis consists in considering the possibility that exploring the professional field of social educators in SHe with an ethnographic approach could contribute to improve reflexive attitudes of social educators and shape their educational attitudes.

  3. ATTAINING UNIVERSAL ACCESS: PUBLIC-PRIVATE PARTNERSHIP AND BUSINESS-NGO PARTNERSHIP

    OpenAIRE

    Chowdhury, Shyamal K.

    2002-01-01

    This paper evaluates two alternative mechanisms, Public-Private Partnership in Peru and Business-NGO Partnership in Bangladesh, that provide rural people with access to telecommunications. The two mechanisms that are examined here are considered as two best practices in the provision of rural telecommunications in the context of developing countries. Under two geographically distinct market segments, rural market characterized by low per-subscriber revenue and urban market characterized by hi...

  4. Snow Leopard cloud : A multi-national education training and experimentation cloud and its security challenges

    NARCIS (Netherlands)

    Cayirci, E.; Rong, C.; Huiskamp, W.; Verkoelen, C.A.A.

    2009-01-01

    Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and

  5. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    Science.gov (United States)

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  6. A collaborative virtual environment for training of security agents in nuclear emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Fernandes, Sara I.; Passos, Cláudio A.; Silva, Marcio H.; Carvalho, Paulo Victor R.; Legey, Ana Paula; Mol, Antonio Carlos; Machado, Daniel M.; Cotelli, André; Rocha, Tiago L., E-mail: mol@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil). Departamento de Realidade Virtual

    2017-07-01

    In face the recently observed security menaces related to terrorist actions and natural disasters, there is a need for a major qualification and training of the agents responsible for avoid any problems regarding to abnormal conditions. In the conventional training procedures, however, field simulations are associated to logistical and operational constraints regarded to the execution of the tests which can expose the user to risk. On the other hand, the use of virtual simulations provides an alternative to such limitations besides of promote the qualifying of professionals with a great reliability. For this reason, this paper proposes the development of a collaborative virtual environment that will be used to prepare the security agents on identifying individuals suspected of carrying radioactive materials. The development of the virtual environment consisted on modeling using Autodesk 3ds Max, where the scene itself and the scene objects were modeled besides the terrain creation and basic features programming using the Game Engine Unity 3D. In the Engine Game were included radiation detectors and avatars. The security agents were able to communicate to each other by means of auxiliary external tools like a headset software that makes possible the communication, coordination and cooperation required for an effective collaboration. Experimental tests of the virtual simulations were performed with the participation of CNEN radiological protection agents and collaborators. The tests have shown that the proposed method can contribute to improve the training results of the basic collaborative skills required for a CNEN agent in an emergency situation without the need to expose him to any kind of risk. In face of that, we hope that it can contribute to minimize the demand for qualified security professionals. (author)

  7. A collaborative virtual environment for training of security agents in nuclear emergencies

    International Nuclear Information System (INIS)

    Fernandes, Sara I.; Passos, Cláudio A.; Silva, Marcio H.; Carvalho, Paulo Victor R.; Legey, Ana Paula; Mol, Antonio Carlos; Machado, Daniel M.; Cotelli, André; Rocha, Tiago L.

    2017-01-01

    In face the recently observed security menaces related to terrorist actions and natural disasters, there is a need for a major qualification and training of the agents responsible for avoid any problems regarding to abnormal conditions. In the conventional training procedures, however, field simulations are associated to logistical and operational constraints regarded to the execution of the tests which can expose the user to risk. On the other hand, the use of virtual simulations provides an alternative to such limitations besides of promote the qualifying of professionals with a great reliability. For this reason, this paper proposes the development of a collaborative virtual environment that will be used to prepare the security agents on identifying individuals suspected of carrying radioactive materials. The development of the virtual environment consisted on modeling using Autodesk 3ds Max, where the scene itself and the scene objects were modeled besides the terrain creation and basic features programming using the Game Engine Unity 3D. In the Engine Game were included radiation detectors and avatars. The security agents were able to communicate to each other by means of auxiliary external tools like a headset software that makes possible the communication, coordination and cooperation required for an effective collaboration. Experimental tests of the virtual simulations were performed with the participation of CNEN radiological protection agents and collaborators. The tests have shown that the proposed method can contribute to improve the training results of the basic collaborative skills required for a CNEN agent in an emergency situation without the need to expose him to any kind of risk. In face of that, we hope that it can contribute to minimize the demand for qualified security professionals. (author)

  8. In the Name of ‘Poor and Marginalised’? Politics of NGO Activism with Dalit Women in Rural North India

    OpenAIRE

    Govinda, Radhika

    2009-01-01

    Assertion by the Dalits or ex-untouchables is one of the most signifi cant developments in contemporary India. Dalit women have actively participated in Dalit movements and in women’s and development NGOs activism. However, their voices and perspectives are said to have been marginalised by movements and NGOs alike. This article unpacks the complexities, contradictions and challenges that are produced, reproduced and subverted in NGO activism with Dalit women by examining a women’s NGO and its...

  9. NGO participation in international lawmaking and democratic legitimacy : The debate and its future

    NARCIS (Netherlands)

    Beijerman, M.

    2016-01-01

    Over the last few decades, scholars - mainly in the field of law and international relations - have argued that NGOs are indispensable in making international law more democratically legitimate. This study refers to this as the ‘NGO democratic legitimacy thesis’. The thesis is presented as a

  10. Social Entrepreneurship Practice in Malaysia - The Case of Social NGO

    OpenAIRE

    Fakhrul Anwar Zainol; Wan Norhayate Wan Daud; Zulhamri Abdullah; Mohd Rafi Yaacob

    2014-01-01

    This study scrutinises innovation, proactiveness and risk taking as indicators of effectiveness of a social NGO within the context of urban poverty, using Global Outreach as a case. This study begins with the introduction of brief background of organisation. Later,innovation, proactiveness and risk taking which are the gists of the content of the paper are discussed at length. As far as this case study is concerned, Global Outreach is effective enough. Capitasing on amended model of Grameen’s...

  11. Effectiveness of an NGO primary health care programme in rural Bangladesh: evidence from the management information system.

    Science.gov (United States)

    Mercer, Alec; Khan, Mobarak Hossain; Daulatuzzaman, Muhammad; Reid, Joanna

    2004-07-01

    This paper considers evidence of the effectiveness of a non-governmental organization (NGO) primary health care programme in rural Bangladesh. It is based on data from the programme's management information system reported by 27 partner NGOs from 1996-2002. The data indicate relatively high coverage has been achieved for reproductive and child health services, as well as lower infant and child mortality. On the basis of a crude indicator of socio-economic status, the programme is poverty-focused. There is good service coverage among the poorest one-third and others, and the infant and child mortality differential has been eliminated over recent years. A rapid decline in infant mortality among the poorest from 1999-2002 reflects a reduction in neonatal mortality of about 50%. Allowing for some under-reporting and possible misclassification of deaths to the stillbirths category, neonatal mortality is relatively low in the NGO areas. The lower child and maternal mortality for the NGO areas combined, compared with estimates for Bangladesh in recent years, may at least in part be due to high coverage of reproductive and child health services. Other development programmes implemented by many of the NGOs could also have contributed. Despite the limited resources available, and the lower infant and child mortality already achieved, there appears to be scope for further prevention of deaths, particularly those due to birth asphyxia, acute respiratory infection, diarrhoeal disease and accidents. Maternal mortality in the NGO areas was lower in 2000-02 than the most recent estimate for Bangladesh. Further reduction is likely to depend on improved access to qualified community midwives and essential obstetric care at government referral facilities.

  12. The comparative advantage of NGO (non-governmental organizations) in the health sector--a look at the evidence.

    Science.gov (United States)

    Matthias, A R; Green, A T

    1994-01-01

    Attention being given to the development of an appropriate public/private mix in health-care delivery should not exclude the role of non-governmental organizations (NGOs). There is a widely accepted thesis of NGO comparative advantage over government, but evidence to support this thesis is generally more anecdotal than analytical. This paper considers evidence available in the literature and from field research in southern Africa, especially with regard to efficiency, innovation and reaching grass-roots communities. The paper concludes that the comparative advantage of the NGO sector needs to be analysed in relation to both the private for-profit sector and the public sector.

  13. The discursive construction of identity through interaction on social media in a Chinese NGO

    NARCIS (Netherlands)

    Peverelli, P.J.; Ruelle, O.

    2017-01-01

    This article investigates the discursive construction of social identity in a Chinese NGO involved in ongoing online discussions on WeChat, China’s fastest growing social networking site. While there is extensive literature on various aspects of online interaction, the analysis of identity

  14. Challenges of NGO-to-state Referral in the Delivery of HIV Prevention Programs in Ukraine Supported by the Global Fund

    Directory of Open Access Journals (Sweden)

    Svetlana McGill

    2016-03-01

    Conclusions: Gaps in linking HIV patients to the HIV care continuum have been identified as a potentially problematic issue in delivery of HIV prevention services by GF funded NGOs. With an anticipated GF exit from Ukraine, the lack of clearly defined NGO-to-state referrals of HIV patients complicates the transition of NGO run services into state funding. Further steps to improve referral systems are necessary to ensure a smooth transition and enable Ukraine to fight its HIV epidemic effectively.

  15. BRAC in Afghanistan: Building South-South Partnerships in Teacher Training

    Science.gov (United States)

    Islam, Mir Nazmul; Anwar, Arif

    2012-01-01

    Training paraprofessionals such as teachers is one of many significant challenges facing Afghanistan's educational system. This case study focuses on the innovations offered in that regard by BRAC, a large NGO based in Bangladesh that brought its many years of development experience to Afghanistan in 2002 and established itself there as the…

  16. Delivering high-level food industry skills for future food security through Advanced Training Partnerships

    OpenAIRE

    Frazier, Richard A.

    2013-01-01

    The UK Biotechnology and Biological Sciences Research Council’s Advanced Training Partnerships initiative represents a significant investment in the provision of high-level skills for the UK food industry sector to address global food security from farm to fork. This paper summarises the background, aims and scope of the Advanced Training Partnerships, their development so far, and offers a view on future directions and evaluation of impact.

  17. Business-NGO collaboration in a conflict setting: partnership activities in the Democratic Republic of Congo

    NARCIS (Netherlands)

    Kolk, A.; Lenfant, F.

    2012-01-01

    Although business-NGO (nongovernmental organizations) partnerships have received much attention in recent years, insights have been obtained only from research in "stable" contexts, not from conflict-ridden countries where such collaboration may be even more crucial in building trust and capacity

  18. Information Technology: DoD FY 2004 Implementation of the Federal Information Security Management Act for Information Technology Training and Awareness

    National Research Council Canada - National Science Library

    Davis, Sarah; Mitchell, James; Palmer, Kevin A; Riggins, Liyang; Truex, Kathryn; Williams, Zac

    2004-01-01

    ...). Specifically, we evaluated whether all agency employees, including contractors, received IT security training and awareness and whether employees with significant IT security responsibilities...

  19. Business-NGO Collaboration in a Conflict Setting: Partnership Activities in the Democratic Republic of Congo

    NARCIS (Netherlands)

    A. Kolk (Ans); F. Lenfant (François)

    2012-01-01

    textabstractWhile business-NGO partnerships have received much attention in recent years, insights have been obtained from research in ‘stable’ contexts, not from conflict-ridden countries where such collaboration may be even more crucial in building trust and capacity and in addressing

  20. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  1. Risks, Health and Environment. NGO Background document for the Third Ministerial Conference on Environment and Health and parallel Healthy Planet Forum, London 16- 18 juni 1999.

    NARCIS (Netherlands)

    Butter, Maureen E.

    1999-01-01

    NGO Background document for the Third Ministerial Conference on Environment and Health and parallel Healthy Planet Forum, London 16-18 June 1999. This reader was composed as a background document to the 3rd WHO/ UNECE Ministerial Conference on Environment and Health and parallel NGO Conference in

  2. New Rules of the Game: Youth Training in Brazil and Finland as Examples of the New Global Network Governance

    Science.gov (United States)

    Brunila, Kristiina; Ryynänen, Sanna

    2017-01-01

    Young people labelled "disadvantaged" or "at risk of social exclusion" are increasingly directed into publicly funded or NGO-based, partly privately financed projects in order to secure their desired integration into society through work or further education. In this article, we carry out a comparative analysis of youth…

  3. Entrepreneurship training in Ghana

    DEFF Research Database (Denmark)

    Schmidt, Leila Kæmsgaard Pagh

    2017-01-01

    Abstract Due to the very high youth unemployment in Northern Ghana, there is a huge need for enterprising skills among young people. A natural focus in recent years has therefore been entrepreneurship training, focusing on training young Ghanaians to start-up businesses. Unfortunately, the young...... is that adding a focus on the young entrepreneur’s means, attitude and enterprising behaviour skills to the existing focus on starting up businesses, will increase the value of the Entrepreneurship training and support the overcoming of constraints. The paper build on a design-based research project...... in collaboration with the local NGO YEfL. Based on relevant theory, a qualitative field research in Northern Ghana and a quantitative baseline survey a new Entrepreneurship Model has been designed. The new model was tested in autumn 2016 at three Entrepreneurship boot camps in Northern Ghana. The study has...

  4. ANALISIS SOUND GOVERNANCE: SIKAP PEMERINTAH DAERAH TERHADAP KETERLIBATAN NGO DALAM PEMBERDAYAAN MASYARAKAT PESISIR

    OpenAIRE

    Safitri, Dian Prima; Edison, Edison; Kurniasih, Fitri

    2018-01-01

    Penelitian ini mengkaji persoalan respond pemerintah daerah khususnya terkait sikap pemerintah dalam dimensi Sound Governance terhadap Non Government Organization (NGO) yang sangat aktif melakukan pemberdayaan masyarakat pesisir. Kegiatan pemberdayan tersebut dilakukan di Kabupaten Bintan Kepulauan Riau (Kepri). Setting penelitian ini di lokasi Kampung Wisata Panglong di Desa Berakit Kabupaten Bintan. Penelitian ini menerapkan jenis penelitian deskriptif dengan pendekatan kualitatif. Data dip...

  5. Human Trafficking and Education: A Qualitative Case Study of Two NGO Programs in Thailand

    Science.gov (United States)

    Spires, Robert Weber

    2012-01-01

    In this qualitative, ethnographic case study, I examine two Thai NGO shelters/schools working with human trafficking survivors and at-risk populations of children ages 5-18. The two NGOs had a residential component, meaning that children live at the shelter, and an educational component, meaning that children are taught academic and vocational…

  6. NGO Partnerships in Using Ecotourism for Conservation: Systematic Review and Meta-Analysis.

    Directory of Open Access Journals (Sweden)

    Tania P Romero-Brito

    Full Text Available We analyse 214 cases worldwide where non-governmental organisations (NGOs use ecotourism for conservation. Other stakeholders in these initiatives include local communities, the private sector, and government agencies. Stakeholder relationships determine NGO roles and project management structures and governance. We classified cases into 10 structural categories based on the initiating stakeholder and the NGO role, and used these categories to analyze geographic patterns and success factors. Most of the 214 cases are community-based (~170; 79%; most are in developing countries (190; 89%; and most are in protected areas (196; 91%. Frequencies of structural categories differ between continents. More cases in Latin America and Asia are initiated by NGOs and local communities, and more in Africa by the private sector. Case-study authors used a range of economic, socio-cultural and environmental criteria to judge whether projects were successful. At global scale, we found no significant association between project success and the involvement of private tourism entrepreneurs. Projects involving either local or international NGOs had higher success rates than those that involved both simultaneously. Future research could adopt political ecology approaches to examine: the factors that lead NGOs to adopt ecotourism enterprises; their internal decision-making processes and strategies; their interactions with the stakeholders involved; and their conservation goals and outcomes.

  7. NGO Partnerships in Using Ecotourism for Conservation: Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Romero-Brito, Tania P; Buckley, Ralf C; Byrne, Jason

    2016-01-01

    We analyse 214 cases worldwide where non-governmental organisations (NGOs) use ecotourism for conservation. Other stakeholders in these initiatives include local communities, the private sector, and government agencies. Stakeholder relationships determine NGO roles and project management structures and governance. We classified cases into 10 structural categories based on the initiating stakeholder and the NGO role, and used these categories to analyze geographic patterns and success factors. Most of the 214 cases are community-based (~170; 79%); most are in developing countries (190; 89%); and most are in protected areas (196; 91%). Frequencies of structural categories differ between continents. More cases in Latin America and Asia are initiated by NGOs and local communities, and more in Africa by the private sector. Case-study authors used a range of economic, socio-cultural and environmental criteria to judge whether projects were successful. At global scale, we found no significant association between project success and the involvement of private tourism entrepreneurs. Projects involving either local or international NGOs had higher success rates than those that involved both simultaneously. Future research could adopt political ecology approaches to examine: the factors that lead NGOs to adopt ecotourism enterprises; their internal decision-making processes and strategies; their interactions with the stakeholders involved; and their conservation goals and outcomes.

  8. BERN railway station: security assessment under a speed increase of trains from 30 to 40 km h-1

    International Nuclear Information System (INIS)

    Ribaux, C.; Capron, M.

    1994-01-01

    In the frame of the ''Rail 2000'' project, the CFF (Swiss Railways) would like to increase the speed of trains arriving in Bern station. On the eastern head, this speed would be raised from 30 to 40kmh -1 . The superstructure is formed by a three-storey building which rests on 450mm diameter steel columns.The aim of the present study was: - to determine the security loss of the station superstructure under a train impact on the columns at 40kmh -1 rather than at 30kmh -1 - to propose measures in order to get at 40kmh -1 the same security as at 30kmh -1 Four approaches are dealt with: (1)on the base of accidents statistics and of their cost; (2)review of possible dynamical approaches; (3)equivalent static load (from European railways codes); (4)energy in which, starting from its initial speed, the train loses energy on different obstacles (ballast, platform, protection devices, walls, train's own deformation) and the remaining energy is compared with the maximum energy that the column can dissipate by deformation.The conclusions are presented as a 'security plan' and the proposed protection costs are evaluated. ((orig.))

  9. Introducing operations research into management and policy practices of a non-governmental organization (NGO): a partnership between an Indian leprosy NGO and an international academic institution.

    Science.gov (United States)

    Porter, J D H; Ogden, J A; Rao, P V Ranganadha; Rao, V Prabhakar; Rajesh, D; Buskade, R A; Soutar, D

    2004-03-01

    This paper reports on a partnership between LEPRA, a non-governmental organization (NGO), and the London School of Hygiene and Tropical Medicine (LSHTM) to explore the feasibility and appropriateness of incorporating operations research into the management and decision-making of a leprosy NGO. A pilot study in Orissa was used to determine the advantages and disadvantages of introducing operations research to assist in decision-making and programme implementation within the organization. The results highlight the difficulty and complexity of the process, but point to several important themes: partnership, changing perspectives, use of time and priority-setting, identification of gaps in systems, and building institutional and personal capabilities. The results of the study provide support to encourage NGOs to become actively involved in research. Because of their work and service to local communities, NGOs have the opportunity to collect information about the perceptions, resources and constraints of individuals, families and the communities themselves in accessing appropriate care. Their proximity to communities gives them a feeling of responsibility for ensuring that this information is translated to the district, national and ultimately international level. This will help to ensure the creation of appropriate infectious disease control policies that support the needs of patients. 'Outside' academic institutions can help NGOs to facilitate this up-stream flow of information from the local to the national and international level, to help to ensure that international disease control policies are appropriately serving local communities.

  10. Training of Family Planning Counselors in Jordan: Developing Human Resources through Adult Education

    Science.gov (United States)

    Jabbar, Sinaria Kamil Abdel

    2012-01-01

    This paper briefly describes the development and status of family planning (FP) services, including counseling, in the Hashemite Kingdom of Jordan. It also reports extensively on a FP counseling training course organized by the Jordanian Association for Family Planning and Protection (JAFPP) which is a local NGO. A field survey approach, with…

  11. Internet-driven changes in environmental NGO action

    Directory of Open Access Journals (Sweden)

    Pedro Pereira Neto

    2008-12-01

    Full Text Available Information and Communication Technologies, considered both as a technological resource and as a social technology, play an important role in the shaping of existing social relations and in the creation of new modes of interaction and social organization (AA. VV., 2000. However, traditional approaches of political action frequently misstate just how politically active citizens are by underrating changes occurred in the realm of political mediation (Norris, 2002, p. 2; Epstein, 1991, p. 230. The changes in the organizational and action repertoires go hand in hand with the specificities of each NGO's cultural interpretative devices, which are influenced by technological change (Zald, 1996, p. 266-270. On the other hand, frames are also subject to internal debate, a process in which ICTs also take part (Webster, 2001, p. 7. Hence, this paper focuses on clarifying the ways in which NGOs have their structure and action repertoires changed by the use of ICTs.

  12. How to calculate the annual costs of NGO-implemented programmes to support orphans and vulnerable children: a six-step approach.

    Science.gov (United States)

    Larson, Bruce A; Wambua, Nancy

    2011-12-19

    Information on the costs of implementing programmes designed to provide support of orphans and vulnerable children (OVC) in sub-Saharan Africa and elsewhere is increasingly being requested by donors for programme evaluation purposes. To date, little information exists to document the costs and structure of costs of OVC programmes as actually implemented "on the ground" by local non-governmental organizations (NGOs). This analysis provides a practical, six-step approach that NGOs can incorporate into routine operations to evaluate their costs of implementing their OVC programmes annually. This approach is applied to the Community-Based Care for Orphans and Vulnerable Children (CBCO) Program implemented by BIDII (a Kenyan NGO) in Eastern Province of Kenya. The costing methodology involves the following six steps: accessing and organizing the NGO's annual financial report into logical sub-categories; reorganizing the sub-categories into input cost categories to create a financial cost profile; estimating the annual equivalent payment for programme equipment; documenting donations to the NGO for programme implementation; including a portion of NGO organizational costs not attributed to specific programmes; and including the results of Steps 3-5 into an expanded cost profile. Detailed results are provided for the CBCO programme. This paper shows through a concrete example how NGOs implementing OVC programmes (and other public health programmes) can organize themselves for data collection and documentation prospectively during the implementation of their OVC programmes so that costing analyses become routine practice to inform programme implementation rather than a painful and flawed retrospective activity. Such information is required if the costs and outcomes achieved by OVC programmes will ever be clearly documented and compared across OVC programmes and other types of programmes (prevention, treatment, etc.).

  13. PRINCIPLE OF THE ELECTRONIC EDUCATIONAL ENVIRONMENT SECURITY IN THE PROFESSIONAL TRAINING OF UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Valery G. Tylets

    2017-12-01

    Full Text Available The article considers the problem of professional training of students in e-learning environment in accordance with the principle of security. The authors offer the essay technology of multiple difficulty levels. In the article the description of each level of technology proves its conformity to the positions of principle of security. The main methods of measurement performance were made by expert assessment and subjective scaling. The analysis of results of approbation of essay technology of multiple difficulty levels in the experimental sample showed an increase of objective and subjective indicators. Positive methodological and personal effects of the introduction of technology into the process of university education were identified, corresponding to the positions of principle of security. Methodical recommendations of application of technology were formulated.

  14. Brief communication: economic comparison of opportunistic infection management with antiretroviral treatment in people living with HIV/AIDS presenting at an NGO clinic in Bangalore, India.

    Science.gov (United States)

    John, K R; Rajagopalan, Nirmala; Madhuri, K V

    2006-11-01

    Highly active antiretroviral treatment (HAART) usage in India is escalating. With the government of India launching the free HAART rollout as part of the "3 by 5" initiative, many people living with HIV/AIDS (PLHA) have been able to gain access to HAART medications. Currently, the national HAART centers are located in a few district hospitals (in the high- and medium-prevalence states) and have very stringent criteria for enrolling PLHA. Patients who do not fit these criteria or patients who are too ill to undergo the prolonged wait at the government hospitals avail themselves of nongovernment organization (NGO) services in order to take HAART medications. In addition, the government program has not yet started providing second-line HAART (protease inhibitors). Hence, even with the free HAART rollout, NGOs with the expertise to provide HAART continue to look for funding opportunities and other innovative ways of making HAART available to PLHA. Currently, no study from Indian NGOs has compared the direct and indirect costs of solely managing opportunistic infections (OIs) vs HAART. Compare direct medical costs (DMC) and nonmedical costs (NMC) with 2005 values accrued by the NGO and PLHA, respectively, for either HAART or exclusive OI management. Retrospective case study comparison. Low-cost community care and support center--Freedom Foundation (NGO, Bangalore, south India). Retrospective analysis data on PLHA accessing treatment at Freedom Foundation between January 1, 2003 and January 1, 2005. The HAART arm included case records of PLHA who initiated HAART at the center, had frequent follow-up, and were between 18 and 55 years of age. The OI arm included records of PLHA who were also frequently followed up, who were in the same age range, who had CD4+ cell counts NGO and Rs 1155/- paid by PLHA. Median DMC and NMC pppy in the HAART arm were Rs 1425/- paid by NGO and Rs 17,606/- paid by PLHA. Good health at no increased expenditure justifies providing PLHA with HAART

  15. NGO 'S ROLE IN SOCIAL ECONOMY

    Directory of Open Access Journals (Sweden)

    MARIANA CLAUDIA MUNGIU-PUPĂZAN

    2016-06-01

    Full Text Available This paper aims to be a company - NGO relationship analysis and points out that a company can find its strategic stakeholders among non - profit organizations. In world practice social responsibility is spoken frequently about the collaboration between the business sector and non - profit. At the international level, NGOs are one of the most important dialogue partners of the business sector. In Romania, NGOs are often seen as something always require organizations that sponsor or if you want to do exercises image. On the one hand NGOs are wondering what to do to see their sponsored projects, although according to modern definitions, sponsorship does not really have much in common with corporate social. On the other hand companies are trying to answer the question "who are strategic stakeholders". Their proactive involvement of the stakeholders helps to cultivate relationships that can provide a competitive advantage especially in times of crisis. Like any business, stakeholder engagement has a number of constraints: requires time, financial and human resources dedicated to rely on a continuous process of monitoring and may require. Moreover, if not properly planned and implemented, could damage relations between the company and stakeholders

  16. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  17. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  18. Health hazards and medical treatment of volunteers aged 18-30 years working in international social projects of non-governmental organizations (NGO).

    Science.gov (United States)

    Küpper, T; Rieke, B; Neppach, K; Morrison, A; Martin, J

    2014-01-01

    The specific health risk profile and diversity of treatments sought by young volunteers participating in international social projects should differ from those of their older colleagues. In the absence of any data to identify whether this was correct, a retrospective analysis was performed using a standardized questionnaire. Questions included what diseases occurred, and details of the frequency and types of treatment sought during their stay - (e.g. self-treatment, medical/dental intervention, or local healer). The 153 participants were aged 18-30 years and worked in a non-governmental organization for >6 months. The participants were: 53% female, mean age 20 years, and mean duration of stay was 11.2 months. Their NGO placement abroad was in Latin America 65.4%, 14.4% in Africa, and 9.8% in Asia. 83% of the young volunteers had received some advice regarding travel medicine before their departure. However, they suffered from more injuries compared to private travellers, and febrile infections were more common when compared to older studies. 21.2% suffered from dental problems and 50% of them sought medical treatment. This study highlights a previously unreported higher risk profile of specific health problems occurring in young NGO volunteers, including some potentially life-threatening diagnoses that differed from their older colleagues and normal travellers. It is recommended that young volunteers should receive age specific, comprehensive pre-departure training in health and safety, first aid, and management of common health problems. A medical check-up upon returning home should be mandatory. The provision of a basic first aid kit to each volunteer before departure is also recommended. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. New approach to training in citizen security from the social link university–community

    Directory of Open Access Journals (Sweden)

    Edicta Gregoria González-Leal

    2017-11-01

    Full Text Available This article bases the need for a new conception in the training approaches in the training institutions of citizen security professionals, due to the present changes in the 21st century at the state, regional and local level, where the protagonism of the same lies In responding to the new challenges, trends and challenges present in society. It also analyzes the significance of the university's social connection with the communities, so that the praxis of the students goes beyond the understanding of the problems to the search for possible alternatives for their solution, with the consequent social transformations that this bring along.

  20. Security training symposium: Meeting the challenge: Firearms and explosives recognition and detection

    Energy Technology Data Exchange (ETDEWEB)

    1990-09-01

    These conference proceedings have been prepared in support of the US Nuclear Regulatory Commission's Security Training Symposium on Meeting the Challenge -- Firearms and Explosives Recognition and Detection,'' November 28 through 30, 1989, in Bethesda, Maryland. This document contains the edited transcripts of the guest speakers. It also contains some of the speakers' formal papers that were distributed and some of the slides that were shown at the symposium (Appendix A).

  1. Cost recovery of NGO primary health care facilities: a case study in Bangladesh

    OpenAIRE

    Alam, Khurshid; Ahmed, Shakil

    2010-01-01

    Abstract Background Little is known about the cost recovery of primary health care facilities in Bangladesh. This study estimated the cost recovery of a primary health care facility run by Building Resources Across Community (BRAC), a large NGO in Bangladesh, for the period of July 2004 - June 2005. This health facility is one of the seven upgraded BRAC facilities providing emergency obstetric care and is typical of the government and private primary health care facilities in Bangladesh. Give...

  2. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  3. Security, Dignity, Caring Relationships, and Meaningful Work: Needs Motivating Participation in a Job-Training Program

    Science.gov (United States)

    Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David

    2008-01-01

    Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…

  4. Using virtual reality in the training of security staff and evaluation of physical protection barriers in nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Augusto, Silas C.; Mol, Antonio C.A.; Mol, Pedro C.; Sales, Douglas S. [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Universidade do Estado do Rio de Janeiro (UERJ), RJ (Brazil)], e-mail: silas@ien.gov.br, e-mail: mol@ien.gov.br, e-mail: pedro98@gmail.com, e-mail: dsales@ien.gov.br

    2009-07-01

    The physical security of facilities containing radioactive objects, an already important matter, now has a new aggravating factor: the existence of groups intending to obtain radioactive materials for the purpose of intentionally induce radioactive contamination incidents, as for example the explosion of dirty bombs in populated regions, damaging both people and environment. In this context, the physical security of such facilities must be reinforced so to reduce the possibilities of such incidents. This paper presents a adapted game engine used as a virtual reality system, enabling the modeling and simulation of scenarios of nuclear facilities containing radioactive objects. In these scenarios, the physical protection barriers, as fences and walls, are simulated along with vigilance screens. Using a computer network, several users can participate simultaneously in the simulation, being represented by avatars. Users can play the roles of both invaders and security staff. The invaders have as objective to surpass the facility's physical protection barriers to steal radioactive objects and flee. The security staff have as objective to prevent and stop the theft of radioactive objects from the facility. The system can be used to analysis simulated scenarios and train vigilance/security staff. A test scenario was already developed and used, and the preliminary tests had satisfactory results, as they enabled the evaluation of the physical protection barriers of the virtual facility, and the training of those who participated in the simulations in the functions of a security staff. (author)

  5. Using virtual reality in the training of security staff and evaluation of physical protection barriers in nuclear facilities

    International Nuclear Information System (INIS)

    Augusto, Silas C.; Mol, Antonio C.A.; Mol, Pedro C.; Sales, Douglas S.

    2009-01-01

    The physical security of facilities containing radioactive objects, an already important matter, now has a new aggravating factor: the existence of groups intending to obtain radioactive materials for the purpose of intentionally induce radioactive contamination incidents, as for example the explosion of dirty bombs in populated regions, damaging both people and environment. In this context, the physical security of such facilities must be reinforced so to reduce the possibilities of such incidents. This paper presents a adapted game engine used as a virtual reality system, enabling the modeling and simulation of scenarios of nuclear facilities containing radioactive objects. In these scenarios, the physical protection barriers, as fences and walls, are simulated along with vigilance screens. Using a computer network, several users can participate simultaneously in the simulation, being represented by avatars. Users can play the roles of both invaders and security staff. The invaders have as objective to surpass the facility's physical protection barriers to steal radioactive objects and flee. The security staff have as objective to prevent and stop the theft of radioactive objects from the facility. The system can be used to analysis simulated scenarios and train vigilance/security staff. A test scenario was already developed and used, and the preliminary tests had satisfactory results, as they enabled the evaluation of the physical protection barriers of the virtual facility, and the training of those who participated in the simulations in the functions of a security staff. (author)

  6. Performance Analysis of Cyber Security Awareness Delivery Methods

    Science.gov (United States)

    Abawajy, Jemal; Kim, Tai-Hoon

    In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.

  7. Romania- New Tobacco control law from an NGO perspective

    Directory of Open Access Journals (Sweden)

    Mihaltan Florin Dumitru

    2016-03-01

    Full Text Available In our presentation we are evaluating the progress of the tobacco control in Romania looking form the point of view on NGO in the last 26 years. We are signalling the progressive steps towards policy and an advocacy from our perspective and the consequences of our success. The final result is reflected in the new law starting in force on March 17th, 2016, a real advance in our fight. We are identifying in the same time the new challenging problems after launching the new law. Probably the biggest gain of our fight is the extensive partnership with all the factors, our efforts to bring together in a big family as the coalition “Romania Respira” politicians, advocates, judges, economists, young’s and also the new way found to encourage all: mass media, politicians, journalists, public to support us.

  8. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  9. 32 CFR 728.44 - Members of security assistance training programs, foreign military sales, and their ITO...

    Science.gov (United States)

    2010-07-01

    ..., foreign military sales, and their ITO authorized dependents. 728.44 Section 728.44 National Defense... § 728.44 Members of security assistance training programs, foreign military sales, and their ITO... patient is an ITO authorized dependent), grade or rate, country of origin, diagnosis, type of elective...

  10. Effort of NGO in Promoting Comprehensive Sexuality Education to Improve Quality of Life among Local and Refugee Communities

    Science.gov (United States)

    Yeo, Kee Jiar; Lee, Shih Hui; Handayani, Lina

    2018-01-01

    Federation of Reproductive Health Association, Malaysia (FRHAM) is a pioneer Non-governmental Organization (NGO) in disseminating the knowledge and services of sexual reproductive health in Malaysia. A qualitative case study research design was employed to explore the roles of FRHAM in promoting Comprehensive Sexuality Education (CSE) for the…

  11. Low-Frequency Gravitational-Wave Science with eLISA/ NGO

    Science.gov (United States)

    Amaro-Seoane, Pau; Aoudia, Sofiane; Babak, Stanislav; Binetruy, Pierre; Berti, Emanuele; Bohe, Alejandro; Caprini, Chiara; Colpi, Monica; Cornish, Neil J.; Danzmann, Karsten; hide

    2011-01-01

    We review the expected science performance of the New Gravitational-Wave Observatory (NGO, a.k.a. eLISA), a mission under study by the European Space Agency for launch in the early 2020s. eLISA will survey the low-frequency gravitational-wave sky (from 0.1 mHz to 1 Hz), detecting and characterizing a broad variety of systems and events throughout the Universe, including the coalescences of massive black holes brought together by galaxy mergers; the inspirals of stellar-mass black holes and compact stars into central galactic black holes; several millions of ultracompact binaries, both detached and mass transferring, in the Galaxy; and possibly unforeseen sources such as the relic gravitational-wave radiation from the early Universe. eLISA's high signal-to-noise measurements will provide new insight into the structure and history of the Universe, and they will test general relativity in its strong-field dynamical regime.

  12. Effect of elastic and plastic tensile mechanical loading on the magnetic properties of NGO electrical steel

    Energy Technology Data Exchange (ETDEWEB)

    Leuning, N., E-mail: nora.leuning@iem.rwth-aachen.de [Institute of Electrical Machines, RWTH Aachen University, D-52062 Aachen (Germany); Steentjes, S. [Institute of Electrical Machines, RWTH Aachen University, D-52062 Aachen (Germany); Schulte, M.; Bleck, W. [Steel Institute, RWTH Aachen University, D-52072 Aachen (Germany); Hameyer, K. [Institute of Electrical Machines, RWTH Aachen University, D-52062 Aachen (Germany)

    2016-11-01

    The magnetic properties of non-grain-oriented (NGO) electrical steels are highly susceptible to mechanical stresses, i.e., residual, external or thermal ones. For rotating electrical machines, mechanical stresses are inevitable and originate from different sources, e.g., material processing, machine manufacturing and operating conditions. The efficiency and specific losses are largely altered by different mechanical stress states. In this paper the effect of tensile stresses and plastic deformations on the magnetic properties of a 2.9 wt% Si electrical steel are studied. Particular attention is paid to the effect of magnetic anisotropy, i.e., the influence of the direction of applied mechanical stress with respect to the rolling direction. Due to mechanical stress, the induced anisotropy has to be evaluated as it is related to the stress-dependent magnetostriction constant and the grain alignment. - Highlights: • A detailed look at magnetic anisotropy of FeSi NGO electrical steel. • Study of magnetic behavior under elastic as well as plastic tensile stresses. • Correlation of magnetic behavior with microscopic deformation mechanisms. • Discussion of detrimental and beneficial effects of external stresses. • Loss separation at different polarizations and frequencies under increasing stress.

  13. Effect of elastic and plastic tensile mechanical loading on the magnetic properties of NGO electrical steel

    International Nuclear Information System (INIS)

    Leuning, N.; Steentjes, S.; Schulte, M.; Bleck, W.; Hameyer, K.

    2016-01-01

    The magnetic properties of non-grain-oriented (NGO) electrical steels are highly susceptible to mechanical stresses, i.e., residual, external or thermal ones. For rotating electrical machines, mechanical stresses are inevitable and originate from different sources, e.g., material processing, machine manufacturing and operating conditions. The efficiency and specific losses are largely altered by different mechanical stress states. In this paper the effect of tensile stresses and plastic deformations on the magnetic properties of a 2.9 wt% Si electrical steel are studied. Particular attention is paid to the effect of magnetic anisotropy, i.e., the influence of the direction of applied mechanical stress with respect to the rolling direction. Due to mechanical stress, the induced anisotropy has to be evaluated as it is related to the stress-dependent magnetostriction constant and the grain alignment. - Highlights: • A detailed look at magnetic anisotropy of FeSi NGO electrical steel. • Study of magnetic behavior under elastic as well as plastic tensile stresses. • Correlation of magnetic behavior with microscopic deformation mechanisms. • Discussion of detrimental and beneficial effects of external stresses. • Loss separation at different polarizations and frequencies under increasing stress.

  14. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    2016-01-01

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institute (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the

  15. Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users

    Science.gov (United States)

    Edwards, Keith

    2015-01-01

    Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…

  16. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  17. "You are the vanguard of Cairo". NGO / Youth Fora.

    Science.gov (United States)

    Clinton, H R

    1999-01-01

    Everyone has a role to play in realizing the goals of the International Conference on Population and Development (ICPD) program of action. The concerns of young people presented at the Youth Forum will hopefully be kept at the forefront of Cairo+5 deliberations. Innumerable women around the world in every country struggle daily to care for and education their children, to gain greater control over their lives, and to contribute to the progress being made in their communities and countries. The nongovernmental organization (NGO) and youth fora of the Cairo+5 proceedings demonstrate that the discussions about global challenges and their solutions are no longer being held and decided upon solely by government officials and policy-makers behind closed doors. Rather, NGOs have finally taken their proper place in the debate, to help ordinary citizens be heard on the critical issues which affect their lives. Efforts must also continue to be made to reach out to young people, as well as fathers, sons, and husbands.

  18. Indicators of NGO Security in Afghanistan

    Science.gov (United States)

    2004-12-14

    2-IA thought the development focus should concentrate on education, infrastructure development of roads and water wells, and microcredit programs...development, wells for water, and microcredit . 2-IA mentioned other variables that might account for some difference in violence against NGO’s. Those

  19. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ...-2011-0268] RIN 3150-AJ07 Facility Security Clearance and Safeguarding of National Security Information..., Classified National Security Information. The rule would allow licensees flexibility in determining the means... licensee security education and training programs and enhances the protection of classified information...

  20. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's manual for the training of SNM guards. Covered are: self-defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  1. The implementation of the situational control concept of information security in automated training systems

    Directory of Open Access Journals (Sweden)

    A. M. Chernih

    2016-01-01

    Full Text Available The main approaches to ensuring security of information in the automated training systems are considered, need of application of situational management of security of information for the automated training systems is proved, the mathematical model and a problem definition of situational control is offered, the technique of situational control of security of information is developed.The purpose of the study. The aim of the study is to base the application of situational control of information security by subsystem of the control and protection of information in automated learning systems and to develop implementation methods of the situational control concept.Materials and methods. It is assumed that the automated learning system is a fragment of a larger information system that contains several information paths, each of them treats different information in the protection degree from information, containing constituting state secrets, to open access information.It is considered that the technical methods, measures and means of information protection in automated learning systems implement less than half (30% functions of subsystems of control and protection information. The main part of the functions of this subsystem are organizational measures to protect information. It is obvious that the task of ensuring the security of information in automated learning systems associated with the adoption of decisions on rational selection and proper combination of technical methods and institutional arrangements. Conditions of practical application of automated learning systems change over time and transform the situation of such a decision, and this leads to the use of situational control methods.When situational control is implementing, task of the protection of information in automated learning system is solved by the subsystem control and protection of information by distributing the processes ensuring the security of information and resources of

  2. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  4. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  5. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  6. Generational, Cultural, and Linguistic Integration for Literacy Learning and Teaching in Uganda: Pedagogical Possibilities, Challenges, and Lessons from One NGO

    Science.gov (United States)

    Ngaka, Willy; Graham, Ross; Masaazi, Fred Masagazi; Anyandru, Elly Moses

    2016-01-01

    This qualitative case study focuses on a volunteer-led local NGO in Uganda to examine how integrating generations, cultures, and languages is enhancing literacy learning to help ethnically and linguistically diverse rural communities survive in the prevailing globally competitive neoliberal environment. Immersing the study in the social practices…

  7. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  8. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  9. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  10. Technical Training Skills Needs of Youth for Sustainable Job Security in Rice Production in Ebonyi State, Nigeria

    Science.gov (United States)

    Edu, Chukwuma Nwofe; Ogba, Ernest Ituma

    2016-01-01

    The study identifies technical training skills needs of youth for sustainable job security in rice production in Ebonyi State, Nigeria. This study was carried out in secondary schools in three educational zones in Ebonyi State, Nigeria. Ebonyi state is one of the states in the southeast geopolitical zone in Nigeria. Descriptive survey design was…

  11. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  12. 42 CFR 73.15 - Training.

    Science.gov (United States)

    2010-10-01

    ... provide information and training on biosafety and security to each individual with access approval from... entity must provide information and training on biosafety and security to each individual not approved... provided under the OSHA Bloodborne Pathogen Standard set forth at 29 CFR 1910.1030. (b) Refresher training...

  13. The Women's Studies Center--A Women's-Led NGO Deepening Democracy in Chile: Educating Women through Personal Empowerment and Political Agency.

    Science.gov (United States)

    King, Caroline

    This paper explores how the Women's Studies Center (Centro de Estudios de la Mujer, CEM), a feminist, women-led nongovernmental organization (NGO), is contributing to socio-cultural change in Chile 11 years after the country's democratic transition. CEM merges the theoretical and the practical, and the personal and the political through education…

  14. 10 CFR 95.33 - Security education.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  15. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  16. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  17. Using Information Technologies in Professional Training of Future Security Specialists in the USA, Great Britain, Poland and Israel

    Science.gov (United States)

    Kyslenko, Dmytro

    2017-01-01

    The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…

  18. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  19. Abramovo Counterterrorism Training Center

    International Nuclear Information System (INIS)

    Hayes, Christopher M.; Ross, Larry; Kaldenbach, Karen Yvonne; Estigneev, Yuri; Murievav, Andrey

    2011-01-01

    The U.S. government has been assisting the Russian Federation (RF) Ministry of Defense (MOD) for many years with nuclear weapons transportation security (NWTS) through the provision of specialized guard escort railcars and cargo railcars with integrated physical security and communication systems, armored transport vehicles, and armored escort vehicles. As a natural continuation of the NWTS program, a partnership has been formed to construct a training center that will provide counterterrorism training to personnel in all branches of the RF MOD. The Abramovo Counterterrorism Training Center (ACTC) is a multinational, multiagency project with funding from Canada, RF and the U.S. Departments of Defense and Energy. ACTC will be a facility where MOD personnel can conduct basic through advanced training in various security measures to protect Category IA material against the threat of terrorist attack. The training will enhance defense-in-depth principles by integrating MOD guard force personnel into the overall physical protection systems and improving their overall response time and neutralization capabilities. The ACTC project includes infrastructure improvements, renovation of existing buildings, construction of new buildings, construction of new training facilities, and provision of training and other equipment. Classroom training will be conducted in a renovated training building. Basic and intermediate training will be conducted on three different security training areas where various obstacles and static training devices will be constructed. The central element of ACTC, where advanced training will be held, is the 'autodrome,' a 3 km road along which various terrorist events can be staged to challenge MOD personnel in realistic and dynamic nuclear weapons transportation scenarios. This paper will address the ACTC project elements and the vision for training development and integrating this training into actual nuclear weapons transportation operations.

  20. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  1. Health impact and economic analysis of NGO-supported neurosurgery in Bolivia.

    Science.gov (United States)

    Ament, Jared D; Greene, Kevin R; Flores, Ivan; Capobianco, Fernando; Salas, Gueider; Uriona, Maria Ines; Weaver, John P; Moser, Richard

    2014-04-01

    Bolivia, one of the poorest countries in the world, ranks 108th on the 2013 Human Development Index. With approximately 1 neurosurgeon per 200,000 people, access to neurosurgery in Bolivia is a growing health concern. Furthermore, neurosurgery in nonindustrialized countries has been considered both cost-prohibitive and lacking in outcomes evaluation. A non-governmental organization (NGO) supports spinal procedures in Bolivia (Solidarity Bridge), and the authors sought to determine its impact and cost-effectiveness. In a retrospective review of prospectively collected data, 19 patients were identified prior to spinal instrumentation and followed over 12 months. For inclusion, patients required interviewing prior to surgery and during at least 2 follow-up visits. All causes of spinal pathology were included. Sixteen patients met inclusion criteria and were therefore part of the analysis. Outcomes measured included assessment of activities of daily living, pain, ambulation, return to work/school, and satisfaction. Cost-effectiveness was determined by cost-utility analysis. Utilities were derived using the Health Utilities Index. Complications were incorporated into an expected value decision tree. Median (± SD) preoperative satisfaction was 2.0 ± 0.3 (on a scale of 0-10), while 6-month postoperative satisfaction was 7 ± 1.4 (p Bolivia appears to be cost-effective, especially when compared with the conventional $50,000/QALY benchmark and the WHO endorsed country-specific threshold of $16,026/QALY. However, with a gross domestic product per capita in Bolivia equaling $4800 per year and 30.3% of the population living on less than $2 per day, this cost continues to appear unrealistic. Additionally, the study has several significant limitations, namely its limited sample size, follow-up period, the assumption that patients not receiving surgical intervention would not make any clinical improvement, the reliance on the NGO for patient selection and sustainable practices

  2. CAPABILITIES OF THE NGO “UKRAINIAN ASSEMBLY OF DOCTORSOF SCIENCE IN PUBLIC ADMINISTRATION” TO INNOVATIONS IN UKRAINE

    OpenAIRE

    DRAHOMYRETSKA NATALIIA MYKHAILIVNA

    2017-01-01

    This article reveals the possibilities of the NGO “Ukrainian Assembly of Doctors of Science in Public Administration” for the development and introduction of innovations in Ukraine. It demonstrates the potential scientists of the country possess for the introduction of foreign and domestic innovations. It shows the results of the assessment of foreign experts of scholars and students from Ukraine in humanitarian spheres. The article makes it possible to observe the content of the proposals of...

  3. Bridge over troubled waters? The state-NGO interface in governing urban environments

    Energy Technology Data Exchange (ETDEWEB)

    Tropp, H

    1998-12-31

    Environmental degradation and depletion of natural resources are aggravating problems in many developing countries. A particular case about Non-Governmental Organisations` (NGOs) commitment to river water pollution in Madras (south India) is developed here, mainly with regards to the interface between the state and NGO sector. A significant reason behind environmental problems are insufficient structures of governance. An often proposed solution, by both international and local organisations and governments, is to develop a partnership between the state and local organisations and communities. The arguments here show that such increased cooperation or decentralization may not come easy and is complicated by various meanings of governance, such as discretionary state power, limited transparency of bureaucratic and political processes, red-tapism and different perceptions of causes and solutions to environmental problems 25 refs, 1 fig

  4. Bridge over troubled waters? The state-NGO interface in governing urban environments

    Energy Technology Data Exchange (ETDEWEB)

    Tropp, H.

    1997-12-31

    Environmental degradation and depletion of natural resources are aggravating problems in many developing countries. A particular case about Non-Governmental Organisations` (NGOs) commitment to river water pollution in Madras (south India) is developed here, mainly with regards to the interface between the state and NGO sector. A significant reason behind environmental problems are insufficient structures of governance. An often proposed solution, by both international and local organisations and governments, is to develop a partnership between the state and local organisations and communities. The arguments here show that such increased cooperation or decentralization may not come easy and is complicated by various meanings of governance, such as discretionary state power, limited transparency of bureaucratic and political processes, red-tapism and different perceptions of causes and solutions to environmental problems 25 refs, 1 fig

  5. 33 CFR 106.205 - Company Security Officer (CSO).

    Science.gov (United States)

    2010-07-01

    ... TWIC. (b) Qualifications. The CSO must have general knowledge, through training or equivalent job...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security training and education, including security measures and procedures. (c) In addition to the knowledge and...

  6. Transmedia storytelling in the NGO communication. Sí me importa by Oxfam Intermón

    Directory of Open Access Journals (Sweden)

    Laura MARTÍNEZ VALERO

    2016-12-01

    Full Text Available Traditionally, transmedia storytelling has been used for spreading fiction narrative worlds, such as films and TV series. However, it was a matter of time that its ability for explaining the reality was discovered and utilised by social organizations to explain their causes and to reach new audiences. Moreover, the new mobile environment challenges the creativity of the organizations to develop products that make use of this new form of consumption. The Sí me importa campaign, a transmedia project of the Spanish NGO Oxfam Intermón, reclaimed the importance of the in-ternational cooperation through social networks, comic, theatre, contemporary art and cinema.

  7. Non-Governmental Organization (NGO Libraries for The Visually Impaired in Nigeria: Alternative Format Use and Perception of Information Services

    Directory of Open Access Journals (Sweden)

    Adetoro, 'Niran

    2015-03-01

    Full Text Available Nigeria's non-government organization (NGO libraries for the visually impaired has over the years been at the forefront of information services provision to persons with visual impairment. This study adopted a survey research design to investigate use of alternative formats and perceptions of information services to the visually impaired, focusing on two purposively chosen NGO libraries for the visually impaired in Nigeria. Using a complete enumeration approach, data were gathered from 180 users of the libraries through the use of a structured questionnaire with a reliability score (${\\alpha}=0.74$. Data from 112 (62.2% of the 180 administered copies of a questionnaire that were retrieved were analysed. The study found that Braille materials had a high level of utilization ($\\bar{x}=4.46$ and were the most frequently utilized (90.9%. Perception of information services by the visually impaired was positive while use of alternative formats was significantly and positively related to users' perception of information services (r = .041; p < 0.05. The study recommends improved transcription and investment in alternative formats and in e-resources. It also recommends collaborations to widen access as well as constant evaluation of services.

  8. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  9. Fluxos informacionais para o monitoramento da Convenção dos Direitos da Criança: a atuação da rede NGO Group for CRCInformation follow and the monitoring process of the convention on the rights of child by NGO Group for CRC network

    Directory of Open Access Journals (Sweden)

    Maria Guiomar da Cunha Frota

    2010-05-01

    Full Text Available O presente artigo apresenta os resultados de uma pesquisa que investiga uma rede social internacional denominada NGO Group for CRC. A rede é composta por cerca de noventa organizações não governamentais e foi criada para monitorar a implementação da Convenção dos Direitos da Criança (CRC. A CRC é o principal documento jurídico relativo aos direitos da criança, tendo sido aprovada pela totalidade dos países pertencentes à ONU, com exceção dos EUA. Pretende-se especificamente analisar o fluxo informacional que se estabelece em meio à rede, seus membros e as organizações que a ela se associam. As questões investigadas são as seguintes: 1 Em que medida o fluxo informacional torna-se parte intrínseca da estrutura em rede? 2 Como os fluxos informacionais se configuram e de que modo são apropriados e veiculados pela rede NGO Group for CRC no curso do monitoramento da implementação da Convenção dos Direitos da Criança?This paper presents the research results about the social network NGO Group for CRC which is an articulation of non governmental organizations related to children's rights. This paper analyzes the information flow inside the network, among its members and among the network organizations. The Convention on the Rights of the Child (CRC was approved in 1989 by the General Assembly of the United Nations, being ratified in its totality by the countries members, with the exception of the United States of America. The investigated questions are: 1 How is the role of the information flow in the network structure? 2 How is the information flow configured to support the implementation monitoring process of the Convention on the Rights of the Child?

  10. Finding Security Patterns to Countermeasure Software Vulnerabilities

    OpenAIRE

    Borstad, Ole Gunnar

    2008-01-01

    Software security is an increasingly important part of software development as the risk from attackers is constantly evolving through increased exposure, threats and economic impact of security breaches. Emerging security literature describes expert knowledge such as secure development best practices. This knowledge is often not applied by software developers because they lack security awareness, security training and secure development methods and tools. Existing methods and tools require to...

  11. 20 CFR 416.1022 - Training.

    Science.gov (United States)

    2010-04-01

    ...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Determinations of Disability Administrative Responsibilities and Requirements § 416.1022 Training. The State will insure that all employees have an acceptable level of competence. We will provide training and other...

  12. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  13. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  14. Report: EPA’s Information Systems and Data Are at Risk Due to Insufficient Training of Personnel With Significant Information Security Responsibilities

    Science.gov (United States)

    Report #14-P-0142, March 21, 2014. The EPA places its information systems and data at risk due to an organizational structure that has not specified required duties and responsibilities to ensure personnel are trained on key information security roles.

  15. International Education and Training Centre (Nuclear security and Nonproliferation) and Ideas for Educational Test Facilities in the centre

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Hyung Min [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2010-10-15

    With respect to the nuclear security-related multilateral agreements, many states and international societies recognize the importance of evaluating and improving their physical protection systems to ensure that they are capable of achieving the objectives set out in relevant IAEA Nuclear Security Series documents. Under this circumstance, finally, on April 12-13, 2010, US President Obama hosted a Nuclear Security Summit in Washington, DC, to enhance international cooperation to prevent nuclear terrorism, an issue which he has identified as the most immediate and extreme threat to global security. The goals of the Nuclear Security Summit were to come to a common understanding of the threat posed by nuclear terrorism, to agree to effective measures to secure nuclear material, and to prevent nuclear smuggling and terrorism. The Summit focused on the security of nuclear materials, nonproliferation, disarmament, and peaceful nuclear energy. At the summit, the Republic of Korea was chosen as the host of the next Summit in 2012. After President Barack Obama declared the opening of the Summit and explained the purpose of the meeting, he designated Korea as the host of the Second Nuclear Security Summit, which was unanimously approved by the participating leaders. During the Summit, President Lee introduced Korea's measures for the physical protection of nuclear materials and laid out what contributions Korea would make to the international community. He also stated that the North Korean leader would be welcomed at the next summit only if his country made substantial pledges toward nuclear disarmament during the Six-Party Talks and announced that Seoul would host the general assembly of the Global Initiative to Combat Nuclear Terrorism in 2011 and would share its expertise and support the Summit's mission by setting up an education and training center on nuclear security in 2014

  16. International Education and Training Centre (Nuclear security and Nonproliferation) and Ideas for Educational Test Facilities in the centre

    International Nuclear Information System (INIS)

    Seo, Hyung Min

    2010-01-01

    With respect to the nuclear security-related multilateral agreements, many states and international societies recognize the importance of evaluating and improving their physical protection systems to ensure that they are capable of achieving the objectives set out in relevant IAEA Nuclear Security Series documents. Under this circumstance, finally, on April 12-13, 2010, US President Obama hosted a Nuclear Security Summit in Washington, DC, to enhance international cooperation to prevent nuclear terrorism, an issue which he has identified as the most immediate and extreme threat to global security. The goals of the Nuclear Security Summit were to come to a common understanding of the threat posed by nuclear terrorism, to agree to effective measures to secure nuclear material, and to prevent nuclear smuggling and terrorism. The Summit focused on the security of nuclear materials, nonproliferation, disarmament, and peaceful nuclear energy. At the summit, the Republic of Korea was chosen as the host of the next Summit in 2012. After President Barack Obama declared the opening of the Summit and explained the purpose of the meeting, he designated Korea as the host of the Second Nuclear Security Summit, which was unanimously approved by the participating leaders. During the Summit, President Lee introduced Korea's measures for the physical protection of nuclear materials and laid out what contributions Korea would make to the international community. He also stated that the North Korean leader would be welcomed at the next summit only if his country made substantial pledges toward nuclear disarmament during the Six-Party Talks and announced that Seoul would host the general assembly of the Global Initiative to Combat Nuclear Terrorism in 2011 and would share its expertise and support the Summit's mission by setting up an education and training center on nuclear security in 2014

  17. Cost recovery of NGO primary health care facilities: a case study in Bangladesh

    Directory of Open Access Journals (Sweden)

    Alam Khurshid

    2010-06-01

    Full Text Available Abstract Background Little is known about the cost recovery of primary health care facilities in Bangladesh. This study estimated the cost recovery of a primary health care facility run by Building Resources Across Community (BRAC, a large NGO in Bangladesh, for the period of July 2004 - June 2005. This health facility is one of the seven upgraded BRAC facilities providing emergency obstetric care and is typical of the government and private primary health care facilities in Bangladesh. Given the current maternal and child mortality in Bangladesh and the challenges to addressing health-related Millennium Development Goal (MDG targets the financial sustainability of such facilities is crucial. Methods The study was designed as a case study covering a single facility. The methodology was based on the 'ingredient approach' using the allocation techniques by inpatient and outpatient services. Cost recovery of the facility was estimated from the provider's perspective. The value of capital items was annualized using 5% discount rate and its market price of 2004 (replacement value. Sensitivity analysis was done using 3% discount rate. Results The cost recovery ratio of the BRAC primary care facility was 59%, and if excluding all capital costs, it increased to 72%. Of the total costs, 32% was for personnel while drugs absorbed 18%. Capital items were17% of total costs while operational cost absorbed 12%. Three-quarters of the total cost was variable costs. Inpatient services contributed 74% of total revenue in exchange of 10% of total utilization. An average cost per patient was US$ 10 while it was US$ 67 for inpatient and US$ 4 for outpatient. Conclusion The cost recovery of this NGO primary care facility is important for increasing its financial sustainability and decreasing donor dependency, and achieving universal health coverage in a developing country setting. However, for improving the cost recovery of the health facility, it needs to increase

  18. Training Activities to Maintain Competences in Nuclear Safety and Security: A Case Study of the Belgian Nuclear Research Centre

    International Nuclear Information System (INIS)

    Kesteloot, N.; Clarijs, T.; Coeck, M.; Vermeersch, F.

    2016-01-01

    Full text: The Belgian Nuclear Research Centre, SCK•CEN, is one of the largest research centers in Belgium. More than 700 employees advance research into nuclear energy and ionizing radiation for civilian use, and develop nuclear technologies for socially valuable purposes. Next to independent fundamental and applied research SCK-CEN provides advice, training, services and products. This paper describes the general approach towards the continuous professional development of all SCK-CEN personnel. The objective of these training activities is to maintain and increase the required competences, in order to optimize the output and the wellbeing on the work floor. Given the nature of the SCK-CEN activities, special attention is given to themes like radiation protection, security and industrial safety. A combination of classical face-to-face training, e-learning and on-the-job training is offered during the onboarding and further career path of an SCK-CEN employee. (author

  19. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  20. 20 CFR 638.528 - Social Security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  1. DOES TRAINING IN THE CIRCLE OF SECURITY FRAMEWORK INCREASE RELATIONAL UNDERSTANDING IN INFANT/CHILD AND FAMILY WORKERS?

    Science.gov (United States)

    McMahon, Catherine; Huber, Anna; Kohlhoff, Jane; Camberis, Anna-Lisa

    2017-09-01

    This article evaluated whether attendance at Circle of Security training workshops resulted in attendees showing greater empathy and attachment-related knowledge and understanding, and fewer judgmental responses to viewing a stressful parent-child interaction. Participants were 202 practitioners who attended and completed a 2-day (n = 70), 4-day (n = 105), or 10-day (n = 27) COS training workshop in Australia or New Zealand in 2015. In a pre/post design, participant reactions to a video clip of a challenging parent-child interaction were coded for empathic, judgmental, or attachment-focused language. Attachment understanding was coded in response to questions about the greatest challenge that the dyad faced. In all training conditions, participants provided significantly more attachment-focused descriptors and showed significantly greater attachment understanding after training, but significantly fewer empathic descriptors. While participants at the longer workshops provided significantly fewer judgmental/critical descriptors, there was no change for those attending the 2-day workshop. Irrespective of workshop duration or professional background, participants took a more relational perspective on the vignette after the training workshops. More detailed research is required to establish the extent to which this increased knowledge and understanding is retained and integrated into infant mental health practice with parents and young children. © 2017 Michigan Association for Infant Mental Health.

  2. Defense Security Cooperation Agency Vision 2020. Update 1

    Science.gov (United States)

    2015-10-01

    the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers

  3. Development of Non-hazardous Explosives for Security Training and Testing (NESTT)

    International Nuclear Information System (INIS)

    Kury, J.W.; Simpson, R.L.; Hallowell, S.F.

    1996-01-01

    The security force at the Lawrence Livermore National Laboratory (LLNL) routinely used canines to search for explosives and other contraband substances. The use of threat quantities of explosive for realistic training in populated or sensitive Laboratory areas has not been permitted because of the hazard. To overcome this limitation a series of non-hazardous materials with authentic signatures have been prepared and evaluated. A series of materials has been prepared that have authentic properties of explosives but are non-hazardous. These NESTT materials are prepared by coating a few micron thick layer of an explosive on a non-reactive substrate. This produces a formulation with an authentic vapor and molecular signature. Authentic x-ray and oxygen/nitrogen density signatures are obtained through the appropriate choice of a substrate. The signatures of NESTT TNT and NESTT Comp. C-4 have been verified by instrument and canine (K-9) detection in a Beta Test Program

  4. AIDSCAP initiative. Innovation in NGO capacity building: Tanzania AIDS project.

    Science.gov (United States)

    Dadian, M J

    1998-01-01

    Tanzania has since the mid-1980s experienced some of the highest rates of HIV infection in the world, with data now showing the mean levels of HIV seroprevalence nationwide to be greater than 13%, and even higher than 30% in some districts. By 2000, as many as 2.4 million Tanzanians will be infected with HIV and more than 850,000 Tanzanian children will be orphaned by the epidemic. The Tanzania AIDS Project (TAP), funded by the US Agency for International Development (USAID), was implemented through the AIDS Control and Prevention (AIDSCAP) Project by Family Health International (FHI) during 1993-97. TAP will receive support throughout 1998 through a cooperative agreement between USAID and FHI. Nongovernmental organization (NGO) representatives meet on a regular basis in Dar es Salaam and in 8 other regions of the country to plan and coordinate the major aspects of TAP's HIV/AIDS prevention activities in each area. The author describes the evolution of the idea to bring NGOs together into geographic clusters, the diversity of talents enjoyed from using the cluster concept, building institutional capacity, the challenges facing TAP's 9 clusters, and working with traditional communities.

  5. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  6. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  7. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  8. Influence of taekwondo as security martial arts training on anaerobic threshold, cardiorespiratory fitness, and blood lactate recovery.

    Science.gov (United States)

    Kim, Dae-Young; Seo, Byoung-Do; Choi, Pan-Am

    2014-04-01

    [Purpose] This study was conducted to determine the influence of Taekwondo as security martial arts training on anaerobic threshold, cardiorespiratory fitness, and blood lactate recovery. [Subjects and Methods] Fourteen healthy university students were recruited and divided into an exercise group and a control group (n = 7 in each group). The subjects who participated in the experiment were subjected to an exercise loading test in which anaerobic threshold, value of ventilation, oxygen uptake, maximal oxygen uptake, heart rate, and maximal values of ventilation / heart rate were measured during the exercise, immediately after maximum exercise loading, and at 1, 3, 5, 10, and 15 min of recovery. [Results] At the anaerobic threshold time point, the exercise group showed a significantly longer time to reach anaerobic threshold. The exercise group showed significantly higher values for the time to reach VO2max, maximal values of ventilation, maximal oxygen uptake and maximal values of ventilation / heart rate. Significant changes were observed in the value of ventilation volumes at the 1- and 5-min recovery time points within the exercise group; oxygen uptake and maximal oxygen uptake were significantly different at the 5- and 10-min time points; heart rate was significantly different at the 1- and 3-min time points; and maximal values of ventilation / heart rate was significantly different at the 5-min time point. The exercise group showed significant decreases in blood lactate levels at the 15- and 30-min recovery time points. [Conclusion] The study results revealed that Taekwondo as a security martial arts training increases the maximal oxygen uptake and anaerobic threshold and accelerates an individual's recovery to the normal state of cardiorespiratory fitness and blood lactate level. These results are expected to contribute to the execution of more effective security services in emergencies in which violence can occur.

  9. Preliminary design for an institutional needs assessment process to guide the development of training programs at the Department of Energy Central Training Academy

    International Nuclear Information System (INIS)

    Golder, T.; Laktasic, S.

    1987-01-01

    In order to provide and maintain a high level of nuclear security at DOE installations, the Office of Safeguards and Security (OSS) is charged with the deployment of highly trained security staff at each DOE site. Faced with this mission, OSS must ensure that both Safeguards and Security personnel are adequately trained to meet present as well as potential future insider and outside threats. A major step toward meeting this goal was to begin to standardize training, establish an elite training cadre, and create a central training facility to implement training for safeguards and security personnel. These requirements were actualized by the creation of the Central Training Academy. After a 9 month start-up and 2 years of initial operation, the CTA can now provide a historical perspective on its evolution, early program development, and future plans and challenges. Central to future program planning at the Academy is the development and implementation of an internal DOE needs assessment process which is the focus of this study. Once institutionalized, the system would allow for the Academy to accurately assess and translate OSS needs into requirements for both OSS Safeguards and Security personnel and place the Academy in position to develop and tailor Tactical and Specialized programs that reflect and respond to changing threats and technological advances

  10. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  11. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  12. 49 CFR 236.1033 - Communications and security requirements.

    Science.gov (United States)

    2010-10-01

    ... Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... 49 Transportation 4 2010-10-01 2010-10-01 false Communications and security requirements. 236.1033... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and required...

  13. Training, Job Security and Incentive Wages

    OpenAIRE

    Margarita Katsimi

    2003-01-01

    This paper considers the optimal level of firm-specific training by taking into account the positive effect of training on the expected duration of workers’ current employment. In the framework of an efficiency wage model, a short expected job tenure represents a disamenity that reduces the penalty from shirking. As this disamenity increases, workers have an incentive to continue providing a positive level of effort only if they are compensated by a higher wage. We endogenize the employment...

  14. Making training decisions proactively

    International Nuclear Information System (INIS)

    Hartman, R.F.

    1988-01-01

    The challenge of making training decisions with a high degree of confidence as to the results of those decisions face every DOD, Federal, State, and City agency. Training has historically been a very labor and paper intensive system with limited automation support. This paper outlines how one DOD component, the Air Force, is approaching that challenge. The Training Decision System (TDS) will provide the Air Force with an automated decision aid to help plan and estimate the consequences of various mixes of resident training, On-The-Job Training (OJT), and field training within a specialty such as security. The system described provides training from enlistment to separation and responds to hundreds of related security task needs. This system identifies what the tasks are, who should provide the training, what training setting should be used, what proficiency should be achieved, and through computer modeling provides an assessment of training effectiveness options and estimate the impact of implementing those options. With current budgetary constraints and with the possibility of further reductions in the future, the most cost effective training mix must be found to sustain required capabilities

  15. Emerging need for nuclear security technical and scientific support

    International Nuclear Information System (INIS)

    Kedir, Surur

    2010-01-01

    An effective and efficient nuclear security culture is dependent on proper planning, training, awareness, operation and maintenance. A high level of safety and security culture should be consolidated in the handling of nuclear and radiation sources, so that - inter alia - human errors are minimized through good training; and the concept of safety and security culture was to make it clear that safety should be the highest priority in organization handling nuclear and radiation sources. Regulatory infrastructures for the control of radiation sources should also be supported by governments and be able to act independently. (author)

  16. Implementing the millennium development food security goals Challenges of the southern African context

    Science.gov (United States)

    Love, David; Twomlow, Steve; Mupangwa, Walter; van der Zaag, Pieter; Gumbo, Bekithemba

    The Millennium Development Goals’ target to halve the proportion of people who suffer from hunger is extremely important in southern Africa, where food security has become increasingly problematic over the last 20 years. One “quick-win” proposal is replenishment of soil nutrients for smallholder farmers, through free or subsidised chemical fertilisers. Other proposals include appropriate irrigation technology, improved inputs and interventions targeted at women. Analysis of over 10 years of agro-hydrological and agro-economic studies from southern African show that a different approach is required to interventions proposed. There are sustainability problems with free chemical fertiliser due to transport costs and ancillary costs. Furthermore, recent studies in Zimbabwe and Mozambique show that significant increases in yield can only be obtained when soil fertility management is combined with good crop husbandry, e.g. timely planting and weeding. Ongoing replenishment of fertility would be dependent on a continued free or subsidised fertiliser supply, and transport system. Increasing access to irrigation will help, but is not the only solution and cannot reach even a majority of farmers. It has been determined that short dryspells are often the major cause of low yields in sub-Saharan Africa. Soil-water conservation approaches, e.g. winter weeding and conservation tillage, can reduce risk and increase yield. The following specific recommendations are made for urgent interventions to contribute sustainably to food security in southern Africa: (i) To increases access to fertiliser, consider development of strong input markets at end-user level. (ii) Intensification of technology transfer, focusing on capacity building for transfer of existing technologies and much closer collaboration between state and NGO sectors, agronomists and water engineers. (iii) Increasing the uptake of soil-water conservation methods, including conservation tillage and weeding, and

  17. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  18. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  19. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  20. KINAC/INSA International Training Activities and Lessons Learned

    International Nuclear Information System (INIS)

    Kim, Hyun Chul

    2016-01-01

    In an effort to strengthen the coordination of the nuclear security training and support centers, the International Atomic Energy Agency (IAEA) established the International Network for Nuclear Security Training and Support Centres (NSSC Network) in February 2012. In February 2013, NSSC Network members from China, Japan and the Republic of Korea (ROK) established the 'Asia Regional Network' under the auspices of the NSSC Network to enhance regional collaboration to harmonize activities of the regional CoEs to provide effective support on nuclear security. Japan opened its CoE, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) in February 2011. The Chinese CoE, so called State Nuclear Security Technology Center (SNSTC), is expected to open in March 2016. As one of ROK's national commitments at the 2010 NSS, the KINAC/INSA was established in 2014 in order to share ROK's expertise and support the Summit's mission. International training activities of the KINAC/INSA for two years have been introduced and the lessons learned from those activities have been identified. While the KINAC/INSA as the ROK's CoE has begun on the right foot, it still remains challenging to achieve real excellence in training. Such international training efforts of the KINAC/INSA will eventually contribute to the ROK acknowledged as a global leader in the area of nuclear nonproliferation and security and a nuclear supplier fulfilling responsibility on global nuclear nonproliferation and security regime

  1. KINAC/INSA International Training Activities and Lessons Learned

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Chul [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    In an effort to strengthen the coordination of the nuclear security training and support centers, the International Atomic Energy Agency (IAEA) established the International Network for Nuclear Security Training and Support Centres (NSSC Network) in February 2012. In February 2013, NSSC Network members from China, Japan and the Republic of Korea (ROK) established the 'Asia Regional Network' under the auspices of the NSSC Network to enhance regional collaboration to harmonize activities of the regional CoEs to provide effective support on nuclear security. Japan opened its CoE, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) in February 2011. The Chinese CoE, so called State Nuclear Security Technology Center (SNSTC), is expected to open in March 2016. As one of ROK's national commitments at the 2010 NSS, the KINAC/INSA was established in 2014 in order to share ROK's expertise and support the Summit's mission. International training activities of the KINAC/INSA for two years have been introduced and the lessons learned from those activities have been identified. While the KINAC/INSA as the ROK's CoE has begun on the right foot, it still remains challenging to achieve real excellence in training. Such international training efforts of the KINAC/INSA will eventually contribute to the ROK acknowledged as a global leader in the area of nuclear nonproliferation and security and a nuclear supplier fulfilling responsibility on global nuclear nonproliferation and security regime.

  2. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  3. Training Students to Steal: A Practical Assignment in Computer Security Education

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    Practical courses in information security provide students with first-hand knowledge of technical security mechanisms and their weaknesses. However, teaching students only the technical side of information security leads to a generation of students that emphasize digital solutions, but ignore the

  4. Integrated Support Center for Nuclear Nonproliferation and Security

    International Nuclear Information System (INIS)

    Kimura, Naohito; Naoi, Yosuke

    2010-01-01

    In April 2010, at the Nuclear Security Summit, Japan demonstrated its commitment to the strengthening of nuclear non-proliferation and nuclear security and announced the establishment of the Integrated Comprehensive Support Center for Nuclear Non-proliferation and Nuclear Security in the Japan Atomic Energy Agency (JAEA), under the guidance and authority of the Ministry of Education, Culture, Sports and Science and Technology (MEXT), and in cooperation with other ministries. The goal of the Center is to strengthen nuclear non-proliferation and security in emerging nuclear power countries by sharing Japan's accumulated experiences in its peaceful use of nuclear energy. To achieve its goal, the Center serves three functions: (1) human resource and capacity building, (2) infrastructure development and technical assistance and (3) international coordination and cooperation. The Center will offer three types of training courses to strengthen human resources and capacity building in emerging nuclear power countries. In the Training Course on Nuclear Security, the participants will learn the design and evaluation process for physical protection and detection of and response to illegal or unauthorized acts related to nuclear materials. They will learn these issues not only through lectures and training but also using mockup facilities and virtual reality systems. Second, in the Training Course on Safeguards and State System of Accounting for and Control of Nuclear Material (SSAC), the Center will teach the experience of advanced safeguards activities in Japan for its full-scale nuclear fuel cycle facilities as a non-nuclear weapon state. The participants will learn the IAEA and national safeguards systems, the material accounting system and inspector activities. Third, in the Training on the International Nuclear Nonproliferation Framework, the participants will learn the international framework of nuclear non-proliferation including the IAEA safeguards system and

  5. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  6. Context matters in NGO-government contracting for health service delivery: a case study from Pakistan.

    Science.gov (United States)

    Zaidi, Shehla; Mayhew, Susannah H; Cleland, John; Green, Andrew T

    2012-10-01

    Contracting non-governmental organizations (NGOs) for health service provision is gaining increasing importance in low- and middle-income countries. However, the role of the wider context in influencing the effectiveness of contracting is not well studied and is of relevance given that contracting has produced mixed results so far. This paper applies a policy analysis approach to examine the influence of policy and political factors on contracting origin, design and implementation. Evidence is drawn from a country case study of Pakistan involving extensive NGO contracting for human immunodeficiency virus (HIV) prevention services supported by international donor agencies. A multilevel study was conducted using 84 in-depth interviews, 22 semi-structured interviews, document review and direct observation to examine the national policy design, provincial management of contracting and local contract implementation. There were three main findings. First, contracting origin and implementation was an inherently political process affected by the wider policy context. Although in Pakistan a combination of situational events successfully managed to introduce extensive and sophisticated contracting, it ran into difficulties during implementation due to ownership and capacity issues within government. Second, wide-scale contracting was mis-matched with the capacity of local NGOs, which resulted in sub-optimal contract implementation challenging the reliance on market simulation through contracting. Third, we found that contracting can have unintended knock-on effects on both providers and purchasers. As a result of public sector contracts, NGOs became more distanced from their grounded attributes. Effects on government purchasers were more unpredictable, with greater identification with contracting in supportive governance contexts and further distancing in unsupportive contexts. A careful approach is needed in government contracting of NGOs, taking into account acceptance of

  7. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  8. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  9. Mechanisms for training security inspectors to enhance human performance

    International Nuclear Information System (INIS)

    Burkhalter, H.E.; Sessions, J.C.

    1988-01-01

    The Department of Energy (DOE) has established qualification standards for protective force personnel employed at nuclear facilities [10 CFR Part 1046 (Federal Register)]. Training mechanisms used at Los Alamos to enhance human performance in meeting DOE standards include, but are not limited to, the following: for cardio-respiratory training, they utilize distance running, interval training, sprint training, pacing, indoor aerobics and circuit training; for muscular strength, free weights, weight machines, light hand weights, grip strength conditioners, and calistenics are employed; for muscular endurance, participants do high repetitions (15 - 40) using dumbbells, flex weights, resistive rubber bands, benches, and calisthenics; for flexibility, each training session devotes specific times to stretch the muscles involved for a particular activity. These training mechanisms with specific protocols can enhance human performance

  10. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  11. "No God and no Norway": collective resource loss among members of Tamil NGO's in Norway during and after the last phase of the civil war in Sri Lanka.

    Science.gov (United States)

    Guribye, Eugene

    2011-08-17

    Studies on the mental health of refugees have tended to focus upon the impact of traumatic experiences in the country of origin, and acculturation processes in exile. The effects of crises in the country of origin on refugees living in exile have been little studied. This article examines how the final stages of the civil war in Sri Lanka in 2009 influenced members of pro-LTTE Tamil NGO's in Norway. Ethnographic fieldwork methods were employed within Tamil NGO's in the two largest cities in Norway between November 2008 and June 2011. The findings suggest that collective resources became severely drained as a result of the crisis, severely disrupting the fabric of social life. Public support from the majority community remained scarce throughout the crisis. The study suggests that there is a need for public support to exile groups indirectly affected by man-made crises in their country of origin.

  12. Information Security Awareness On-Line Materials Design with Knowledge Maps

    Science.gov (United States)

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  13. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  14. The Impact of Information Richness on Information Security Awareness Training Effectiveness

    Science.gov (United States)

    Shaw, R. S.; Chen, Charlie C.; Harris, Albert L.; Huang, Hui-Jou

    2009-01-01

    In recent years, rapid progress in the use of the internet has resulted in huge losses in many organizations due to lax security. As a result, information security awareness is becoming an important issue to anyone using the Internet. To reduce losses, organizations have made information security awareness a top priority. The three main barriers…

  15. Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets

    Science.gov (United States)

    Ayyagari, Ramakrishna; Figueroa, Norilyz

    2017-01-01

    Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…

  16. Reflecting about gender violence and african american women: The experience of the NGO Maria Mulher - Brazil

    Directory of Open Access Journals (Sweden)

    Maria Luisa Pereira Oliveira

    2008-11-01

    Full Text Available The African American women's socioeconomic, political and cultural conditions are unstable; many of these women face social exclusion situations and have no access to public policies. The experience of the NGO Maria Mulher has considered racial discrimination in relation to African American women as a fact which empowers gender violence and causes damage to life quality and to health. This research tried to understand the effects of racial discrimination to the identities construction and to the subjectivation modes of African American women attended by the SOS Racism program. The women showed intense emotional suffering due to discrimination and racism they have faced. In the group process new meanings for the violence were produced, transforming the personal narrative into a public report. 

  17. SHIFT: Shared Information Framework and Technology Concept

    Science.gov (United States)

    2009-02-01

    Preparedness and Support Project (NGO-SPAS) in Somalia and the now defunct Baluchistan NGO Security Office ( BINGO ) in Pakistan. ANSO has often been...interference by powerful local actors. Similar concerns sparked the closure of BINGO by the Pakistani government. Overall, the general trend in incident...outweighed by the benefit derived from the open source environment. In the end, however, users will be required to exercise judgment when reviewing

  18. 49 CFR 172.704 - Training requirements.

    Science.gov (United States)

    2010-10-01

    ... recurrent training after March 25, 2003, and in no case later than March 24, 2006, each hazmat employee must... by each employee in the event of a security breach. (b) OSHA, EPA, and other training. Training...

  19. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  20. Major challenges to scale up of visual inspection-based cervical cancer prevention programs: the experience of Guatemalan NGOs.

    Science.gov (United States)

    Chary, Anita Nandkumar; Rohloff, Peter J

    2014-08-01

    Like many other low- and middle-income countries, Guatemala has adopted visual inspection with acetic acid (VIA) as a low-resource alternative to the Pap smear for cervical cancer screening. Nongovernmental organizations (NGOs) introduced VIA to Guatemala in 2004, and a growing number of NGOs, working both independently and in collaboration with the Guatemalan Ministry of Health, employ VIA in cervical cancer prevention programs today. While much research describes VIA efficacy and feasibility in Latin America, little is known about NGO involvement with VIA programming or experiences with VIA outside the context of clinical trials and pilot projects in the region. To explore challenges faced by NGOs implementing VIA programs in Guatemala, we conducted semi-structured interviews with 36 NGO staff members involved with 20 VIA programs as direct service providers, program administrators, and training course instructors. Additionally, we collected data through observation at 30 NGO-sponsored cervical cancer screening campaigns, 8 cervical cancer prevention conferences, and 1 week-long NGO-sponsored VIA training course. Frequently highlighted challenges included staff turnover, concerns over training quality, a need for opportunities for continued supervision, and problems with cryotherapy referrals when immediate treatment for VIA-positive women was unavailable. Reducing staff turnover, budgeting to train replacement providers, standardizing training curricula, and offering continued supervision are key strategies to improve VIA service quality and program sustainability. Alternative training methods, such as on-the-job mentoring and course prerequisites of online learning, could help increase training time available for clinical supervision. Efforts should be made to ensure that VIA testing is coupled with immediate cryotherapy, that providers trained in VIA are also trained in cryotherapy, and that cryotherapy supplies and equipment are maintained. Where this is not

  1. Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach.

    Science.gov (United States)

    Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem

    2013-01-01

    This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff.

  2. "No God and no Norway": collective resource loss among members of Tamil NGO's in Norway during and after the last phase of the civil war in Sri Lanka

    Directory of Open Access Journals (Sweden)

    Guribye Eugene

    2011-08-01

    Full Text Available Abstract Background Studies on the mental health of refugees have tended to focus upon the impact of traumatic experiences in the country of origin, and acculturation processes in exile. The effects of crises in the country of origin on refugees living in exile have been little studied. This article examines how the final stages of the civil war in Sri Lanka in 2009 influenced members of pro-LTTE Tamil NGO's in Norway. Method Ethnographic fieldwork methods were employed within Tamil NGO's in the two largest cities in Norway between November 2008 and June 2011. Results The findings suggest that collective resources became severely drained as a result of the crisis, severely disrupting the fabric of social life. Public support from the majority community remained scarce throughout the crisis. Conclusions The study suggests that there is a need for public support to exile groups indirectly affected by man-made crises in their country of origin.

  3. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  4. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  5. ANALYSIS OF KEY-MOTIVATORS IN THE ROMANIAN-NGO ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Mihaela Pacesila

    2014-12-01

    Full Text Available Purpose: The purpose of this paper is to analyse the ways to motivate volunteers and employees or members from non-governmental sector in order to find out which are the most effective of them and to see if there are differences regarding the motivation depending on the type of organization and the field of activity. The reason for investigating the literature in the field is to see how the contemporary authors have defined the term NGO as well as the concept of motivation.Methodology: The research described in this paper is based on qualitative research method. Data gathering methods included the document analysis in order to bring some important clarifications on the concept of non-governmental organizations and motivation as well as semi-structured interview in order to identify the ways to motivate human resources from nongovernmental sector.Findings: The analysis and interpretation of the data highlight that there are differences in the ways of motivating non-governmental sector human resources depending on the field of activity, but not depending on the type of organization. Despite the obstacles encountered, the management of NGOs uses the most effective ways in order to increase the motivation level of volunteers, employees or members.Research limitation: The limits of this paper come once with the limited number of the interviewees, as well as the types of non-governmental organizations surveyed.Value of paper: The paper has both theoretical and practical importance, explaining the concepts of NGOs and motivation and analysing the ways of motivating human resources in the non-governmental organizations.

  6. グローバリゼーションのもとでのマイクロファイナンスの妥当性―南インドの NGO 評価事例から―

    OpenAIRE

    雨森, 孝悦; Takayoshi, Amenomori

    2004-01-01

    This article is an attempt to examine the relevance of microfinance against the background of globalization, i.e. the global spread of commercialism and Americanization, the integration of markets, among others, and the decline of the rural community. As a case, a Japanese NGO with local NGO partners in South India was chosen, whose activities the author was entrusted to evaluate. The main strategy of these NGOs was to form and strengthen self-help groups (SHGs) in poor rural areas, with the ...

  7. Pakistan’s national Centre of Excellence contributes to sustaining nuclear security

    International Nuclear Information System (INIS)

    Dixit, Aabha

    2016-01-01

    Pakistani front line officers and first responders are in a better position to fight illicit trafficking in nuclear and other radioactive materials, as well as to use advanced radiation detection and monitoring equipment, thanks to training they have received at the country’s Centre of Excellence for Nuclear Security. This is just one of the benefits the country has reaped from the Centre, which is collaborating with the growing International Network for Nuclear Security Training and Support Centres (NSSC Network), building national capacity through training and strengthening technical and scientific support programmes. Since the establishment of the Centre of Excellence, Pakistan has organized training courses on nuclear security for personnel from national and regional organizations. The Centre of Excellence also offers technical support to personnel involved in the maintenance and upgrade of facilities, with a focus on enhancing technical and scientific skills and quality control of equipment.

  8. Defining information security education, training, and awareness needs using electronic meeting space

    Science.gov (United States)

    Schou, Corey D.; Frost, James; Wingert, Nathan; Maconachy, W. V.

    1999-01-01

    The United States is at target. For those of us who grew up curing the cold war this is not news; however, the threat is different than it has been in the past. Now it may be another super power or it may be a teenage child with a personal computer. Both government and civilian entities are potential targets. The national information infrastructure (NII) is the real target. The determined hacker can bring down not only government systems, but the power-grid, the financial system, or the air traffic control system as well. All organizations must be aware of the threat and be prepared to react appropriately. Of course, the federal government has begun to protect their critical systems. However, many American corporations have not yet fully protected their systems. Since there is a common threat, common standards for countermeasures are applicable. This paper reports on the use of an electronic meeting room technology by government, industry, and academia to establish a national training standard. If you are a CIO or advise one about security matters, these standards are important.

  9. Driverless Train

    OpenAIRE

    Törnqvist, Julia; Berglund, Emma

    2017-01-01

    As automation increases in train services, this project resulted in making a driver-less train. The main purpose was to see how security can be increased. By using sensors, today’s technologies and rebuild the stations with walls on the platforms, the safety can increase for the better. This project designs a railway system consisting of a train, boom barriers and a station. The mechanical parts were made from scratch to get the system to work beneficially. The use of Arduino as a micro contro...

  10. A ground-based magnetic survey of Frenchman Flat, Nevada National Security Site and Nevada Test and Training Range, Nevada: data release and preliminary interpretation

    Science.gov (United States)

    Phillips, Jeffrey D.; Burton, Bethany L.; Curry-Elrod, Erika; Drellack, Sigmund

    2014-01-01

    The Nevada National Security Site (NNSS, formerly the Nevada Test Site) is located in southern Nevada approximately 105 kilometers (km) (65 miles) northwest of Las Vegas. Frenchman Flat is a sedimentary basin located on the eastern edge of NNSS and extending eastward into the adjacent Nevada Test and Training Range (NTTR).

  11. Perceptions of Nongovernmental Organization (NGO Staff about Water Privatization in Developing Countries

    Directory of Open Access Journals (Sweden)

    Ellis A. Adams

    2014-11-01

    Full Text Available Almost a billion people globally lack access to potable water. In the early 1990’s, attempts to improve potable water access in the global south included a massive push for water services privatization, often involving the transfer of public water services to private companies. Critics of water privatization claim it rarely improves access to water, and in most cases, unfairly affect poor people. Proponents on the other hand argue that it is necessary for efficient management and capital investment in the water sector. Although development NGOs play an important role in developing country water provision, hardly any studies have sought to understand their perceptions about the potential role of water privatization towards improving access to potable water in developing countries. We interviewed the key staff among 28 international and national NGO staff about water privatization, its opportunities and constraints. Their perceptions were mixed. While most criticized water privatization as increasing water costs to the poor, some noted that privatization is necessary for improving water access through increased capital investment. We present the findings and discuss larger implications for water policies and reforms in developing countries.

  12. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  13. Disaster at a University: A Case Study in Information Security

    Science.gov (United States)

    Ayyagari, Ramakrishna; Tyks, Jonathan

    2012-01-01

    Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…

  14. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  15. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  16. The European Nuclear Safety Training and Tutoring Institute

    International Nuclear Information System (INIS)

    2012-01-01

    The European Nuclear Safety Training and Tutoring Institute, ENSTTI, is an initiative of European Technical Safety Organizations (TSO) in order to provide vocational training and tutoring in the methods and practices required to perform assessment in nuclear safety, nuclear security and radiation protection. ENSTTI calls on TSOs' expertise to maximize the transmission of safety and security knowledge, practical experience and culture. Training, tutoring and courses for specialists are achieved through practical lectures, working group and technical visits and lead to a certificate after knowledge testing. ENSTTI contributes to the harmonization of nuclear safety and security practices and to the networking of today and future nuclear safety experts in Europe and beyond. (A.C.)

  17. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    International Nuclear Information System (INIS)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante

    2017-01-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  18. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante, E-mail: barreto@unifor.br, E-mail: midredcb@hotmail.com [Universidade de Fortaleza (UNIFOR), CE (Brazil)

    2017-07-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  19. Accredited training on radiation protection for the Austrian police

    International Nuclear Information System (INIS)

    Timal, G.

    2009-01-01

    In Austria, radiological emergencies are handled following the Intervention Regulation, in force since 2007. This regulation also defines duration and content for the training of radiation protection personnel, taking advantage of the standard OeNORM S 5207 published in 2005. Radiation protection personnel of the Austrian police are trained at the Federal Security Academy in Traiskirchen near Vienna. The Federal Security Academy is a training centre certified by the Austrian Standards Institute. The poster describes the modular organisation of the training and its duration and content as well as the further trainings available to the radiation protection personnel of the Police. (orig.)

  20. 76 FR 31971 - New Agency Information Collection Activity Under OMB Review: Security Program for Hazardous...

    Science.gov (United States)

    2011-06-02

    ... Carrier Division will be producing a voluntary security-related training course for the Hazmat motor... voluntary security-related training course to the Hazardous Materials (Hazmat) motor carrier and shipper... using appropriate automated, electronic, mechanical, or other technological collection techniques or...

  1. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  2. ONE OF THE POSSIBLE WAYS TO STRENGTHENING THE SECURITY

    Directory of Open Access Journals (Sweden)

    Roman URBAN

    2016-09-01

    Full Text Available The paper is intended to point out at the relation between security and its key vehicle that is humans themselves. It presents an option to strengthen security through purposeful education of peiple and their comprehensive training in peaceful settlement of conflicts.

  3. Health Information Security in Hospitals: the Application of Security Safeguards.

    Science.gov (United States)

    Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam

    2016-02-01

    A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.

  4. 20 CFR 404.1622 - Training.

    Science.gov (United States)

    2010-04-01

    ...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Determinations of Disability Administrative Responsibilities and Requirements § 404.1622 Training. The State will insure that all employees have an acceptable level of competence. We will provide training and other...

  5. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  7. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    Directory of Open Access Journals (Sweden)

    Elvin Shava

    2017-11-01

    Full Text Available This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three nongovernmental organisations (NGOs to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes.

  8. Development and Demonstration of a Security Core Component

    Energy Technology Data Exchange (ETDEWEB)

    Turke, Andy

    2014-02-28

    normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

  9. Information security in accordance with ISO/IEC 27000

    OpenAIRE

    Košćak , Damjan

    2011-01-01

    The diploma assignment discusses Information Technology Security according to standards ISO/IEC 27001 and ISO/IEC 27002. Diploma consists of two parts. In the first part of the diploma a theoretical bases of information security are presented. The second part presents the introduction of ISO/IEC 27001 security standard in the company »X« in wich I performed a practical training. In the closure my diploma work is upgraded with results of my research work and their analysis as well as wit...

  10. Securing the second front: achieving first receiver safety and security through competency-based tools.

    Science.gov (United States)

    Jones, Jamal; Staub, Judith; Seymore, Andrew; Scott, Lancer A

    2014-12-01

    Limited research has focused on the safety and security of First Responders and Receivers, including clinicians, hospital workers, public safety officials, community volunteers, and other lay personnel, during public health emergencies. These providers are, in some cases, at greater peril during large-scale disasters due to their lack of training and inadequate resources to handle major influxes of patients. Exemplified in the 1995 Tokyo sarin gas attacks and the 2008 Wenchuan earthquakes, lack of training results in poor outcomes for both patients and First Receivers. The improvement of knowledge and comfort level of First Receivers preparing for a medical disaster via an affordable, repeatable emergency preparedness training (EPT) curriculum. A 5-hour EPT curriculum was developed including nine learning objectives, 18 competencies, and 34 performance objectives. Following brief didactic and small group sessions, interprofessional teams of four to six trainees were observed in a large patient simulator designed to recreate environmentally challenging (ie, flood evacuation), multi-patient scenarios using a novel technique developed to utilize trainees as actors. Trained observers assessed successful completion of 16 individual and 18 team performance objectives. Prior to training, team members completed a 24-question knowledge assessment, a demographic survey, and a comfort level self-assessment. Following training, trainees repeated the 24 questions, self-assessment, and course assessment. One hundred ninety-five participants completed the course between November 2012 and August 2013. One hundred ninety-one (98.5%), 150 (76.9%), and 66 (33.8%) participants completed the pretest, post-test, and course assessment, respectively. The mean (SD) percentage of correct answers between the pretest and post-test increased from 46.3 (13.4) to 75.3 (12.2), P safety and security of the "Second Front.

  11. Security and health research databases: the stakeholders and questions to be addressed.

    Science.gov (United States)

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  12. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  13. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  14. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  15. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  16. Regional cooperation to reduce the safety and security risks of Orphan radioactive sources

    International Nuclear Information System (INIS)

    Howard, Geoffrey; Hacker, Celia; Murray, Allan; Romallosa, Kristine; Caseria, Estrella; Africa del Castillo, Lorena

    2008-01-01

    ANSTO's Regional Security of Radioactive Sources (RSRS) Project, in cooperation with the Philippine Nuclear Research Institute (PNRI), has initiated a program to reduce the safety and security risks of orphan radioactive sources in the Philippines. Collaborative work commenced in February 2006 during the Regional Orphan Source Search and Methods Workshop, co-hosted by ANSTO and the US National Nuclear Security Administration. Further professional development activities have occurred following requests by PNRI to ANSTO to support improvements in PNRI's capability and training programs to use a range of radiation survey equipment and on the planning and methods for conducting orphan source searches. The activities, methods and outcomes of the PNRI-ANSTO cooperative program are described, including: i.) Delivering a training workshop which incorporates use of source search and nuclide identification equipment and search methodology; and train-the-trainer techniques for effective development and delivery of custom designed training in the Philippines; ii.) Support and peer review of course work on Orphan Source Search Equipment and Methodology developed by PNRI Fellows; iii.) Supporting the delivery of the inaugural National Training Workshop on Orphan Source Search hosted by PNRI in the Philippines; iv.) Partnering in searching for orphan sources in Luzon, Philippines, in May 2007. The methods employed during these international cooperation activities are establishing a new model of regional engagement that emphasises sustainability of outcomes for safety and security of radioactive sources. (author)

  17. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  18. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  19. Organizational changes help Benin NGO better protect fragile ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-28

    Apr 28, 2016 ... ... climate change adaptation, and sustainable management of fragile ecosystems. ... build community-level capacity for sustainable development through ... solution is to build new houses in more secure areas and to relocate ...

  20. Interfacing Nuclear Security and Safeguards through Education and Support Centre Networks

    International Nuclear Information System (INIS)

    Nikonov, D.

    2015-01-01

    This paper presents the work of the International Nuclear Security Education Network (INSEN) and the International Nuclear Security Training and Support Centre Network (NSSC) as the means to achieve sustainable human resource development in member states. The paper also examines how both security and safeguards can benefit from collaborative and coordinated activities when such networks focus on practical achievements. (author)

  1. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  2. Smart security system for Indian rail wagons using IOT

    Science.gov (United States)

    Bhanuteja, S.; Shilpi, S.; Pragna, K.; Arun, M.

    2017-11-01

    The objective of this project is to create a Security System for the goods that are carried in open top freight trains. The most efficient way to secure anything from thieves is to have a continuous observation. So for continuous observation of the open top freight train, Camera module2 has been used. Passive Infrared Sensor (PIR) 1 has been used to detect the motion or to sense movement of people, animals, or any object. So whenever a motion is detected by the PIR sensor, the Camera takes a picture of that particular instance. That picture will be send to the Raspberry PI which does Skin Detection Algorithm and specifies whether that motion was created by a human or not. If a human makes it, then that picture will send to the drop box. Any Official can have a look at the same. The existing system has a CCTV installed at various critical locations like bridges, railway stations etc. but they does not provide a continuous observation. This paper describes about the Security System that provides continuous observation for open top freight trains so that goods can be carried safely to its destination.

  3. Beyond Fashoda: Anglo-French security cooperation in Africa since St-Malo

    OpenAIRE

    Chafer, Tony; Cumming, G.

    2010-01-01

    This article focuses on Anglo-French security and defence collaboration. It begins by setting out the lack of UK-French security cooperation in Africa from the colonial to the early post-Cold War era. It then shows how there has been a degree of institutionalization of Anglo-French relations, alongside greater cooperation in terms of European Security and Defence Policy missions and the training of African peacekeepers. Next, this study explains the recent evolution of UK-French security rela...

  4. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    Resilience Is a Complex Adaptive System of Systems ( CASoS ) ....60 4. Resilience Is Experienced and Demonstrated in Different Ways ..60 5. Resilience Is...The inclusion of a resilience module into existing homeland security training programs broadens the practitioner’s knowledge base from a basic level...psychology offer several considerations for the homeland security practitioner. The first consideration maintains that a de -emphasis on the

  5. In an Age of Open Access to Research Policies: Physician and Public Health NGO Staff Research Use and Policy Awareness.

    Science.gov (United States)

    Moorhead, Laura L; Holzmeyer, Cheryl; Maggio, Lauren A; Steinberg, Ryan M; Willinsky, John

    2015-01-01

    Through funding agency and publisher policies, an increasing proportion of the health sciences literature is being made open access. Such an increase in access raises questions about the awareness and potential utilization of this literature by those working in health fields. A sample of physicians (N=336) and public health non-governmental organization (NGO) staff (N=92) were provided with relatively complete access to the research literature indexed in PubMed, as well as access to the point-of-care service UpToDate, for up to one year, with their usage monitored through the tracking of web-log data. The physicians also participated in a one-month trial of relatively complete or limited access. The study found that participants' research interests were not satisfied by article abstracts alone nor, in the case of the physicians, by a clinical summary service such as UpToDate. On average, a third of the physicians viewed research a little more frequently than once a week, while two-thirds of the public health NGO staff viewed more than three articles a week. Those articles were published since the 2008 adoption of the NIH Public Access Policy, as well as prior to 2008 and during the maximum 12-month embargo period. A portion of the articles in each period was already open access, but complete access encouraged a viewing of more research articles. Those working in health fields will utilize more research in the course of their work as a result of (a) increasing open access to research, (b) improving awareness of and preparation for this access, and (c) adjusting public and open access policies to maximize the extent of potential access, through reduction in embargo periods and access to pre-policy literature.

  6. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  7. IAEA Activities in Nuclear Security, 18 April 2013, Delft, The Netherlands

    International Nuclear Information System (INIS)

    Amano, Y.

    2013-01-01

    I am pleased to take part in this event marking the launch of the new Masters Programme in Nuclear Security at the Reactor Institute Delft. The Institute has been an IAEA Collaborating Centre for nearly four years. Our two organisations have worked closely together in training and research, as well as in areas such as establishing quality management systems at nuclear analytical laboratories in IAEA Member States. The launch of the new Masters Programme in Nuclear Security by the Delft University of Technology marks a new stage in our cooperation. Four other European universities are also taking part in the programme: the University of Oslo, the Technical University of Vienna, the Brandenburg University of Applied Sciences, and the University of Manchester Dalton Nuclear Institute. I am pleased that the syllabus for the course has been developed from the IAEA's Educational Programme in Nuclear Security. I commend this effort to train a new generation of experts who can help to improve global nuclear security. Strengthening nuclear security throughout the world remains a challenge for all of us. National governments have primary responsibility for nuclear security, but international cooperation is vital.

  8. A Proactive Approach to Building Security.

    Science.gov (United States)

    Winters, Sharon

    1994-01-01

    Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…

  9. Development of Training Aids for Nuclear Forensics Exercises

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sangjun; Lee, Seungmin; Lim, Hobin; Hyung, Sangcheol; Kim, Jaekwang [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    Current radioactive-related training has focused on the prevention of a radiation disaster. Procedures to recover nuclear and radiological materials have been simplified due to the lack of training tools to reproduce real conditions for security and staff at nuclear facilities. The process of recovering materials is crucial in order to collect evidence and secure the safety of response forces. Moreover, exercises for recovering lost or missing a low dose radiation sources, does not well match with explosive like RDD blast situations. Therefore KINAC has been developing training aids in order to closely reproduce conditions of an actual terrorist attack and enhance effectiveness of exercises. These tools will be applied to Nuclear Forensics Exercises in which evidence collection is important at the time of an incident. KINAC has been developing training aids to enhance the effectiveness of such exercises by providing simulated conditions of actual terrorist incidents. Simulated training aids, based on the beacon system, operate with electromagnetic waves. These tools are able to simulate environments close to actual conditions by supplying similar properties of radioactivity. Training aids will be helpful in giving experience to security personnel and staff in the event of a terrorist incident. This experience includes collecting evidence for nuclear forensics. KINAC also has a plan to hold drills using these tools this year with The Armed Force CBR Defense Command.

  10. Development of Training Aids for Nuclear Forensics Exercises

    International Nuclear Information System (INIS)

    Lee, Sangjun; Lee, Seungmin; Lim, Hobin; Hyung, Sangcheol; Kim, Jaekwang

    2015-01-01

    Current radioactive-related training has focused on the prevention of a radiation disaster. Procedures to recover nuclear and radiological materials have been simplified due to the lack of training tools to reproduce real conditions for security and staff at nuclear facilities. The process of recovering materials is crucial in order to collect evidence and secure the safety of response forces. Moreover, exercises for recovering lost or missing a low dose radiation sources, does not well match with explosive like RDD blast situations. Therefore KINAC has been developing training aids in order to closely reproduce conditions of an actual terrorist attack and enhance effectiveness of exercises. These tools will be applied to Nuclear Forensics Exercises in which evidence collection is important at the time of an incident. KINAC has been developing training aids to enhance the effectiveness of such exercises by providing simulated conditions of actual terrorist incidents. Simulated training aids, based on the beacon system, operate with electromagnetic waves. These tools are able to simulate environments close to actual conditions by supplying similar properties of radioactivity. Training aids will be helpful in giving experience to security personnel and staff in the event of a terrorist incident. This experience includes collecting evidence for nuclear forensics. KINAC also has a plan to hold drills using these tools this year with The Armed Force CBR Defense Command

  11. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  12. Security and Health Research Databases: The Stakeholders and Questions to Be Addressed

    OpenAIRE

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding s...

  13. Post-disaster housing reconstruction: Perspectives of the NGO and local authorities on delay issues

    Science.gov (United States)

    Khalid, Khairin Norhashidah; Nifa, Faizatul Akmar Abdul; Ismail, Risyawati Mohamed; Lin, Chong Khai

    2016-08-01

    Post disaster reconstruction is complex, dynamic and chaotic in nature and as such represents many challenges because it is unlike normal construction. However, the time scale of reconstruction is shorter than the normal construction, but it often deals with uncertainties and the scale of the construction activities required is relatively high. After a disaster impacts a country, many governments, institutions and aid organizations cooperate and involved with the reconstruction process. This is seen as a tool for applying policies and programs designed to remedy the weakness in developmental policies, infrastructure and institutional arrangements. This paper reports a part of an on-going research on post-disaster housing reconstruction in Malaysia. An extensive literature review and pilot interviews were undertaken to establish the factors that contribute to the delay in post-disaster reconstruction project. Accordingly, this paper takes the perspective of recovery from non-government organization (NGO) and local authorities which act as providers of social services, builders of infrastructure, regulators of economic activity and managers of the natural environment. As a result, it is important on how those decisions are made, who is involved in the decision-making, and what are the consequences of this decision.

  14. Secure e-mail and Web browsing

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    This is an entry-level 1.5-hour training course aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. Register at CTA

  15. Vehicle access and search training manual. Report for Oct 77-sep 79

    International Nuclear Information System (INIS)

    Obermiller, J.E.; Wait, H.J.

    1979-11-01

    This Vehicle Access and Search Training Manual is intended to assist NRC-licensed organizations and their security personnel in developing vehicle access, control and search operations necessary at nuclear fuel cycle facilities and at reactor facilities. The manual is based on security requirements prescribed by The Nuclear Regulatory Commission as contained in Title 10 of the Code of Federal Regulations, Part 73, 'Physical Protection of Plants and Materials.' As a condition of the licensing agreement, the licensee is required to maintain a physical protection system which includes a training program for security personnel. The manual includes lesson plans in (1) controlling vehicle entry and exit, (2) searching for contraband, and (3) protecting the facility from sabotage and/or theft of special nuclear materials. These training guidelines provide information and instruction for self-study, discussion and hands-on training. A job knowledge test reviews the entire training program

  16. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  17. Energy Assurance Technical Training and Awareness Program/Energy Infrastructure Training and Analysis Center

    Energy Technology Data Exchange (ETDEWEB)

    Barbara McCabe

    2005-11-15

    This report covers the work completed during Year One (Year One has a 16 month project period) of a five- year Cooperative Agreement (DE-FC26-03NT41895) between the International Union of Operating Engineers (IUOE) National Hazmat Program (OENHP) and the U. S. Department of Energy (DOE) National Energy Technology Laboratory (NETL). This final technical report is being submitted, as required by the Cooperative Agreement, within 90 (calendar) days after the project period ends (December 31, 2004). The resources allocated to Year One of the Cooperative Agreement were adequate for the completion of the required deliverables. All deliverables have been completed and sent to AAD Document Control as directed in the cooperative agreement. The allocation for Year One required 20-25 trainers to be trained in each of five Train-the-Trainer courses and a total of 6,000 workers trained throughout the country. Through cost savings employed for the scheduling and conduct of Train-the-Trainer, instructor refreshers, and direct training classes, 3171 workers have been trained to date. This total incorporates 159 trainers and members from management, local, county, state and federal organizations identified in the Strategic Plan. The largest percentage of personnel trained is heavy equipment operators, and building engineers, which is the largest targeted population identified under this cooperative agreement. The OENHP, using existing curriculum as appropriate, has modified and developed new training modules that have been used to establish four different levels of training courses. The four courses are: (1) EA 500 Energy Assurance Train-the-Trainer, (2) EA 400 Energy Assurance Instructor Refresher, (3) EA 300 Energy Assurance, and (4) EA 100 Energy Assurance Awareness. Training modules cover topics, such as, but not limited to, facility vulnerability and vulnerability assessment, physical security- heating, ventilation, air conditioning, terrorism awareness, weapons of mass

  18. GTRI Remote Monitoring System: Training and Operational Needs Assessment Analysis Report

    Energy Technology Data Exchange (ETDEWEB)

    Day, Debra E.; Fox, Sorcha

    2012-04-20

    The mission of the United States Department of Energy (DOE) National Nuclear Security Administrations (NNSA's) Global Threat Reduction Initiative (GTRI) is to identify, secure, recover and facilitate the disposition of vulnerable nuclear and high-risk radioactive materials around the world that pose a threat to the United States and the international community. The GTRI's unique mission to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide directly addresses recommendations of the 9/11 Commission1, and is a vital part of the President's National Security Strategy and the Global Initiative. The GTRI Remote Monitoring System (RMS) is a standalone security system that includes radiation and tamper alarms, and CCTV; which can be transmitted securely over the Internet to multiple on-site and off-site locations. Through our experiences during installation of the system at 162 sites, plus feedback received from Alarm Response Training course participants, site input to project teams and analysis of trouble calls; indications were that current system training was lacking and inconsistent. A survey was undertaken to gather information from RMS users across the nation, to evaluate the current level of training and determine what if any improvements needed to be made. Additional questions were focused on the operation of the RMS software. The training survey was initially sent electronically to 245 users at the RMS sites and achieved a 37.6% return rate. Analysis of the resulting data revealed that 34.6% of the respondents had not received training or were unsure if they had, despite the fact that vendor engineers provide training at installation of the system. Any training received was referred to as minimal, and brief, not documented, and nothing in writing. 63.7% of respondents said they were either not at all prepared or only somewhat prepared to use the RMS software required to effectively operate the

  19. Transportation Security Institute: recruiting next generation professionals.

    Science.gov (United States)

    2012-08-01

    "The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...

  20. Regional Radiological Security Partnership in Southeast Asia - Increasing the Sustainability of Security Systems at the Site-Level by Using a Model Facility Approach

    International Nuclear Information System (INIS)

    Chamberlain, Travis L.; Dickerson, Sarah; Ravenhill, Scott D.; Murray, Allan; Morris, Frederic A.; Herdes, Gregory A.

    2009-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO), created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's Global Threat Reduction Initiative (GTRI) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP is to cooperate with countries in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports objectives to improve the security of high risk radioactive sources by raising awareness of the need and developing national programs to protect and control such materials, improve the security of such materials, and recover and condition the materials no longer in use. The RRSP has utilized many tools to meet those objectives including: provision of physical protection upgrades, awareness training, physical protection training, regulatory development, locating and recovering orphan sources, and most recently - development of model security procedures at a model facility. This paper discusses the benefits of establishing a model facility, the methods employed by the RRSP, and three of the expected outcomes of the Model Facility approach. The first expected outcome is to increase compliance with source security guidance materials and national regulations by adding context to those materials, and illustrating their impact on a facility. Second, the effectiveness of each of the tools above is increased by making them part of an integrated system. Third, the methods used to develop the model procedures establishes a sustainable process that can ultimately be transferred to all facilities beyond the model. Overall, the RRSP has utilized the Model Facility approach as an important tool to increase the security of radioactive sources, and to position facilities and countries for the long term secure management of those sources.

  1. Supporting secure programming in web applications through interactive static analysis

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  2. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  3. Migrant Women, Economic Security and the Challenge of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Migrant Women, Economic Security and the Challenge of Reintegration ... women's migration, is a growing feature of economic development in Asia. ... with training in confidence-building, money management and entrepreneurship, and offers ...

  4. General Employee Training Live, Course 15503

    Energy Technology Data Exchange (ETDEWEB)

    Gabel, Daniel Glen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hughes, Heather [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-25

    This training at Los Alamos National Laboratory contains the following sections: Introduction to the Laboratory, Institutional Quality Assurance, Facilities, Policies, Procedures, and Other Requirements, Safety Expectations, Worker Protection: Occupational Safety and Health, Industrial Hygiene and Safety, Lockout/Tagout, General Employee Radiological Training, Fire Protection, Security, Emergency Operations, Occupational Health, and Environment.

  5. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  6. Safeguards training at Pacific Northwest Laboratory

    International Nuclear Information System (INIS)

    Dickman, D.A.

    1988-01-01

    In recent years considerable attention has been given to upgrading security education programs at facilities across the country. At Pacific Northwest Laboratory (PNL), a Laboratory-wide Safeguard Awareness Training Program has been established in order to raise the cognizance of the entire staff with regard to safeguards issues and concerns. This aggressive safeguards program involves a strong interface of physical security measure and material control and accountability systems. Within PNL, four distinct audiences were defined and a needs assessment analysis performed for each to determine specific training requirements. The target audiences identified were: material balance area (MBA) custodians, managers of material balance areas, material handlers, and new employees. Five safeguards training courses were created to meet the needs of those audiences. This paper discusses the development of the Safeguards Awareness Program at PNL and its benefits to the Laboratory

  7. You Should Be the Specialist! Weak Mental Rotation Performance in Aviation Security Screeners - Reduced Performance Level in Aviation Security with No Gender Effect.

    Science.gov (United States)

    Krüger, Jenny K; Suchan, Boris

    2016-01-01

    Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.

  8. Why training older employees is less effective

    OpenAIRE

    Zwick, Thomas

    2011-01-01

    This paper shows that training of older employees is less effective. Training effectiveness is measured with respect to key dimensions such as career development, earnings, adoption of new skills, flexibility or job security. Older employees also pursue less ambitious goals with their training participation. An important reason for these differences during the life cycle might be that firms do not offer the “right” training forms and contents. Older employees get higher returns from informal ...

  9. Umbrella project for Bangladesh: strengthening NGO capacity and linkages to improve reproductive health service and information. RAS/98/P55.

    Science.gov (United States)

    1999-06-01

    In Bangladesh, the UN Population Fund is working to strengthen nongovernmental organization (NGO) capacity and linkages to improve reproductive health services and information. Specifically, the aim is to strengthen the technical and human resource capacity of participating NGOs and the functional linkages between national NGOs and relevant government agencies to help harmonize and standardize the delivery of reproductive health information and services. This umbrella project collaborates with RHI-participating NGOs in a policy paper on adolescent reproductive health, and will maintain contact with the regional dimension project to collaborate its activities. Programs implemented by partner NGOs are being reviewed and monitored, and linkages among national NGOs and government agencies are being developed. The main activities of the project are enumerated.

  10. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  11. The European Union’s Aviation Security Mission in South Sudan

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Rodt, Annemarie Peen

    of the security situation in the country, all EU personnel were evacuated in January 2014, and the mission was (informally) terminated after fulfilling its mandated deployment period. Even though the mission had succeeded in training 350 personnel prior to the evacuation, its contribution to the overall security......When South Sudan gained independence in 2011, the new country needed assistance from external actors during the transition to prevent the security situation from deteriorating. In 2012 the EU launched its Aviation Security Mission (EUAVSEC) in South Sudan as part of its Common Security and Defence...... Policy. This came in response to a South Sudanese request for EU support and assistance in strengthening the security in Juba International Airport, as it had proven difficult for South Sudan to establish a fully operational transport hub. The EU estimated that an improvement of the airport security...

  12. Nuclear Waste Management in Sweden in Comparison with other European Countries - NGO Experiences of the COWAM Process

    International Nuclear Information System (INIS)

    Holmstrand, Olov

    2003-01-01

    This paper describes opinions on nuclear waste management from the viewpoint of the local NGOs in Sweden co-operating in The Waste Network (Avfallskedjan), These opinions have been encouraged and developed by active participation in the COWAM process. The COWAM process has shown both the similarities and the differences in the nuclear waste management in several European countries. However the similarities dominate concerning the key issues of decision-making and the fundamentals of the relations between operators and regulators on one side and local citizens at proposed repository sites on the other side. The mistrust between different actors is a fundamental reason for the failure to make progress in the nuclear waste management. Normally it is argued that ordinary people and NGOs distrust established operators, agencies and governments. But there is also an obvious distrust for citizens' groups and NGOs by the operators. At least, this is the opinion of the NGO groups in Sweden

  13. Three Perspectives on DSEEP and Security : Training Goals, Use Cases and the Selection of Security Measures

    NARCIS (Netherlands)

    Möller, B.; Croom-Johnson, S.; Huiskamp, W.

    2013-01-01

    As joint, combined and Civil-Military exercises are becoming increasingly common, the need for security in collective mission simulation is growing. SISO has developed the Distributed Simulation Engineering and Execution Process (DSEEP) standard that provides a recommended process for development,

  14. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  15. But you should be the specialist! Weak Mental Rotation Performance in Aviation Security Screeners.Reduced performance level in aviation security with no gender effect.

    Directory of Open Access Journals (Sweden)

    Jenny Kathinka Krüger

    2016-03-01

    Full Text Available Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.

  16. Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)

    Science.gov (United States)

    2012-05-01

    protect, and secure the United States and its interests. • AOF is the United States, Alaska, Canada, Mexico, Bahamas, Puerto Rico , and the U.S. Virgin...Criteria (UFC) for Smart Microgrid Cyber design guides for Industrial Control Systems (ICS) Residual systems Operations and Maintenance Operator...Training Sustainment Commercial Transition Cooperation with NIST for microgrid security standards Working with industry associations and

  17. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  18. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  19. Using Genetic Algorithms in Secured Business Intelligence Mobile Applications

    Directory of Open Access Journals (Sweden)

    Silvia TRIF

    2011-01-01

    Full Text Available The paper aims to assess the use of genetic algorithms for training neural networks used in secured Business Intelligence Mobile Applications. A comparison is made between classic back-propagation method and a genetic algorithm based training. The design of these algorithms is presented. A comparative study is realized for determining the better way of training neural networks, from the point of view of time and memory usage. The results show that genetic algorithms based training offer better performance and memory usage than back-propagation and they are fit to be implemented on mobile devices.

  20. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... cybersecurity awareness, education, talent management, and professional development and training. NICCS Portal... Education Office, will submit the following Information Collection Request (ICR) to the Office of Management... contemplated: Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. 3546; Homeland Security...

  1. Streamlining cooperation between public authorities and civil society : Exclusive Baltinfo interview with Arnold Rüütel, president of Estonia and patron of the IV Baltic Sea NGO Forum in Pärnu 16-17 April / Arnold Rüütel

    Index Scriptorium Estoniae

    Rüütel, Arnold

    2004-01-01

    Intervjuu mittetulundusühingute seminari "IV BALTIC SEA NGO FORUM" patrooni Arnold Rüütliga kodanikeühenduste ja avaliku sektori koostööst, ühiskondlikust lepingust, 2002. aastal Riigikogus vastu võetud Eesti kodanikuühiskonna arengu kontseptsioonist

  2. U.S.-China Radiological Source Security Project: Continuing And Expanding Bilateral Cooperation

    International Nuclear Information System (INIS)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-01-01

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy's National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  3. U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-10-07

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  4. E-groups training

    CERN Multimedia

    HR Department

    2012-01-01

    There will be an e-groups training course on 16 March 2012 which will cover the main e-groups functionalities i.e.: creating and managing e-groups, difference between static and dynamic e-groups, configuring posting restrictions and archives, examples of where e-groups can be used in daily work. Even if you have already worked with e-groups, this may be a good opportunity to learn about the best practices and security related recommendations when using e-groups. You can find more details as well as enrolment form for the training (it’s free) here. The number of places is limited, so enrolling early is recommended.   Technical Training Tel. 72844

  5. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  6. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  7. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  8. A Research on the Determination of the Perception Levels of Shipyard Workers Related To Occupational Health and Security: Yalova Case

    Directory of Open Access Journals (Sweden)

    Ersin Kavi

    2011-06-01

    Full Text Available Shipbuilding sector, which has an important employment and export potential, is getting importance in Turkey. In this sector, the number of employees who work directly is 35.000 and the numbers of employees who work indirectly 100.000 are employed. The sector requires obligations and necessary activities in terms of vocational health and security since it includes working risks and has an increasing importance. Because of the lack of the vocational health and security measures, it has been seen many deaths and accidents in Tuzla Shipyards. Especially, the lack of trainings and measures to prevent to the industrial accident is an indication that there is a perception problem towards vocational health and security. Contrary to this, though it is taught on vocational health and security, the perceptions of the workers may not be enough. In this mean, it needs to be studied what to extend and how the workers perceive and apply the vocational health and security trainings or applications, which are taught at the shipyards, in workplace. In this paper, it is going to be studied the knowledge level of the workers related to the vocational health and security, determined training needs and if they satisfied with the trainings and measures by a survey in the Yalova shipyards.

  9. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  10. New developments in technology-assisted supervision and training: a practical overview.

    Science.gov (United States)

    Rousmaniere, Tony; Abbass, Allan; Frederickson, Jon

    2014-11-01

    Clinical supervision and training are now widely available online. In this article, three of the most accessible and widely adopted new developments in clinical supervision and training technology are described: Videoconference supervision, cloud-based file sharing software, and clinical outcome tracking software. Partial transcripts from two online supervision sessions are provided as examples of videoconference-based supervision. The benefits and limitations of technology in supervision and training are discussed, with an emphasis on supervision process, ethics, privacy, and security. Recommendations for supervision practice are made, including methods to enhance experiential learning, the supervisory working alliance, and online security. © 2014 Wiley Periodicals, Inc.

  11. An Examination of Tailored Training Offsets on Core Mortarman Skills Acquisition

    Science.gov (United States)

    2016-02-01

    Training, Mortar, Mortar Gunner’s Exam , Tests SECURITY CLASSIFICATION OF 19. LIMITATION OF ABSTRACT 20...training offsets in 11C OSUT, and ( c ) provide guidance and tools for developing effective training offsets to enhance Soldiers’ core skills proficiencies...Two-Week Mortar Training Including Gunner’s Exam ............................... 13 Knowledge and Application Tests

  12. International Nuclear Security Situation And China’s Approach

    Institute of Scientific and Technical Information of China (English)

    Liu Chong

    2016-01-01

    Since 2010,the three Nuclear Security Summits have made a number of achievements,but the international nuclear security situation is still not relaxed.The rapid development of China’s domestic nuclear facilities and a large amount of nuclear and radioactive materials related to nuclear power,active international nuclear black market in China’s surrounding regions,rather serious domestic and international terrorist threats as well as the emerging technology development bring about new challenges to nuclear security.Facing the complicated and long-term nuclear security situation,China from the perspective of monitoring mechanism,laws and regulations system,technical capability-building and nuclear emergency preparedness,takes a series of effective measures to build the national nuclear security capacity,and strictly fulfills its international obligations,actively participates in upgrading the international nuclear non-proliferation regime and relevant international rules,and actively takes part in the Nuclear Security Summit process,strengthens bilateral cooperation on nuclear security with major countries especially the United States of America,and jointly organizes various training with International Atomic Energy Agency,which has made great contributions to upgrading the global nuclear security level.At the end of the Nuclear Security Summit process,China should continue to strengthen its domestic nuclear security capacity building,and promote the international community to treat the root causes and symptoms,adopt a comprehensive strategy,and work together,effectively prevent and dissolve the nuclear terrorist threats.

  13. Enhancing training in the main control room

    International Nuclear Information System (INIS)

    McGuigan, K.; O'Leary, K.; Canavan, K.

    2004-01-01

    In 2003 Pickering B Nuclear of Ontario Power Generation installed a Desktop Simulator (DTS) in the Main Control Room (MCR) for training purposes. This paper will outline why this training enhancement was undertaken and the approach taken to secure its use in an active MCR environment while minimizing distractions to plant operations. (author)

  14. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    Science.gov (United States)

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  15. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    Science.gov (United States)

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  16. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    Science.gov (United States)

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  17. One Health in food safety and security education: A curricular framework.

    Science.gov (United States)

    Angelos, J; Arens, A; Johnson, H; Cadriel, J; Osburn, B

    2016-02-01

    The challenges of producing and distributing the food necessary to feed an anticipated 9 billion people in developed and developing societies by 2050 without destroying Earth's finite soil and water resources present extremely complex problems that lack simple solutions. The ability of modern societies to adequately address these and other food-related problems will require an educated workforce trained not only in traditional food safety, security, and public health, but also in other areas including food production, sustainable practices, and ecosystem health. To help address the need for such an educated workforce, a curricular framework was developed to assist those tasked with designing education and training for future food systems workers. One sentence summary: A curricular framework for education and training in food safety and security was developed that incorporates One Health concepts. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  18. Appropriate training and retention of community doctors in rural areas: a case study from Mali

    Directory of Open Access Journals (Sweden)

    Coulibaly Seydou

    2008-11-01

    Full Text Available Abstract Background While attraction of doctors to rural settings is increasing in Mali, there is concern for their retention. An orientation course for young practicing rural doctors was set up in 2003 by a professional association and a NGO. The underlying assumption was that rurally relevant training would strengthen doctors' competences and self-confidence, improve job satisfaction, and consequently contribute to retention. Methods Programme evaluation distinguished trainees' opinions, competences and behaviour. Data were collected through participant observation, group discussions, satisfaction questionnaires, a monitoring tool of learning progress, and follow up visits. Retention was assessed for all 65 trainees between 2003 and 2007. Results and discussion The programme consisted of four classroom modules – clinical skills, community health, practice management and communication skills – and a practicum supervised by an experienced rural doctor. Out of the 65 trained doctors between 2003 and 2007, 55 were still engaged in rural practice end of 2007, suggesting high retention for the Malian context. Participants viewed the training as crucial to face technical and social problems related to rural practice. Discussing professional experience with senior rural doctors contributed to socialisation to novel professional roles. Mechanisms underlying training effects on retention include increased self confidence, self esteem as rural doctor, and sense of belonging to a professional group sharing a common professional identity. Retention can however not be attributed solely to the training intervention, as rural doctors benefit from other incentives and support mechanisms (follow up visits, continuing training, mentoring... affecting job satisfaction. Conclusion Training increasing self confidence and self esteem of rural practitioners may contribute to retention of skilled professionals in rural areas. While reorientations of curricula in

  19. Appropriate training and retention of community doctors in rural areas: a case study from Mali.

    Science.gov (United States)

    Van Dormael, Monique; Dugas, Sylvie; Kone, Yacouba; Coulibaly, Seydou; Sy, Mansour; Marchal, Bruno; Desplats, Dominique

    2008-11-18

    While attraction of doctors to rural settings is increasing in Mali, there is concern for their retention. An orientation course for young practicing rural doctors was set up in 2003 by a professional association and a NGO. The underlying assumption was that rurally relevant training would strengthen doctors' competences and self-confidence, improve job satisfaction, and consequently contribute to retention. Programme evaluation distinguished trainees' opinions, competences and behaviour. Data were collected through participant observation, group discussions, satisfaction questionnaires, a monitoring tool of learning progress, and follow up visits. Retention was assessed for all 65 trainees between 2003 and 2007. The programme consisted of four classroom modules--clinical skills, community health, practice management and communication skills--and a practicum supervised by an experienced rural doctor. Out of the 65 trained doctors between 2003 and 2007, 55 were still engaged in rural practice end of 2007, suggesting high retention for the Malian context. Participants viewed the training as crucial to face technical and social problems related to rural practice. Discussing professional experience with senior rural doctors contributed to socialisation to novel professional roles. Mechanisms underlying training effects on retention include increased self confidence, self esteem as rural doctor, and sense of belonging to a professional group sharing a common professional identity. Retention can however not be attributed solely to the training intervention, as rural doctors benefit from other incentives and support mechanisms (follow up visits, continuing training, mentoring...) affecting job satisfaction. Training increasing self confidence and self esteem of rural practitioners may contribute to retention of skilled professionals in rural areas. While reorientations of curricula in training institutions are necessary, other types of professional support are needed

  20. Methodology of shooting training using modern IT techniques

    Science.gov (United States)

    Gudzbeler, Grzegorz; Struniawski, Jarosław

    2017-08-01

    Mastering, improvement, shaping and preservation of skills of safe, efficient and effective use of the firearm requires the use of relevant methodology of conducting the shooting training. However reality of police trainings does not usually allow for intensive training shooting with the use of ammunition. An alternative solution is the use of modern training technologies. Example of this is the "Virtual system of improvement tactics of intervention services responsible for security and shooting training." Introduction of stimulator to police trainings will enable complete stuff preparation to achieve its tasks, creating potential of knowledge and experience in many areas, far exceeding the capabilities of conventional training.

  1. Technical obstacles to nuclear security - Russian perspective

    International Nuclear Information System (INIS)

    Pshakin, G.

    2005-01-01

    Full text: Present political, economical and social development the world - wide and in particular countries and regions facilitate number of serious and dangerous challenges for people responsible for security of materials and facilities, which could be used as a threat to the humankind in case of unauthorized approach. A number of factors have impact on the security including political, social, financial and technical nature. The security of nuclear materials and facilities where nuclear materials located and under processing is facing a number of problems such as control of the personnel who is handling the materials, access to the materials and the facilities, accounting and control of the materials storage, transportation, transactions, processing, physical protection of the materials. Each aspect of those problems must be taken into account for establishing most efficient way to keep the nuclear materials out of hands of the terrorists. Technical aspects which require serious and intent relation from political and technical communities in Russia (as example) are the following: legal base for nuclear materials protection, control and accounting and export control; personnel for nuclear materials control and accounting - skill, reliability, responsibility, training and new generation education; personnel for physical protection - skill, reliability, responsibility, training; structure of the system and equipment for materials control, verification, accountability; structure of the system and equipment for physical protection; regulatory supervision of the MPC+A system effectiveness. (author)

  2. Hanford general employee training: Computer-based training instructor's manual

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    The Computer-Based Training portion of the Hanford General Employee Training course is designed to be used in a classroom setting with a live instructor. Future references to this course'' refer only to the computer-based portion of the whole. This course covers the basic Safety, Security, and Quality issues that pertain to all employees of Westinghouse Hanford Company. The topics that are covered were taken from the recommendations and requirements for General Employee Training as set forth by the Institute of Nuclear Power Operations (INPO) in INPO 87-004, Guidelines for General Employee Training, applicable US Department of Energy orders, and Westinghouse Hanford Company procedures and policy. Besides presenting fundamental concepts, this course also contains information on resources that are available to assist students. It does this using Interactive Videodisk technology, which combines computer-generated text and graphics with audio and video provided by a videodisk player.

  3. Theory, training and timing: psychosocial interventions in complex emergencies.

    Science.gov (United States)

    Yule, William

    2006-06-01

    The Asian tsunami of December 2004 galvanised mental health and emergency agencies in a way that no other recent disaster has done. The loss of life and forced migration focused national and international agencies on the need to provide appropriate psychosocial care from the very beginning. The prior academic arguments surrounding early intervention paled into insignificance against the urgent need to reduce distress and prevent chronic mental health problems. This chapter notes that there was a major, planned and early intervention following the earthquake in Bam, exactly one year earlier. The lessons from that are only now beginning to filter through and help shape better responses to disasters. It is argued that too many non-governmental organizations (NGOs) and even IGOs are following theoretical positions that have little empirical justification. There is an urgent need for training for mental health and NGO personnel alike to deliver evidence-based psychological first aid. There is no justification for mental health responses to be delayed until weeks after a disaster happens.

  4. WEST AFRICAN JOURNAL OF MEDICINE

    African Journals Online (AJOL)

    Administrator

    Model Alternative Strategies for Tuberculosis and Human Immune Deficiency .... and communication (IECs) materials on. TB/HIV were distributed and ... counseling, training and social marketing/ ... media in NGO programmes and activities.

  5. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  6. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  7. Training Hospital Managers as to Fire Management

    Directory of Open Access Journals (Sweden)

    Roya Khalili

    2015-01-01

    Full Text Available Fire is one of the most dangerous phenomena in the world which yields main damages, healthy and economical, and is thus a major threat to hospitals. Since, most of the residents in hospitals are the individuals who cannot rescue themselves in such situations, fire in hospitals is more hazardous than any other public place; hence, it can endanger several sophisticated medical equipment. Therefore, security against fire plays a very vital role in hospitals and has to be taken into account by authorities. Among the personnel, hospital manager and the security guard supervisor are much more responsible. One of their responsibilities includes planning fire security scheme in hospitals to reduce the death rate caused by fire so that there is less threat to the building of hospital admits content. Due to the significance of this issue in hospitals, it seems necessary for the personnel to be aware of security measures against fire. Therefore, a study was carried out in Isfahan University of Medical Sciences teaching hospitals on all managers, their awareness about this issue was measured through a questionnaire. The results indicated that of a total of 60, the obtained average was (37.63+7.36 in the medium level. Also, most of the managers believed that proper and updated training by skillful trainers regarding hospital security measures and its application can be truly effective on their productivity. Thus, it is concluded that practical training the mentioned target group (hospital personnel especially clerks and the managers about the security plans can be effective in the control of fire and security measures, resulting in reduction of accidents and human and economic loss in the future.

  8. Development of a national sport event risk management training program for college command groups.

    Science.gov (United States)

    Hall, Stacey A

    2013-01-01

    The US Department of Homeland Security identified college sport venues as terrorist targets due to the potential for mass casualties and catastrophic social and economic impact. Therefore, it is critical for college sport safety and security personnel to implement effective risk management practices. However, deficiencies have been identified in the level of preparedness of college sport event security personnel related to risk management training and effective emergency response capabilities. To address the industry need, the National Center for Spectator Sports Safety and Security designed, developed, and evaluated a national sport event risk management training program for National Collegiate Athletic Association command groups. The purpose of this article was to provide an overview of the design, development, and evaluation process.

  9. Nuclear power reactor security personnel training and qualification plan reviewer workbook

    International Nuclear Information System (INIS)

    1979-06-01

    The Training and Qualification Plan Reviewer Workbook has been developed to provide the information required for evaluating the adequacy of the Training and Qualification (T and Q) Plans developed to meet the requirements of 10 CFR 73.55(b)(4) and 10 CFR 73, Appendix B

  10. The Campus Executive's Role in Security and Liability Issues.

    Science.gov (United States)

    Bromley, Max; Territo, Leonard

    1986-01-01

    Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)

  11. More Training, Less Security? Training and the Quality of Life at Work in Argentina, Brazil and Chile.

    Science.gov (United States)

    Jeria Caceres, Maria Mercedes

    2002-01-01

    Conditional multiple correspondence analysis of data from workers in Argentina, Brazil, and Chile found that training was a consequence rather than a cause of promotion. More job training resulted in increased salary and benefits as well as in greater costs such as hours of work and work-related insecurity. (Contains 21 references.) (JOW)

  12. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer K; Schwartz, Moshe; Nakamura, Kennon H

    2008-01-01

    .... In Iraq, private firms known as Private Security Contractors (PSCs) serve to protect individuals, transport convoys, forward operating bases, buildings, and other economic infrastructure, and are training Iraqi police and military personnel...

  13. Co-operating of citizens with power structures as an indicator of possibility application of the armed violence by public authorities

    Directory of Open Access Journals (Sweden)

    A. V. Bader

    2016-08-01

    A characteristic feature of a democratic political regime is that security forces operating in the public interest, they don’t take part in the political struggle, thus ensuring its stability. In democracies countries subject to government security forces and their use clearly defined by law. For legal democratic state autonomy security forces is unacceptable. In democracies the citizens do not translate function power structures. The interaction detected in participating in the formation of the staff of the security forces and control over security forces. Said control is implemented through coverage of law enforcement agencies in the independent media, NGO activities, meetings and other mechanisms of direct democracy.

  14. 32 CFR 806b.52 - Who needs training.

    Science.gov (United States)

    2010-07-01

    ... specialists, finance officers, information managers, supervisors, and individuals working with medical and security records. Commanders will ensure that above personnel are trained annually in the principles and...

  15. Source Security Program in the Philippines: a lost source search experience

    International Nuclear Information System (INIS)

    Romallosa, Kristine M.; Salabit, Maria T.; Caseria, Estrella; Valdezco, Eulinia

    2008-01-01

    The Philippine Nuclear Research Institute (PNRI), the national agency in the licensing and regulations of radioactive materials in the country, is strengthening its capabilities in the security of radioactive sources. Part of this program is the PNRI's participation in the Regional Security of Radioactive Sources (RSRS) Project of the Australian Nuclear Science and Technology Organization (ANSTO). The project has provided equipment and methods training, assistance in the development of PNRI's own training program and support for actual orphan source search activities. On May 2007, a source search for the two lost Cs-137 level gauges of a steel manufacturing company was conducted by the PNRI and ANSTO. The source search are the: a) Development of instrument and source search training for the team, the National Training Workshop on Orphan Source Searches which was organized and conducted as a result of train-the-trainors fellowship under the RSRS project; and b) Planning and implementation of the lost source search activity. The conduct of the actual search on warehouses, product yard, canals, dust storage, steel making building, scrap yards and nearby junk shops of the steel plant took one week. The week-long search did not find the lost sources. However, naturally occurring radioactive materials identified to be Thorium, were found on sands, bricks and sack piles that are stored and/or generally present in the warehouses, yard and steel making building. The search activity had therefore cleared the facility of the lost source and its corresponding hazards. The NORM found present in the plant's premises on the other hand brought the attention of the management of the needed measures to ensure safety of the staff from possible hazards of these materials. Currently, the course syllabus that was developed is continuously enhanced to accommodate the training needs of the PNRI staff particularly for the emergency response and preparedness. This component of the source

  16. SecureCPS: Defending a nanosatellite cyber-physical system

    Science.gov (United States)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  17. Orwellian risks in European conflict prevention discourse

    NARCIS (Netherlands)

    de Wilde, J.H.

    2006-01-01

    Conflict prevention has been the nomenclature of a non-military type of security policy, but that is changing. During the Cold War, the OSCE was a forum for conflict prevention at an interstate level. After the Cold War, OSCE conflict prevention turned to domestic affairs, comparable to NGO

  18. 2008 Homeland Security S and T Stakeholders Conference West. Volume 4. Wednesday

    Science.gov (United States)

    2008-01-16

    www.npia.police.uk Polonium 210 Interoperability - lessons Major Incident - CBRN Images courtesy of BBC www.npia.police.uk Boscastle 2007...Washington Training Session 37: Preparing First Responders for Food Systems Disasters Jerry Gillespie, DVM, PhD Director, Western Institute for... Food Safety and Security Training Session 39: Technology Adoption & Innovation 1 Dr. Neal Thornberry, Innovation Chair Graduate School of

  19. Construction Strategies of Social Security System for Wan-jiang Urban Belt’s Migrant Workers

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Theoretical debate and practice exploration on social security of migrant workers were introduced.The political direction and security layer on social security for migrant workers in Wan-jiang urban belt were analyzed:the first layer is to implement wage payment guarantee and employment injury insurance;the second layer is to emphasize serious disease insurance and endowment insurance;the third layer is unemployed insurance and social assistance.The primary strategy of building a social security system for migrant workers in Wan-jiang urban belt was put up:wage payment guarantee system that is united in certain regions should be promoted;employment injury insurance system that is undertaken by enterprises should be built;a social health care system for serious diseases should be set up;multi-layers endowment insurance system for migrant workers should be created;vocational training and training in how to start a business should be built as well as the unemployment insurance system;social assistant system based on the basic cost of living allowances should be set up.

  20. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  1. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  2. Assessing Security of Supply: Three Methods Used in Finland

    Science.gov (United States)

    Sivonen, Hannu

    Public Private Partnership (PPP) has an important role in securing supply in Finland. Three methods are used in assessing the level of security of supply. First, in national expert groups, a linear mathematical model has been used. The model is based on interdependency estimates. It ranks societal functions or its more detailed components, such as items in the food supply chain, according to the effect and risk pertinent to the interdependencies. Second, the security of supply is assessed in industrial branch committees (clusters and pools) in the form of indicators. The level of security of supply is assessed against five generic factors (dimension 1) and tens of business branch specific functions (dimension 2). Third, in two thousand individual critical companies, the maturity of operational continuity management is assessed using Capability Maturity Model (CMM) in an extranet application. The pool committees and authorities obtain an anonymous summary. The assessments are used in allocating efforts for securing supply. The efforts may be new instructions, training, exercising, and in some cases, investment and regulation.

  3. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as... security equipment and systems; (i) Inspection, control, and monitoring techniques; (j) Methods of physical...

  4. A robust University-NGO partnership: Analysing school efficiencies in Bolivia with community-based management techniques

    Directory of Open Access Journals (Sweden)

    Joao Neiva de Figueiredo

    2013-09-01

    Full Text Available Community-based management research is a collaborative effort between management, academics and communities in need with the specific goal of achieving social change to foster social justice. Because it is designed to promote and validate joint methods of discovery and community-based sources of knowledge, community-based management research has several unique characteristics, which may affect its execution. This article describes the process of a community-based management research project which is descriptive in nature and uses quantitative techniques to examine school efficiencies in low-income communities in a developing country – Bolivia. The article describes the partnership between a US-based university and a Bolivian not-for-profit organisation, the research context and the history of the research project, including its various phases. It focuses on the (yet unpublished process of the community-based research as opposed to its content (which has been published elsewhere. The article also makes the case that the robust partnership between the US-based university and the Bolivian NGO has been a determining factor in achieving positive results. Strengths and limitations are examined in the hope that the experience may be helpful to others conducting descriptive quantitative management research using community-engaged frameworks in cross-cultural settings. Keywords: international partnership, community-engaged scholarship, education efficiency, multicultural low-income education.

  5. Door Security using Face Detection and Raspberry Pi

    Science.gov (United States)

    Bhutra, Venkatesh; Kumar, Harshav; Jangid, Santosh; Solanki, L.

    2018-03-01

    With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and security. This paper deals with the user of principal component and security. PCA is a statistical approach used to simplify a data set. The minimum Euclidean distance found from the PCA technique is used to recognize the face. Raspberry Pi a low cost ARM based computer on a small circuit board, controls the servo motor and other sensors. The servo-motor is in turn attached to the doors of home and opens up when the face is recognized. The proposed work has been done using a self-made training database of students from B.K. Birla Institute of Engineering and Technology, Pilani, Rajasthan, India.

  6. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    Science.gov (United States)

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  7. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  8. The European Nuclear Safety Training and Tutoring Institute (ENSTTI). Annex III [Example of Knowledge Management and Training for TSOs

    International Nuclear Information System (INIS)

    2018-01-01

    ENSTTI is an initiative of members of the ETSON. It was created in 2010 to put in place a high quality training mechanism to meet the training needs of experts at nuclear regulatory authorities and TSOs; to ensure the continuous development of qualified experts in this area; and to foster harmonization of technical practices in nuclear safety, nuclear security and radiation protection. This is achieved through the regular provision of vocational training and tutoring exclusively delivered by senior professionals of European TSOs that take into consideration the latest technical developments and is continuously up-dated and improved by applying a systematic approach to training.

  9. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  10. Country watch: Chile.

    Science.gov (United States)

    Montoya Leiva, M

    1996-01-01

    Servicio Paz y Justicia (SERPAJ) is a nongovernmental organization (NGO) established in Chile in 1977. It supports fundamental human dignity and rights by fighting discrimination and exclusion based upon individual differences. SERPAJ promotes training, organization, and the political participation of community members as part of the democratic process, working mainly with the at risk women, street children, and youth of Santiago's working-class neighborhoods. Groups participate in workshops and training courses on human rights and development, civic education, and methods of non-violent community action. In 1987, SERPAJ-Sur Oriente began to include the topic of sexuality and AIDS/STDs in courses training working-class women as community human rights agents. The NGO is therefore one of the first mainstream Chilean human rights organizations to incorporate HIV/AIDS issues. A basic facts brochure was developed, followed by a pilot education project developed in one neighborhood which was then systematically replicated in other neighborhoods. The comments of some people who have participated in SERPAJ workshops are presented.

  11. Improving irrigation efficiency : the need for a relevant sequence of the management tools

    Science.gov (United States)

    Fayolle, Y.

    2009-04-01

    With 70 % of worldwide withdrawals, irrigation efficiency is a key issue in the overall problem of water resources. Management of water dedicated to agriculture should be improved to secure food production and save water to deal with increasing domestic and industrial demands. This paper is based on the results of a collaborative research project conducted in India with a local NGO (the Aga Khan Rural Support Programme, AKRSP(I)) during which GIS were tested. It is aimed at analyzing the efficiency of water usage in a water development programme conducted by the partner NGO in the semi-arid margins of Gujarat state. The analysis raises the question of the articulation of legal, institutional, economical, and technical tools to improve water efficiency. The NGO supervises the construction of surface water harvesting structures for irrigation purposes. Following a participatory approach, it creates and trains user groups to which the management of dams would then be devolved. User group membership depends on financial contribution to the building costs. A legal vacuum regarding surface water management combined with unequal investment capacities favor the concentration of water resources in the hands of a limited number of farmers. This causes low water use efficiency, irrigation choices being mostly oriented to high water consumptive crops and recipient farmers showing no interest in investing in water saving techniques. Our observations favor equality of access and paying more attention to the sequence in which management tools are articulated. On a national scale, as a prerequisite, water user rights as well as NGO's intervention legal framework should be clarified. On a project scale, before construction, information systems could help to identify all potential beneficiaries and optimize equality of access. It aims at reducing the volume of water per farmer to encourage them to irrigate low water consumptive crops and invest in water saving techniques. Depending

  12. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  13. International Cooperation for the Training of Water Managers from Developing Countries

    Science.gov (United States)

    Aswathanarayana, U.

    2007-12-01

    Water is the key to the well being of a community. On one hand, water security is linked to food security, as food cannot be grown without water. On the other hand, water security is linked to environmental security, as water is needed to maintain the health of a community. International cooperation is proposed for the training in Hyderabad, India, with international faculty, of ~ 300 water managers from the developing countries at an estimated cost of ~USD 3300/- per candidate (including ~ USD 1800/- for international travel), through ten interactive and customized training programmes during the period of five years, to enable them to address two crucial issues affecting the poor in the developing countries, namely, access to affordable water and coping with water scarcity. Ways of Good governance and geographical targeting of poverty alleviation programmes are built into each training programme. Each training programme will be for about three weeks (inclusive of field work). Each course will have a component common to all, plus a component customized to the biophysical and socioeconomic situation in a candidate's country. Ten course manuals will be produced. which can later be published commercially as low-cost volumes, for the benefit of the readership in the Developing countries . Each candidate will be provided his own computer, and software, and individual faculty adviser. On the basis of the training received, a candidate should be able to carry with him at the end of the course a draft outline of techno-socio-economic action plan for his country/area in respect of the theme of the course, prepared by himself/herself. A copy of this outline would be provided to the World Bank, and relevant organizations for follow- up activity

  14. Report About a New Standard for Radiation Protection Training of Intervention Persons. In the Case of Radiological emergency Situations

    International Nuclear Information System (INIS)

    Geringer, T.; Steurer, A.; Schmitzer, C.

    2004-01-01

    In autumn 2003 the Austrian standard OENORM S 5207 with the title R adiation protection training of intervention persons in the case of radiological emergency situations w ill be published. The standard is directed to persons who have to invent in case of a radiological emergency, security forces and as well training centres. The standard has to fulfil three objectives: 1. Regulation of the minimum requirements for the radiation protection training and education of intervention persons. 2. Harmonization of the radiation protection and training of different security forces, for instance Austrian army, Red Cross Austria, Fire Department, Police Department. 3. Mutual recognition of parts of the education between the different security forces. To fulfil these aims the standard is structured in different education modules. If , for instance, a person attended a special training module at the Austrian military, this part of the education is also valid for a career at the Fire Department. Further the modular structure of the education gives the possibility for persons of a special security force to attend one or more modules at another security force. This will lead to an improved cooperation between the different security forces in case of a radiological emergency situation. The education is structured in four levels. The topics of the standard are: 1. Requirements for training centres 2. Guidelines for the examinations of the candidates 3. Topics and goals of the basic education 4. Topics and goals of the advanced education level one 5. Topics and goals of the advanced education level two 6. Topics and examples of specialised education 7. Obligatory further education once every year. (Author)

  15. Asie du sud | Page 108 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The "Using Diversity" workshop explored the common ground between the two approaches. It brought together scientists, farmers and NGO workers from across South Asia who share the conviction that genetic diversity, on-farm, is key to rural people's food security and that farmers must be involved in its maintenance and ...

  16. Sud du Sahara | Page 288 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    L'Institut africain de gestion urbaine (IAGU) est une organisation non gouvernementale à vocation internationale sise au Sénégal. ... in 2004, the Benin-based NGO Initiatives pour un développement intégré (IDID) promotes food security, climate change adaptation, and sustainable management of fragile ecosystems.

  17. Far East Asia | Page 185 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The "Using Diversity" workshop explored the common ground between the two approaches. It brought together scientists, farmers and NGO workers from across South Asia who share the conviction that genetic diversity, on-farm, is key to rural people's food security and that farmers must be involved in its maintenance and ...

  18. Does Well-Being Contribute to Performance? Emotional Security, Teacher Support and Learning Behaviour in Kindergarten

    Science.gov (United States)

    Koomen, Helma M. Y.; van Leeuwen, Mirella G. P.; van der Leij, Aryan

    2004-01-01

    In this study, we examined relations between kindergartner's emotional security, task involvement and achievement and teacher's supportive presence in a cognitive training setting, in which the familiarity of the teacher was varied. Participants were 48 kindergarten children (mean age = 51.65 months); 16 children were trained by their regular…

  19. Culturing Security System of Chemical Laboratory in Indonesia

    Directory of Open Access Journals (Sweden)

    Eka Dian Pusfitasari

    2017-04-01

    Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.

  20. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  1. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  2. An Evaluation of Aviation Maintenance Fatigue Countermeasures Training

    Science.gov (United States)

    2013-05-01

    oamtechreports 19. Security Classif. (of this report) 20. Security Classif. (of this page) 21. No. of Pages 22. Price Unclassified...water 50.0 38.5* Taking walks 42.9 28.6 Eating multiple meals or snacks 28.6 14.3 Avoiding exercise hours before bed 46.2* 30.8* Doing strength...Light snacks at breaks (1) *Of the six attendees who reported previously receiving fatigue training/education, one also reported changing behaviors at

  3. Sampling on radiological protection training in diagnostic radiology

    International Nuclear Information System (INIS)

    Gaona, E.

    2001-01-01

    Radiological security aspects were evaluated in radiology departments from Mexico City. The study was carried out in two stages, the first one evaluated 40 departments just before the implementation of the new Official Mexican Standards related to Radiological Security and Quality Control in Radiology; in the second stage 33 departments were evaluated 2 years after those standards were implanted, showing a favorable impact of the training programs for the type of answers obtained [es

  4. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  5. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  6. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  7. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  8. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Hai

    Full Text Available Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs in Vietnam.A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique.In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67; staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32 and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00; and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95. Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65.Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC into units

  9. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan; Kaewkungwal, Jaranit

    2017-01-01

    Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65). Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated

  10. Practices in security and confidentiality of HIV/AIDS patients’ information: A national survey among staff at HIV outpatient clinics in Vietnam

    Science.gov (United States)

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan

    2017-01-01

    Introduction Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. Methods A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. Results In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44–9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39–11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36–11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93–10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29–3.65). Conclusions Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate

  11. Treaty Monitoring

    DEFF Research Database (Denmark)

    Canty, M.; Jasani, B.; Lingenfelder, I.

    2009-01-01

    of remote sensing technologies. The book therefore comprises management aspects (issues and priorities of security research, crisis response), applied methodologies and process chains (treaty monitoring, estimation of population densities and characteristics, border permeability models, damage assessment...... companies, national research institutions and international organizations, all of whom were brought together under the aegis of the European research project GMOSS (Global Monitoring for Security and Stability). This book is tailored for the scientific community that deals with the application of EO data...... of civil security. Written for: Scientists, researchers in spatial sciences as well as practitioners, politicians, decision makers at NGO's in the field of security, crisis management, risk assessment and vulnerability....

  12. IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective

    CERN Document Server

    Dattani, Dinesh D

    2013-01-01

    Rather than rehashing basic information-such as command syntax-already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most large IT organizations; security cannot be left to chance. With very little training available to the younger crowd, and older, more experienced personnel retiring or close to retiring, there is a need in mainframe security skills at the senior level. Based on real-life experiences, issues, and soluti

  13. Cost effective material control and accountability training

    International Nuclear Information System (INIS)

    Robichaux, J.J.; Shull, L.M.; Salizzoni, L.M.

    1995-01-01

    DOE Order 5630.15, ''Safeguards and Security Training Program'' is being implemented at the Savannah River Site within the Westinghouse Savannah River Company's material control and accountability program. This paper reviews the development of a material control and accountability task analysis, the development of specific material control and accountability courses, and the cost effective and innovative strategies employed to implement the training program. The paper also discusses how the site material control and accountability policies and procedures are incorporated into the Westinghouse Savannah River Company training program to ensure that personnel receive the most current information

  14. Marketing and reputation aspects of neonatal safeguards and hospital-security systems.

    Science.gov (United States)

    Smith, Alan D

    2009-01-01

    Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.

  15. Counter Trafficking System Development "Analysis Training Program"

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dennis C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2010-12-01

    This document will detail the training curriculum for the Counter-Trafficking System Development (CTSD) Analysis Modules and Lesson Plans are derived from the United States Military, Department of Energy doctrine and Lawrence Livermore National Laboratory (LLNL), Global Security (GS) S Program.

  16. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  17. Security practices and regulatory compliance in the healthcare industry.

    Science.gov (United States)

    Kwon, Juhee; Johnson, M Eric

    2013-01-01

    Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Hospitals in the highest level of compliance were significantly managing third parties' breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.

  18. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    Directory of Open Access Journals (Sweden)

    Vladislav D. Veksler

    2018-05-01

    Full Text Available Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior via techniques such as model tracing and dynamic parameter fitting.

  19. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    Science.gov (United States)

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  20. Oral histories of HIV/AIDS support group members, NGO workers and home-based carers in KwaZulu-Natal.

    Science.gov (United States)

    Denis, Philippe

    2016-01-01

    The purpose of this paper is to bring to the attention of the AIDS research community the existence of an oral history project known as the Memories of AIDS Project. The project focused on HIV/AIDS support group members, non-governmental organisation (NGO) workers and home-based carers in the Umgungundlovu (Pietermaritzburg) District Municipality, South Africa. The project was carried out by the Sinomlando Centre for Oral History and Memory Work, a research and community development centre of the University of KwaZulu-Natal, over a period of three years (2011-2013). Sixty-five individual oral history interviews of 1 to 4 hours duration and 11 focus group sessions were recorded, transcribed and translated from isiZulu into English when necessary. The life stories of community workers and support group members documented in the interviews show, on the part of the informants, a remarkable degree of agency and assertiveness in matters of sexuality, gender relations and religious beliefs. They found innovative ways of navigating through the conflicting claims of biomedicine, Christianity and African traditional religion. As much as the epidemic caused grief and suffering, it opened the door to new knowledge and new opportunities.

  1. Field studies of safety security rescue technologies through training and response activities

    Science.gov (United States)

    Murphy, Robin R.; Stover, Sam

    2006-05-01

    This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.

  2. [Evolution of worker's health in the social security medical examination in Brazil].

    Science.gov (United States)

    Pinto Júnior, Afrânio Gomes; Braga, Ana Maria Cheble Bahia; Roselli-Cruz, Amadeu

    2012-10-01

    In order to analyze the practice of the social security medical examination starting from the introduction of the worker's health paradigms, data was gathered on the granting of social security disability benefits to assess worker illness based on notification of work-related accidents in the cement industries of Rio de Janeiro. From 2007 to 2009 there was only one notification, which involved a worker handling toxic waste instead of the energy matrix. However, the analysis revealed sources and mechanisms of illness overlooked in the social security medical examination, which is still focused on the one-cause-only logic of occupational medicine. To achieve the worker's health paradigms, changes are required to alter the way of conducting the social security medical examination, by re-establishing partnerships, training human resources, adopting epidemiological indicators, as well as setting and assessing social security goals that transcend the mere granting of disability benefits.

  3. SU-CD-PinS Room/Hall E-00: HAZMAT Training for the Medical Physicist - Part I

    International Nuclear Information System (INIS)

    2016-01-01

    excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.

  4. SU-G-PinS Room/Hall E-00: HAZMAT Training for the Medical Physicist - Part II

    International Nuclear Information System (INIS)

    2016-01-01

    excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.

  5. SU-CD-PinS Room/Hall E-00: HAZMAT Training for the Medical Physicist - Part I

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-06-15

    excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.

  6. SU-G-PinS Room/Hall E-00: HAZMAT Training for the Medical Physicist - Part II

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-06-15

    excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.

  7. 网络空间安全人才培养探讨%Discussions on the talent cultivation of cyber security

    Institute of Scientific and Technical Information of China (English)

    翁健; 马昌社; 古亮

    2016-01-01

    Cyber security has been formally approved to be the first level discipline in June 2015. How to train the cyber security talents that meet the needs of our country has become an urgent problem to be solved in the discipline construction. Synthetical analysis of the current situation of training related talents at domestic and foreign, as well as the actual demand for the cyber security talents was presented. According to the characteristics of the talent culti-vation in cyber security, some suggestions on training the cyber security talents were given.%自从2015年6月网络空间安全正式被批准为国家一级学科,如何培养符合国家需要的网络空间安全人才成为了学科建设中一个亟待解决的问题。综合分析了国内外培养相关方面人才的现状与网络空间安全的实际人才需求;结合我国网络空间安全人才培养的特点,给出了我国网络空间安全人才培养的部分建议。

  8. CSR LEVEL OF NGO’S FINANCIAL TARGET GROUPS AND ITS IMPACT ON NGO’S SUSTAINABLE DEVELOPMENT – RESEARCH STUDY FROM NGO IBEC CENTER, SERBIA

    Directory of Open Access Journals (Sweden)

    Milan Dimitrijević

    2014-07-01

    Full Text Available Aims of Non Government Organizations (NGO’s in developedcountries are sometimes similar or the same with NGO’s in undevelopedcountries, but financial resources, possibilities for strategic development, publicacceptance of new-democratic approaches, public knowledge and awarenessregarding NGO’s purpose is quite different. Financial target groups (FTG’s ofNGO’s are organizations whose role and purpose regarding Corporate SocialResponsibility (CSR is to grant funds for realization of different goals which theysupport over NGO’s with high expertise in requiredfield. The aim of this paper isto present the CSR level of NGO’s FTG’s by measuring their response ondifferent actions initiated by NGO and how that frequency of responses, positiveand negative, influence on NGO’s sustainable development (SD in highlyturbulent economical and political environment.

  9. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  10. THE EFFECTS OF THE 2008/9 ECONOMIC RECESSION ON NGO SUSTAINABILITY AND FUNCTIONING IN THE SOUTH AFRICAN SOCIAL SERVICES, HEALTH AND EDUCATION SECTORS

    Directory of Open Access Journals (Sweden)

    Gebreselassie-Hagos, Eyesus

    2013-05-01

    Full Text Available The economic crisis of 2008/2009 first emerged in the developed economies in 2008 and spilled over into developing countries and economies in transition through international financial and trade channels. This is the greatest financial crisis the world has faced since the Great Depression (Hanfstaengl, 2010; Sandra, 2008. At the height of the recession many feared that it would change into a depression. Banks were “unwilling to lend, credit spreads had widened sharply, stock markets had plunged and economies everywhere were stumbling” (Bustillo & Velloso, 2009:7. Some of the immediate effects of the economic recession on society included higher food prices and other living costs. Furthermore, corporations experienced reductions in their profit margins. It could reasonably be assumed that the NGO sector would suffer significantly as corporate donors and philanthropists typically contribute less during economic downturns.

  11. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  12. CERN Technical training: Available places in forthcoming courses

    CERN Multimedia

    HR Department

    2011-01-01

    The following course sessions are scheduled in the framework of the 2011 CERN Technical Training Programme and places are still available. You can find the full updated Technical Training course programme in our web catalogue. Software and system technologies C++ Part 1 - Hands-On Introduction\t25-Jan-11\t28-Jan-11\tEnglish\t4 days CERN openlab/Intel Computer Architecture and Performance Tuning Workshop\t15-Feb-11\t16-Feb-11\tEnglish\t2 days CERN openlab/Intel Computer Architecture and Performance Tuning Workshop\t08-Feb-11\t09-Feb-11\tEnglish\t2 days JAVA - Level 2\t17-Jan-11\t20-Jan-11\tEnglish\t4 days Python - Hands-on Introduction\t07-Feb-11\t10-Feb-11\tEnglish\t4 days Secure coding for Java\t12-Jan-11\t12-Jan-11\tEnglish\t1 day Secure coding for PHP\t14-Jan-11\t14-Jan-11\tEnglish\t1 day Secure coding for Python\t13-Jan-11\t13-Jan-11\tEnglish\t0.5 day Secure coding for Python\t13-Jan-11\t13-Jan-11\tEnglish\t0.5 day Electronic design Technologie S-Web\t12-Jan-11\t13-Jan-11\tFrench\t2 jours Mechanical Design ANSYS Workbench advanced\t31-Jan...

  13. Developing the security culture at the SEISMED Reference Centres.

    Science.gov (United States)

    Fowler, J

    1996-01-01

    The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.

  14. NS [Nuclear Safety] update. Current safety and security activities and developments taking place in the Department of Nuclear Safety and Security, Issue no. 11, June 2009

    International Nuclear Information System (INIS)

    2009-06-01

    The current issue presents information about the following topics: Nuclear Safety Review for the Year 2008; Feedback from IRS Topical Studies and Events Applied to Safety Standards; Education and Training Programmes at the IAEA Department of Nuclear Safety and Security; Peer Review of Operational Safety Performance (PROSPER)

  15. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Science.gov (United States)

    2010-01-01

    ... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  16. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    Science.gov (United States)

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  17. Attachment security and obesity in US preschool-aged children.

    Science.gov (United States)

    Anderson, Sarah E; Whitaker, Robert C

    2011-03-01

    To estimate the association between attachment security in children aged 24 months and their risk for obesity at 4½ years of age. Insecure attachment is associated with unhealthy physiologic and behavioral responses to stress, which could lead to development of obesity. Cohort study. National sample of US children born in 2001. Children and mothers participating in the 2003 and 2005-2006 waves of the Early Childhood Longitudinal Study, Birth Cohort, conducted by the National Center for Education Statistics. Our analytic sample included 6650 children (76.0% of children assessed in both waves). Attachment security at 24 months was assessed by trained interviewers during observation in the child's home. Insecure attachment was defined as lowest quartile of attachment security, based on the security score from the Toddler Attachment Sort-45 Item. Obesity at 4½ years of age (sex-specific body mass index ≥95th percentile for age). The prevalence of obesity was 23.1% in children with insecure attachment and 16.6% in those with secure attachment. For children with insecure attachment, the odds of obesity were 1.30 (95% confidence interval, 1.05-1.62) times higher than for children with secure attachment after controlling for the quality of mother-child interaction during play, parenting practices related to obesity, maternal body mass index, and sociodemographic characteristics. Insecure attachment in early childhood may be a risk factor for obesity. Interventions to increase children's attachment security should examine the effects on children's weight.

  18. Some controversy about law on private security

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir

    2014-01-01

    Full Text Available The Republic of Serbia is one of the last countries that legally regulate the private security sector, which is a new conceptual system of the national security system. Since the law is expected to solve many issues and dilemmas, and bring order to the area, which by some accounts is a very profitable branch of economy. Expectations were that by the end to regulate issues such as: 1 the need for institutionalization of partnership between the public and private sectors for mutual benefit, 2 the need of expressing mutual interest to establish the desired condition of security in the entire society and 3 the need to define the mechanisms and authority to achieve mentioned above. Based on this, legal framework of private security should explicitly provide: 1 a new role of the private sector, 2 communication and data exchange between the public and private sector, 3 mandatory notification about prepared or committed criminal acts on which there is information, 4 cooperation in the tasks of necessarily protected facilities, 4 cooperation in crisis situations including natural disasters, traffic accidents, strikes, sabotage, terrorist attacks, etc., 5 cooperate in the selection and training of staff and 6 cooperation in planning activities and project design of security. This paper presents a critical review of some theoretical and professional controversies in the solutions provided by law, for the purpose of answering whether it is achieving the purpose of passing of such a legal act.

  19. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  20. Integration of holography into the design of bank notes and security documents

    Science.gov (United States)

    Dunn, Paul

    2000-10-01

    The use of holograms and other diffractive optically variable devices have been used successfully in the fight against counterfeiting of security documents for several years. More recently they have become globally accepted as a key security feature on banknotes as reflected in their prime use on the Euronotes to be issues in 2002. The success of the design and origination of these images depends upon their strong visual appeal, their overt and covert content and the ability to offer unique features that provides an extremely difficult barrier for the would be counterfeiter to overcome. The basic design principles both for banknote and general security print application are discussed in this review document. TO be effective as a security device the image must be fit for the purpose. This means that the image must contain the level of overt and covert features that are easy to recognize, containing high level security features and form part of an educational program aimed at the product user and specifically trained security personnel. More specifically it must meet a clearly defined performance criteria.

  1. Cyber security in ports: Business as usual

    OpenAIRE

    Moerel, Lokke; Dezeure, Freddy

    2017-01-01

    Our paper summarizes the risks and provides concrete and pragmatic proposals to increase substantially the cyber maturity and resilience in the ports by organizing training and awareness raising, fostering cooperation and information exchange both between the stakeholders in the ports and across the ports and integrating the cyber risk into the physical security risk management processes and structures already in place within the ports. This also involves a higher degree of oversight by the P...

  2. Planning and training in emergency preparedness

    International Nuclear Information System (INIS)

    Perkins, T.G.

    1985-01-01

    Link Simulation Systems Division of the Singer Company is combining its tactical simulation and display system with state-of-the-art decision and control technology to provide a combined operations, planning, and training (COPAT) system. This system provides for the total integration of the three primary responsibilities of emergency managers: planning and training for and decision and control of an emergency. The system is intended to be a complete operations center for emergency management personnel. In the event of a natural disaster or man-made emergency, the national, state, county, and city emergency managers require a secure and reliable operations center. The COPAT system combines the decision and control capabilities with proven simulation techniques allowing for integrated planning and training. The hardware system, software, data bases, and maps used during planning and training are the same as those used during actual emergencies

  3. 17 CFR Appendix B to Part 3 - Statement of Acceptable Practices With Respect to Ethics Training

    Science.gov (United States)

    2010-04-01

    ... Practices With Respect to Ethics Training B Appendix B to Part 3 Commodity and Securities Exchanges... Practices With Respect to Ethics Training (a) The provisions of Section 4p(b) of the Act (7 U.S.C. 6p(b... ethics training sessions within six months of registration, and all registrants to attend such training...

  4. SMEs, electronically-mediated working and data security: cause for concern?

    Directory of Open Access Journals (Sweden)

    Clear, F.

    2007-01-01

    Full Text Available Security of data is critical to the operations of firms. Without the ability to store, process and transmit data securely, operations may be compromised, with the potential for serious consequences to trading integrity. Thus the role that electronically-mediated working plays in business today and its dependency on data security is of critical interest, especially in light of the fact that much of this communication is based on the use of open networks (i.e. the Internet. This paper discusses findings from a ‘WestFocus’ survey on electronically-mediated working and telework amongst a sample of SMEs located in West London and adjacent counties in South-Eastern England in order to highlight the problems that such practice raises in terms of data security. Data collection involved a telephone survey undertaken in early 2006 of 378 firms classified into four industrial sectors (‘Media’, ‘Logistics’, ‘Internet Services’ and ‘Food Processing’. After establishing how ICTs and the Internet are being exploited as business applications for small firms, data security practice is explored on the basis of sector and size with a focus on telework. The paper goes on to highlight areas of concern in terms of data security policy and training practice. Findings show some sector and size influences.

  5. A companion agent for automated training systems

    NARCIS (Netherlands)

    Buiël, E.F.T.; Lubbers, J.

    2007-01-01

    TNO Defence, Security & Safety has a long history of applied research in the area of automated simulator-based training by means of Computer-Assisted Instruction (CAI). Traditionally, a CAI system does not enable a true dialogue between the learner and the virtual instructor. Most frequently, the

  6. Evaluasi terhadap Pelaksanaan Komunikasi Pemasaran Sosial Non-Goverment Organization (NGO) untuk Isu-Isu Anti Kekerasan terhadap Perempuan (Studi Kasus Kampanye Anti Kekerasan Terhadap Perempuan Cut Nyak Dien Yogyakarta dan Solidaritas Perempuan untuk Ha

    OpenAIRE

    Tri Hastuti Nur R

    2013-01-01

    Abstract: This paper explains how social marketing communication used by Cut Nyak Dien, Yogyakarta and Spekham, Surakarta–those are non goverment organization (NGO)– to sosialize issues about anti-violences to women. The result of research show evaluation fase in the social marekting fases were not done. They were not evaluate the messages were received or not;and they were not identify the level of target audiens’ behaviour changes. The media that they used were variatives. Having soci...

  7. Evaluasi Terhadap Pelaksanaan Komunikasi Pemasaran Sosial Non-Goverment Organization (NGO) Untuk Isu-Isu Anti Kekerasan Terhadap Perempuan (Studi Kasus Kampanye Anti Kekerasan Terhadap Perempuan Cut Nyak Dien YOGYAKARTA Dan Solidaritas Perempuan Untuk Ha

    OpenAIRE

    Nur R, Tri Hastuti

    2006-01-01

    This paper explains how social marketing communication used by Cut Nyak Dien, Yogyakarta and Spekham, Surakarta–those are non goverment organization (NGO)– to sosialize issues about anti-violences to women. The result of research show evaluation fase in the social marekting fases were not done. They were not evaluate the messages were received or not;and they were not identify the level of target audiens’ behaviour changes. The media that they used were variatives. Having social marketi...

  8. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  9. Radiation protection training award - an innovative approach of testing radiation protection skills in catastrophe management

    International Nuclear Information System (INIS)

    Geringer, T.

    2003-01-01

    Full text: ARC Seibersdorf research is Austria's largest independent research institution. Apart from research and technical development, ARCS also offers special training an radiation protection. Having undergone intensive radiation protection training, security forces are also entitled to test their knowledge in a special 'radiation protection training award'. The prize is awarded in three different grades. ARCS Bronze award guarantees that the holder is competent in, both theoretical and practical aspects of a radiological accident. The follow-up Silver award requires additional competence in emergency management. Candidates having at least five years of professional experience and presenting a written thesis are considered for the Golden award. The holder is not only experienced in radiological catastrophe management including a competent theoretical background, but is also experienced enough to work out and improve his own emergency planning. ARC Seibersdorf research started with their radiation protection award as early as 1968. More then 10 000 candidates have been awarded since then. Most candidates are members of the Austrian Army or other security forces, although everyone above the age of 18 and undergone a basic course in radiation protection is entitled to participate. Even company internal awards have been given to ensure the quality of training applies to ARC Seibersdorf members as well. The prize is awarded in three different grades. ARCS Bronze award guarantees that the holder is competent in both theoretical and practical aspects of a radiological accident. The followup Silver award requires additional competence in emergency management. Candidates having at least five years of professional experience and presenting a written thesis, are considered for the Golden award. The holder is not only experienced in radiological catastrophe management including a competent theoretical background, but is also experienced enough to work out and improve his

  10. Solar-energy an American India (SAI) partnership: The Ramakrishna Mission PV Project

    Energy Technology Data Exchange (ETDEWEB)

    Ullal, H.S.; Stone, J.L. [National Renewable Energy Lab., Golden, CO (United States)

    1997-12-01

    This paper describes a cooperative program which was established in 1993 by the Minister of the Indian Ministry of Non-Conventional Energy Sources (MNES) and the Secretary of the U.S. Department of Energy (USDOE). Eventually it fielded one project, funded 50-50 for a total of 500k dollars. The project selected was a sustainable rural economic development initiative with Ramakrishna Mission in West Bengal, India, as the nongovernment organization (NGO). The objectives of the program were to establish the economic viability of photovoltaic power in the Sundarbans region of West Bengal. To have the project self-sustaining with minimal subsidies to the beneficiaries. To establish the infrastructure for financing, training, installation and maintenance with the NGO taking the lead. To work with the NGO to expand utilization of photovoltaics in the region. To perform a before and after social, economic, and environmental impact study with the Tata Energy Research Institute.

  11. Error-Based Accidents and Security Incidents in Nuclear Materials Management

    International Nuclear Information System (INIS)

    Pond, Daniel J.; Greitzer, Frank L.

    2005-01-01

    Hazard and risk assessments, along with human error analysis and mitigation techniques, have long been mainstays of effective safety programs. These tools have revealed that worker errors contributing to or resulting in accidents are often the consequence of ineffective system conditions, process features, or individual employee characteristics. At Los Alamos National Laboratory (LANL), security, safety, human error, and organizational analysts determined that the system-induced human errors that make accidents more likely also are contributing to security incidents. A similar set of system conditions has been found to underlie deliberate, non-malevolent deviations from proper security practices - termed breaches - that also can result in a security incident. In fiscal-year (FY) 2002, LANL's Security Division therefore established the ESTHER (Enhanced Security Through Human Error Reduction) program to identify and reduce the influence of the factors that underlie employee errors and breaches and, in turn, security incidents. Recognizing the potential benefits of this program and approach, in FY2004 the Department of Energy (DOE) Office of Security Policy (DOE-SO) funded an expansion of ESTHER implementation to the causal assessment and reporting of security incidents at other DOE sites. This presentation will focus on three applications of error/breach assessment and mitigation techniques. One use is proactive, accomplished through the elimination of contributors to error, whereas two are reactive, implemented in response to accidents or security incidents as well as to near misses, to prevent recurrence. The human performance and safety bases of these techniques will be detailed. Associated tools - including computer-based assessment training and web-based incident reporting modules developed by Pacific Northwest National Laboratory - will be discussed

  12. Relationship between train users’ perceptions of walkability with access and egress mode choice

    Directory of Open Access Journals (Sweden)

    Syafriharti Romeiza

    2018-01-01

    Full Text Available The purpose of this study is to understand whether there is a relationship between train users’ perceptions of walkability in built environment of trip origin with access mode choice and between train users’ perceptions of walkability in built environment of trip destination with egress mode choice. Train users are who ride from Cicalengka station Bandung Regency, West Java, Indonesia. To analyze the relationship is used crosstab method. The perceptual factors about walkability are those perceived by the train users consisting of walking distance, safety, comfort, and secure from crime, both in origin and destination of the built environment. The mode choice consist of walking, paratransit, motorcycle taxi, and own vehicles (or others for egress mode. To better understand the relationship is used several control variables, that are trip purposes, train usage, gender, and age. For access trip there is another control variable, that is vehicle ownership. Train users' perceptions of walkability have a relationship with both the access and the egress mode choice, except for the security aspect. The influence of control variables on the relationship between perceptions of walkability with access/egress mode choice varies for walking distance, safety, and comfort.

  13. Strengthening the safety and security of radioactive sources worldwide: a perspective on Philippine contributions

    International Nuclear Information System (INIS)

    Murray, Allan

    2009-01-01

    Radioactive sources have been used for many decades in a wide variety of applications in all countries. The safety of radioactive sources and the associated radiation protection have been implemented by national and international programs during this time with cooperation through the IAEA intended to achieve application of minimum standards and harmonization of approach. The security of radioactive sources is however relatively new consideration. A perspective on the Philippine contributions to the safety and security of radioactive sources will be provided with reference to the following: What is radioactive source security and why it is important?; International cooperation, including the IAEA Code of Conduct; Regulation for radioactive source security; Implementation of radioactive source security measures for licenses, operators and others; Impact of regulatory and operational matters such as professional development and training, emergency preparedness and response, and radiation protection. (author)

  14. The world at a critical turning point. Edited transcripts of the forums held in the United Nations on 8-9 April, 14 April, 22 October and 27-29 October 1998 and 15 and 22 April 1999 by the NGO Committee on Disarmament, in cooperation with the UN Department for Disarmament Affairs and the UN Department of Public Information, and the 11 May 1999 presentations by NGOs to the third PrepCom for the Non-Proliferation Treaty Review Conference in 2000

    International Nuclear Information System (INIS)

    1999-01-01

    This publication includes the edited transcripts of the panel discussions held in the United Nations by the NGO Committee on Disarmament in 1998 and early 1999 and the presentations made by NGOs on May 11, 1999 at the third Prep Com for the Non-Proliferation Treaty Review Conference to be held in the year 2000. NGOs need to be much more active, on a much larger scale, to play an effective role at the UN and with their own governments. The NGO Committee on Disarmament welcomes the membership of all individuals and organizations that have an interest in the activities of the UN in the disarmament, international security and peacekeeping areas. Agreement on the agenda and timing of a fourth Special Session on Disarmament (SSOD IV) was not reached by the working group that met for the fourth year during the Disarmament Commission in April, 1999. The Disarmament Commission operates under rules of consensus, and the objection of India prevented a resolution of this issue. It could be resolved by the First Committee, with a vote. The stumbling block has been the differing views of delegations on the importance of the Final Document of the First Special Session on Disarmament. NGO experts could make a very worthwhile contribution to the discussion on nuclear weapons and on conventional disarmament, UN peacekeeping, peacemaking, and peace enforcing that might Increase the chances of a worthwhile SSOD IV. We welcome your suggestions. The major focus of the First Committee discussion in November, 1998 was on the resolution put forth by Ireland, Sweden, Brazil, Egypt, Mexico, New Zealand and South Africa. That called for a new agenda. Much of the discussion that asked 'How Can We Make Greater Progress Towards Nuclear Disarmament and Prevent Further Proliferation?' focuses on the New Agenda Coalition resolution. Resolution 53/77Y was adopted without the support of the US, UK, France, the Russian Federation, India, Pakistan or Israel (China abstained.) Nevertheless, 114

  15. Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine

    Science.gov (United States)

    Bystrova, Bogdana

    2017-01-01

    At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…

  16. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  17. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  18. Building competence in radiation and nuclear safety through education and training - the approach of a national regulatory authority

    International Nuclear Information System (INIS)

    Karfopoulos, K.L.; Carinou, E.; Kamenopoulou, V.; Dimitriou, P.; Housiadas, Ch.

    2015-01-01

    The Greek Atomic Energy Commission (EEAE) is the national competent authority for radiation and nuclear safety and security as well as for the radiation protection of ionizing and artificially produced non-ionizing radiation. The legal framework determines, inter alia, the responsibilities in education and training issues. The EEAE has a range of activities, in providing postgraduate and continuous education and training on radiation protection, and nuclear safety and security, at the national and international levels. At the national level, and particularly in the medical field, the EEAE is a participant in and a major contributor to the Inter-University Postgraduate Program on Medical Radiation Physics. Since 2003, the EEAE has been the Regional Training Center (RTC) for radiation, transport and waste safety of the International Atomic Energy Agency (IAEA) for the European Region in the English language. Moreover, the EEAE has also been recognized as the IAEA's Regional Training Center (RTC) in nuclear security in the English language since 2013. The EEAE recently proceeded to two significant initiatives: the design of a national program for education and training, and the certification of the Department of Education according to ISO 29990:2010. In this paper, the initiatives taken to enhance the radiation protection system in the country through education and training are presented. (authors)

  19. Statement at Nuclear Security Summit, 27 March 2012, Seoul, South Korea

    International Nuclear Information System (INIS)

    Amano, Y.

    2012-01-01

    Full text: Mr President, Excellencies, Ladies and Gentlemen, The Fukushima Daiichi accident last year reminded us of the important connections between nuclear safety and nuclear security. Implementing multiple safety measures at nuclear plants also helps to protect them against terrorist sabotage. In order to take this work forward, I have just established a Nuclear Security Guidance Committee. All of you can participate in developing best practices in nuclear security, taking account of nuclear safety considerations. During the course of yesterday and today, all of you have referred to the activities of the IAEA, so I hope you will let me share some of the details of those activities with you. Last year, in a sting operation, police in the Republic of Moldova seized a quantity of high enriched uranium. The uranium was carried in a shielded container to prevent it from being detected. The smugglers claimed that the seized material was just a sample and that they could provide more. This case showed a new and worrying level of sophistication. I mention this example to demonstrate that the seriousness of the threat of nuclear terrorism has not diminished. But I also wanted to show that, by working together, we can respond effectively. In this case, the IAEA had provided training to around 60 Moldovan officials and given them some 70 items of specialist equipment. Thanks to that cooperation, the Moldovan police were able to stop the smuggling. This Summit is considering not just the security of nuclear materials, but also that of radioactive sources. These materials, such as cobalt-60, could be used along with conventional explosives to make so-called dirty bombs. A dirty bomb detonated in a major city could cause mass panic, as well as serious economic and environmental consequences. Ladies and Gentlemen, National governments have primary responsibility for nuclear security, but international cooperation is vital. In the past two years, there have been some positive

  20. XRIndex: A brief screening tool for individual differences in security threat detection in x-ray images

    Directory of Open Access Journals (Sweden)

    Elena eRusconi

    2015-08-01

    Full Text Available X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported Attention to Detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012. Here we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals.

  1. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  2. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  3. Improving Land Dry Farmer Capacity Toward Adequate Food Security

    Directory of Open Access Journals (Sweden)

    Sitti Aminah

    2015-09-01

    Full Text Available Land dry farmers have not enrolled in supporting food security. Most of the farmer are the peasants with low capacity to produce food. The purpose of the research is to formulate policy recommendation to increase capacity of the peasants for support food security. The data were collected using following techniques: questionnaire, interview and focus group discussion. The data were analyzed using descriptive statistics and structural equation modelling (SEM. The research results showed that the peasant characteristics and the peasants capacity are within low category, influencing the level of food security. The Government are expected actively to increase the peasant’s capacity by optimizing efforts: providing extension and training in participatory ways; increasing role of facilitator and researcher in empowerment process, increasing the peasants’ access to production input, credit facilities and wider markets, give incentive to the peasants so that they can do double working, as well as increasing coordination between government institutions and stakeholder.

  4. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  5. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  6. Computer Security: is your code sane?

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    How many of us write code? Software? Programs? Scripts? How many of us are properly trained in this and how well do we do it? Do we write functional, clean and correct code, without flaws, bugs and vulnerabilities*? In other words: are our codes sane?   Figuring out weaknesses is not that easy (see our quiz in an earlier Bulletin article). Therefore, in order to improve the sanity of your code, prevent common pit-falls, and avoid the bugs and vulnerabilities that can crash your code, or – worse – that can be misused and exploited by attackers, the CERN Computer Security team has reviewed its recommendations for checking the security compliance of your code. “Static Code Analysers” are stand-alone programs that can be run on top of your software stack, regardless of whether it uses Java, C/C++, Perl, PHP, Python, etc. These analysers identify weaknesses and inconsistencies including: employing undeclared variables; expressions resu...

  7. Nuclear non-proliferation and security culture within EDF nuclear fleet

    International Nuclear Information System (INIS)

    Debes, M.

    2013-01-01

    This document describes the nuclear non-proliferation strategy and the safety culture of EDF. The author lists all the mandatory rules and regulations at international and national levels EDF has to comply with. All these requirements are applied in EDF nuclear facilities through adequate procedures that assure a nuclear material accountancy, a follow-up of any item containing nuclear material in the facility, and internal controls. External independent controls are also performed. The EDF security policy goal is to protect human, material and knowledge assets, and to preserve operational capacity, competitiveness and public confidence, within national regulatory framework and regulation on 'vital importance facilities'. The treatment of events or incident (detection, analysis, lessons drawn, experience feedback) is a tool to progress, along with reporting, internal control process and audits. The security requirements cover the different related domains important to EDF industrial assets: security of employees against assaults; security of data according to their sensibility level; security of the information system and telecom; awareness and training of employees; relations with external suppliers or contractors; business premises; security of staff and projects abroad. For industrial facilities and grids (facilities of 'vital importance'...), the defense in depth principles are applied against the different threat scenarios. Security measures are studied at the design stage in a consistent way with nuclear safety measures, while taking into account the protective means deployed by public authorities. These risk analysis are periodically reassessed. The paper is followed by the slides of the presentation. (A.C.)

  8. Nurturing Care for China's Orphaned Children

    Science.gov (United States)

    Cotton, Janice N.; Edwards, Carolyn Pope; Zhao, Wen; Gelabert, Jeronia Muntaner

    2007-01-01

    Half the Sky, an international NGO, works in partnership with Chinese national and provincial governments inside state-run orphanages (welfare institutions). Through their infant nurture programs infants and toddlers in institutions begin to thrive through primary relationship-based care by trained community paraprofessionals. In preschool…

  9. Remodeling Strategic Staff Safety and Security Risks Management in Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Sunday S. AKPAN

    2015-10-01

    Full Text Available This paper examined safety and security risk management in tertiary institutions in Nigeria. The frequent attacks at workplace, especially schools, have placed safety and security in the front burner of discussion in both business and political circles. This therefore, forms the imperative for the conduct of this study. The work adopted a cross sectional survey research design and collected data from respondents who are security personnel of the University of Uyo. Analysis of data was done with simple percentage statistics while the research hypotheses were tested with mean and simple regression and correlation statistics. The findings of the study revealed that assassination, kidnappings and bombings were principal risk incidents threatening the safety and security of staff in University of Uyo. A significant positive relationship was found between the funding of security management and workers’ performance. It was discovered specifically that employment screening, regular training of security personnel, regular safety and security meetings and strategic security policy formation were the main strategies for managing safety and security in University of Uyo. The paper concluded that safety and security management and control involves every worker (management and staff of University of Uyo. It was recommended, among others, that management should be more committed to safety and security management in the University by means of making safety and security issues an integral part of University’s strategic plan and also by adopting the management line model – one form of management structure-where safety and security are located, with other general management responsibilities. This way, the resurgent cases of kidnapping, hired assassination, etc. would be reduced if not completely eradicated in the University.

  10. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  11. DETERMINATION OF CYBER SECURITY AWARENESS OF PUBLIC EMPLOYEES AND CONSCIOUSNESS-RISING SUGGESTIONS

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2016-07-01

    Full Text Available The aim of this study is to measure Turkish government employees’ awareness of cyber security and cyber space elements. Participants were 71 Turkish public employees working for various ministries. Both qualitative and quantitative research methods were used to get the most detailed information from the participants. A survey was administered to cyber security officers in chosen state institutions. For qualitative research, open-ended questions were administered to the participants. Reliability and validity issues were established for both surveys. Results show that employees have enough information about cyber security and cyber warfare. Findings clearly suggests that cyber defense policy should be planned in coordination with other state institutions and experiences should be shared. In order to create feasible and realistic cyber security policy at institutional level, experts at cyber security must be trained, hired and help must be requested from specialized individuals and institutions. This study recommends that rapid reaction teams (RRT should be established to take care of cyber systems, to react against cyber breaches in time, to alert staff for cyber-attacks in order to establish effective recovery.

  12. Immersive Environment Development for Training: Opportunities for Cooperation, Coordination, and Cost Savings

    International Nuclear Information System (INIS)

    Tackentien, J.; Hoffheins, B.; Brown, R.

    2015-01-01

    Immersive environments are increasingly demonstrating their utility for a number of nuclear safeguards, nuclear safety, and nuclear and physical security applications. Although training is an obvious use, the immersive (or sometimes called virtual) environment allows the user to ''visit'' nuclear facilities and sites that might have access restrictions because of security, high radiation or other hazards; are difficult and expensive to visit. An immersive environment can also be reconfigured to study various scenarios, processes, and other what-if situations, which can aid planning and design of new facilities or evaluate safeguards, safety and/or security measures before they are implemented. As the International Atomic Energy Agency, other international organizations, State Authorities, industry, and academia continue development and use of immersive environments and other electronic training technologies, more and more applications can be envisioned. Immersive environments are not a direct or always a desirable replacement for hands-on learning; however, the demand for electronic training media, particularly immersive environments, will grow. The resulting increase of system features and libraries presents opportunities to shorten development time frames, reduce costs and increase availability of immersive environments for a wider audience looking to balance the need for quality training with limited resources. Substantial time and cost savings can be realized by the sharing of raw assets among developers and organizations. This paper will explore potential guidelines, criteria, and mechanisms for such cooperation, including a prototype asset repository website. (author)

  13. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  14. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  15. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  16. CERN Technical Training: available places in forthcoming courses

    CERN Multimedia

    HR Department

    The following course sessions are scheduled in the framework of the 2009 CERN Technical Training Programme and places are still available. You can find the full updated Technical Training course programme in our web catalogue. Software and system technologies Developing secure software 07-DEC-09 07-DEC-09 0.5 day English JCOP - Joint PVSS-JCOP Framework 23-Nov-09 27-Nov-09 4.5 days English Oracle Database SQL Tuning 07-DEC-09 09-DEC-09 3 days English PERL 5 - Advanced Aspects 10-DEC-09 10-DEC-09 1 day English Project Development using Python 01-DEC-09 04-DEC-09 4 days English Python - Hands-on Introduction 08-DEC-09 10-DEC-09 3 days English Secure coding for Perl 26-Nov-09 26-Nov-09 1 day English Secure coding for PHP 25-Nov-09 25-Nov-09 1 day English Electronic design Advanced VHDL for FPGA Design 30-Nov-09 04-DEC-09 5 days English LabVIEW - Working efficiently with LabVIEW 8 07-DEC-09 07-DEC-09 1 day English LabVIEW Basic I with RADE introduction 30-Nov-09 02-DEC-09 3 days English LabVIEW Basics 2 03-D...

  17. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  18. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  19. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  20. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  1. A sensor monitoring system for telemedicine, safety and security applications

    Science.gov (United States)

    Vlissidis, Nikolaos; Leonidas, Filippos; Giovanis, Christos; Marinos, Dimitrios; Aidinis, Konstantinos; Vassilopoulos, Christos; Pagiatakis, Gerasimos; Schmitt, Nikolaus; Pistner, Thomas; Klaue, Jirka

    2017-02-01

    A sensor system capable of medical, safety and security monitoring in avionic and other environments (e.g. homes) is examined. For application inside an aircraft cabin, the system relies on an optical cellular network that connects each seat to a server and uses a set of database applications to process data related to passengers' health, safety and security status. Health monitoring typically encompasses electrocardiogram, pulse oximetry and blood pressure, body temperature and respiration rate while safety and security monitoring is related to the standard flight attendance duties, such as cabin preparation for take-off, landing, flight in regions of turbulence, etc. In contrast to previous related works, this article focuses on the system's modules (medical and safety sensors and associated hardware), the database applications used for the overall control of the monitoring function and the potential use of the system for security applications. Further tests involving medical, safety and security sensing performed in an real A340 mock-up set-up are also described and reference is made to the possible use of the sensing system in alternative environments and applications, such as health monitoring within other means of transport (e.g. trains or small passenger sea vessels) as well as for remotely located home users, over a wired Ethernet network or the Internet.

  2. Safeguards training at Pacific Northwest Laboratory

    International Nuclear Information System (INIS)

    Dickman, D.A.

    1986-10-01

    Safeguarding our country's nuclear materials against theft or diversion is extremely important due to their significantly strategic value. In addition, nuclear materials also have an extremely high monetary value. The term ''safeguards'' is defined as an integrated system of physical protection, accountability, and material control measures designed to deter, prevent, detect, and respond to unauthorized possession and use of special nuclear materials. An aggressive Safeguards program, therefore, employs both good security measures and a strong material control and accountability system. For effective internal control of nuclear materials, having people qualified in the many aspects of safeguards and accountability is essential. At Pacific Northwest Laboratory (PNL), this goal is accomplished through a Laboratory-wide Safeguards Awareness Program. All PNL staff members receive a level of Safeguards training appropriate to their particular function within the Laboratory. This paper presents an overview of the unique training opportunities this topic provides and how the training goals are accomplished through the various training courses given to the staff members

  3. Assessment on security system of radioactive sources used in hospitals of Thailand

    Energy Technology Data Exchange (ETDEWEB)

    Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong [Nuclear Engineering Department, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  4. Assessment on security system of radioactive sources used in hospitals of Thailand

    Science.gov (United States)

    Jitbanjong, Petchara; Wongsawaeng, Doonyapong

    2016-01-01

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  5. Assessment on security system of radioactive sources used in hospitals of Thailand

    International Nuclear Information System (INIS)

    Jitbanjong, Petchara; Wongsawaeng, Doonyapong

    2016-01-01

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources

  6. Essential trauma management training: addressing service delivery needs in active conflict zones in eastern Myanmar

    Directory of Open Access Journals (Sweden)

    Richard Matthew G

    2009-03-01

    Full Text Available Abstract Introduction Access to governmental and international nongovernmental sources of health care within eastern Myanmar's conflict regions is virtually nonexistent. Historically, under these circumstances effective care for the victims of trauma, particularly landmine injuries, has been severely deficient. Recognizing this, community-based organizations (CBOs providing health care in these regions sought to scale up the capacity of indigenous health workers to provide trauma care. Case description The Trauma Management Program (TMP was developed by CBOs in cooperation with a United States-based health care NGO. The goal of the TMP is to improve the capacity of local health workers to deliver effective trauma care. From 2000 to the present, international and local health care educators have conducted regular workshops to train indigenous health workers in the management of landmine injuries, penetrating and blunt trauma, shock, wound and infection care, and orthopedics. Health workers have been regularly resupplied with the surgical instruments, supplies and medications needed to provide the care learnt through TMP training workshops. Discussion and Evaluation Since 2000, approximately 300 health workers have received training through the TMP, as part of a CBO-run health system providing care for approximately 250 000 internally displaced persons (IDPs and war-affected residents. Based on interviews with health workers, trauma registry inputs and photo/video documentation, protocols and procedures taught during training workshops have been implemented effectively in the field. Between June 2005 and June 2007, more than 200 patients were recorded in the trauma patient registry. The majority were victims of weapons-related trauma. Conclusion This report illustrates a method to increase the capacity of indigenous health workers to manage traumatic injuries. These health workers are able to provide trauma care for otherwise inaccessible

  7. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  8. Is the Secure Base Phenomenon Evident Here, There, and Anywhere? A Cross-Cultural Study of Child Behavior and Experts' Definitions

    Science.gov (United States)

    Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J.; Peña, Paola P.; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M.; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J.; Monteiro, Ligia; Lay, Keng-Ling

    2013-01-01

    The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the…

  9. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Science.gov (United States)

    2010-10-01

    ... position; (3) Has basic aptitudes and physical abilities including color perception, visual and aural... the certified cargo screening facility security program. Wherever the x-ray system displays colors, the operator must be able to perceive each color. (ii) The ability to distinguish each color displayed...

  10. Are you ready! To take early action? Embedding serious gaming into community managed DRR in Bangladesh

    NARCIS (Netherlands)

    Homberg, M.J.C. van den; Cumiskey, L.; Oprins, E.A.P.B.; Suarez, P.; Hulst, A.H. van der

    2015-01-01

    This paper applies a Game-based Learning Evaluation Model (GEM) to assess whether the early warning - early action serious game "Ready!" is an effective component to add to existing Disaster Risk Reduction (DRR) training curricula, facilitated by NGO staff and applied at the community level. We

  11. Making Room for Ethics

    DEFF Research Database (Denmark)

    Douglas-Jones, Rachel

    2017-01-01

    This article examines the work that goes in to ‘making room’ for ethics, literally and figuratively. It follows the activities of a capacity building Asia-Pacific NGO in training and recognising ethics review committees, using multi-sited field materials collected over 12 months between 2009...

  12. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  13. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  14. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  15. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  16. Conception of a course for professional training and education in the field of computer and mobile forensics

    Science.gov (United States)

    Kröger, Knut; Creutzburg, Reiner

    2012-06-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.

  17. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.

  18. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  19. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  20. Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    OpenAIRE

    Luhach, Ashish Kr.; Dwivedi, Sanjay K; Jha, C K

    2014-01-01

    Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the emin...

  1. Preparing for the Proven Inevitable: An Urban Operations Training Strategy for America’s Joint Force

    Science.gov (United States)

    2006-01-01

    training sites • Dedicated MILCON foreign sites • Abandoned foreign towns • Privately owned “ boutique shoot houses” • Private security-firm training...various surroundings. The customer base for these “ boutique ” shoot houses is primarily wealthy civilians spending leisure time. We identified two of...Both projects are collocated with major resort hotels . ____________ 47 See David Crane, “Valhalla Training Center LLC: The Future of Tactical Training

  2. EXPERIENCE NETWORKING UNIVERSITY OF EDUCATION TRAINING MASTERS SAFETY OF LIFE

    OpenAIRE

    Elvira Mikhailovna Rebko

    2016-01-01

    The article discloses experience networking of universities (Herzen State Pedagogical University and Sakhalin State University) in the development and implementation of joint training programs for master’s education in the field of life safety «Social security in the urban environment». The novelty of the work is to create a schematic design of basic educational training program for master’s education in the mode of networking, and to identify effective instructional techniques and conditions...

  3. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  4. Preparing non-government organization workers to conduct health checks for people with serious mental illness in regional Australia.

    Science.gov (United States)

    Jones, Martin; Kruger, Mellissa; Walsh, Sandra M

    2016-06-01

    WHAT IS KNOWN ON THE SUBJECT?: People diagnosed with schizophrenia or bipolar disorder have a life expectancy 10-15 years less than the general population. In rural and remote Australia, there is a shortage of health care professionals to provide physical health care for people living with a serious mental illness (SMI). A large proportion of the care for people living with a SMI is provided by non-government organizations (NGOs), often employing workers without formal qualifications. There has been minimal research regarding the experiences of NGO workers who have been trained to complete health checks to help people living with SMI to access primary care services. WHAT THIS PAPER ADDS TO EXISTING KNOWLEDGE?: This is the first study to examine the experiences of preparing NGO workers to use the health improvement profile (HIP) to support the physical health of people with SMI. It builds on previous studies that examined the use of the HIP by trained/qualified staff. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: This study highlights that NGO employees may have an important role in helping people with a SMI to address their physical health. Engaging lay workers to use the HIP increases their awareness of the importance of providing good physical health care for people with SMI. The use of a tool, such as the HIP, prepares NGO workers to support the physical health needs and enables them to describe meaningful improvements in the health of people with a SMI. Background The life expectancy of people living with a serious mental illness (SMI) is up to 10-15 years less than the general population. They experience difficulties in accessing timely and appropriate physical health care. People with SMI living in regional Australia experience additional barriers to accessing services. This is in part due to the difficulties associated with recruiting and retaining health professionals in regional Australia. Aim To explore the regional non-government organization (NGO

  5. Career Obsolescence and Social Security: Emerging Education Policy Issues in Law.

    Science.gov (United States)

    Sandow, Stuart A.

    This document is the second in a series of studies designed to examine the legal aspects of various potential educational problems in our society. This particular study deals with the case of a highly trained aerospace technician who sues the social security trust for loan benefits, arguing that he is economically disabled and has been retired by…

  6. Attachment Competences in Children With ADHD During the Social-Skills Training and Attachment (SOSTRA) Randomized Clinical Trial

    DEFF Research Database (Denmark)

    Storebø, Ole Jakob; Skoog, Maria Annette Annelie; Darling Rasmussen, Pernille

    2014-01-01

    % confidence interval = [0.31, 3.58], p = .91). In total, 17 children (36%) changed their entry status, 1 (2%) from secure to insecure attachment, while 16 (34%) changed from insecure to secure attachment. Conclusion: The experimental treatment does not seem to affect attachment competences compared......Objective: To investigate the effects of social-skills training and a parental training program on children with ADHD as measured by the children's attachment competences. Method: The SOSTRA trial is a randomized, parallel-group, outcome-assessor-blinded, superiority trial evaluating 8 weeks social......-skills training and parental training plus standard treatment versus standard treatment alone for 8- to 12-year old children with ADHD. Results: There were no significant differences in attachment competences at 6 months between the experimental (n = 25) and the control (n = 22) groups (odds ratio = 1.06, 95...

  7. Evaluating methods to improve safeguards training courses of ISCN

    International Nuclear Information System (INIS)

    Okumura, Yukiko; Nakamura, Yo; Kawata, Norio

    2014-01-01

    Although questionnaires were used to receive feedbacks from participants at the end of each training course, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of Japan Atomic Energy Agency (JAEA) did not establish a structured evaluation method. To this end, ISCN has started to study on methods to accurately evaluate the courses since April and started to introduce the evaluation method on trial, according to the Donald Kirkpatrick's Four-Level Training Evaluation Model, so as to better develop and conduct more effective courses. This paper will focus on how ISCN has modified the Kirkpatrick's Four-level to adapt to its safeguards training courses. This will then be followed by two particular cases of how the evaluation method functioned for the Additional Protocol training courses held in Malaysia in 2014, and the feedbacks received to improve future training courses. (author)

  8. Effect of specific resistance training on musculoskeletal pain symptoms

    DEFF Research Database (Denmark)

    Pedersen, Mogens Theisen; Andersen, Lars Louis; Jørgensen, Marie Birk

    2013-01-01

    .16, p = 0.045), and there was a significant dose-response relationship between training volume per session and change in pain index (ß = -0.20, p = 0.034). In contrast, training attendance (mean 1.69 sessions per week, SD = 0.8) was not significantly related to the change in pain index. In conclusion......, achieving higher accumulated training volumes was important for reducing musculoskeletal pain in female office workers. The training volume per session should be optimized by securing a load at 10-15 repetition maximum and adhering to principles of progressive overload.......ABSTRACT: Pedersen, MT, Andersen, LL, Jørgensen, MB, Søgaard, K, and Sjøgaard, G. Effect of specific resistance training on musculoskeletal pain symptoms: Dose-response relationship. J Strength Cond Res 27(1): 229-235, 2013-The purpose of this study was to investigate the dose-response of strength...

  9. Safeguards and security progress report, January-December 1983

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B. (comp.)

    1984-09-01

    From January to December 1983, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Nuclear Facility Support, Security Development and Support, Safeguards Technology Development, and International Safeguards. Part 1 covers efforts of direct assistance to the Department of Energy (DOE) and Nuclear Regulatory Commission (NRC) licensee facilities. This assistance includes consultation on materials accounting problems, development of specialized techniques and instruments, and comprehensive participation in the design and implementation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards makes the technology more accessible to those who must apply it. Part 2 treats activities aimed at the security of information and computer systems. Our focus this peiod was on continuing the activities of the Computer Security Center, which provides the basis for encouraging and disseminating this emerging technology, and on the development and demonstration of secure computer systems. Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards, especially those concerning the Gas Centrifuge Enrichment Plant, required a significant portion of our resources. These efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in our benefiting from field experiences in operating environments.

  10. Safeguards and security progress report, January-December 1985

    International Nuclear Information System (INIS)

    1987-03-01

    From January to December 1985, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Safeguards Operations, Security Development and Support, Safeguards Technology Development, and International Support. Part 1 covers efforts of direct assistance to the Department of Energy and Nuclear Regulatory Commission licensee facilities. This assistance includes consultation on materials accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and evaluation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards makes the technology more accessible to those who must apply it. Part 2 treats activities aimed at the security of information and computer systems. Our focus this period was on continuing the activities of the Center for Computer Security, which provides the basis for encouraging and disseminating this emerging technology, and on the development and demonstration of secure computer systems. Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards and international safeguards for reprocessing plants required a significant portion of our resources. All of these efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in our benefiting from field experiences in operating environments

  11. Safeguards and security progress report, January-December 1985

    Energy Technology Data Exchange (ETDEWEB)

    1987-03-01

    From January to December 1985, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Safeguards Operations, Security Development and Support, Safeguards Technology Development, and International Support. Part 1 covers efforts of direct assistance to the Department of Energy and Nuclear Regulatory Commission licensee facilities. This assistance includes consultation on materials accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and evaluation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards makes the technology more accessible to those who must apply it. Part 2 treats activities aimed at the security of information and computer systems. Our focus this period was on continuing the activities of the Center for Computer Security, which provides the basis for encouraging and disseminating this emerging technology, and on the development and demonstration of secure computer systems. Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards and international safeguards for reprocessing plants required a significant portion of our resources. All of these efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in our benefiting from field experiences in operating environments.

  12. Safeguards and Security progress report, January--December 1989

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B.; Jaramillo, G.R. (comps.)

    1990-11-01

    From January to December 1989, the Los Alamos Safeguards and Security Research and Development (R D) program carried out the activities described in the first four parts of this report: Science and Technology Base Development, Basic Systems Design, Onsite Test and Evaluation and Facility Support, and International Safeguards. For the most part, these activities were sponsored by the Department of Energy's Office of Safeguards and Security. Part 1 covers development of the basic technology essential to continuing improvements in the practice of safeguards and security. It includes our computer security R D and the activities of the DOE Center for Computer Security, which provides the basis for encouraging and disseminating this important technology. Part 2 treats activities aimed at developing methods for designing and evaluating safeguards systems, with special emphasis on the integration of the several subsystems into a real safeguards system. Part 3 describes efforts of direct assistance to the DOE and its contractors and includes consultation on materials control and accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and demonstration of advanced safeguards systems. Part 3 also reports a series of training courses in various aspects of safeguards that makes the technology more accessible to those who must apply it. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Part 5 reports several safeguards-related activities that have sponsors other than the DOE/OSS. 87 refs., 52 figs.

  13. Safeguards and security progress report, January-December 1983

    International Nuclear Information System (INIS)

    Smith, D.B.

    1984-09-01

    From January to December 1983, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Nuclear Facility Support, Security Development and Support, Safeguards Technology Development, and International Safeguards. Part 1 covers efforts of direct assistance to the Department of Energy (DOE) and Nuclear Regulatory Commission (NRC) licensee facilities. This assistance includes consultation on materials accounting problems, development of specialized techniques and instruments, and comprehensive participation in the design and implementation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards makes the technology more accessible to those who must apply it. Part 2 treats activities aimed at the security of information and computer systems. Our focus this peiod was on continuing the activities of the Computer Security Center, which provides the basis for encouraging and disseminating this emerging technology, and on the development and demonstration of secure computer systems. Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards, especially those concerning the Gas Centrifuge Enrichment Plant, required a significant portion of our resources. These efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in our benefiting from field experiences in operating environments

  14. The African Geospatial Sciences Institute (agsi): a New Approach to Geospatial Training in North Africa

    Science.gov (United States)

    Oeldenberger, S.; Khaled, K. B.

    2012-07-01

    The African Geospatial Sciences Institute (AGSI) is currently being established in Tunisia as a non-profit, non-governmental organization (NGO). Its objective is to accelerate the geospatial capacity development in North-Africa, providing the facilities for geospatial project and management training to regional government employees, university graduates, private individuals and companies. With typical course durations between one and six months, including part-time programs and long-term mentoring, its focus is on practical training, providing actual project execution experience. The AGSI will complement formal university education and will work closely with geospatial certification organizations and the geospatial industry. In the context of closer cooperation between neighboring North Africa and the European Community, the AGSI will be embedded in a network of several participating European and African universities, e. g. the ITC, and international organizations, such as the ISPRS, the ICA and the OGC. Through a close cooperation with African organizations, such as the AARSE, the RCMRD and RECTAS, the network and exchange of ideas, experiences, technology and capabilities will be extended to Saharan and sub-Saharan Africa. A board of trustees will be steering the AGSI operations and will ensure that practical training concepts and contents are certifiable and can be applied within a credit system to graduate and post-graduate education at European and African universities. The geospatial training activities of the AGSI are centered on a facility with approximately 30 part- and full-time general staff and lecturers in Tunis during the first year. The AGSI will operate a small aircraft with a medium-format aerial camera and compact LIDAR instrument for local, community-scale data capture. Surveying training, the photogrammetric processing of aerial images, GIS data capture and remote sensing training will be the main components of the practical training courses

  15. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  16. Physical protection educational program - information security aspects

    International Nuclear Information System (INIS)

    Tolstoy, A.

    2002-01-01

    Full text: Conceptual approaches for designing an expert training program on object physical protection taking into account information security aspects are examined. A special educational course does not only address the immediate needs for an educational support but also ensures that new professionals include new concepts and knowledge in their practice and encourages current practitioners towards such practice. Features of the modern physical protection systems (PPS) and classification of information circulating at them are pointed out. The requirements to the PPS information protection subsystem are discussed. During the PPS expert training on information security (IS) aspects they should receive certain knowledge, on the basis of which they could competently define and carry out the PPS IS policy for a certain object. Thus, it is important to consider minimally necessary volume of knowledge taught to the PPS experts for independent and competent implementation of the above listed tasks. For the graduate PPS IS expert training it is also necessary to examine the normative and legal acts devoted to IS as a whole and the PPS IS in particular. It is caused by necessity of conformity of methods and information protection tools implemented on a certain object to the federal and departmental IS requirements. The departmental normative IS requirements define an orientation of the PPS expert training. By curriculum development it is necessary to precisely determine for whom the PPS experts are taught. The curriculum should reflect common features of the PPS functioning of the certain object type, i.e. it should be adapted to a certain customer of the experts. The specified features were taken into account by development of an educational course 'Information security of the nuclear facility physical protection systems', taught at the Moscow Engineering Physics Institute (State University) according to the Russian-American educational program 'Master in Physical

  17. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  18. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  19. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  20. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Directory of Open Access Journals (Sweden)

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.