WorldWideScience

Sample records for personal protective technology

  1. 78 FR 48683 - National Institute for Occupational Safety and Health (NIOSH) Personal Protective Technology (PPT...

    Science.gov (United States)

    2013-08-09

    ... Technology (PPT) Program; Framework Document for the Healthcare Worker Personal Protective Equipment Action... titled ``Framework for Setting the NIOSH PPT Program Action Plan for Healthcare Worker Personal... NIOSH personal protective technology (PPT) program publishes and periodically updates its research...

  2. 78 FR 12065 - National Institute for Occupational Safety and Health Personal Protective Technology for...

    Science.gov (United States)

    2013-02-21

    ... Institute for Occupational Safety and Health Personal Protective Technology for Pesticide Handlers: Stakeholder Meeting AGENCY: The National Institute for Occupational Safety and Health (NIOSH) of the Centers...: Notice of public meeting. SUMMARY: The National Institute for Occupational Safety and Health (NIOSH) of...

  3. Effectiveness of ultraviolet light personal protective equipment used ...

    African Journals Online (AJOL)

    Journal of Agriculture, Science and Technology ... (UV) light personal protective equipment (PPE) used by arc welders in the informal sector. ... all had formal education: 31.1% had primary school level as the highest attained education level, ...

  4. Personal protective equipment

    International Nuclear Information System (INIS)

    2004-01-01

    This Practical Radiation Technical Manual is one of a series that has been designed to provide guidance on radiological protection for employers, radiation protection officers, managers and other technically competent persons who have responsibility for ensuring the safety of employees working with ionizing radiation. The Manual may be used with the appropriate IAEA Practical Radiation Safety Manuals to provide training, instruction and information for all employees engaged in work with ionizing radiation. Personal protective equipment (PPE) includes clothing or other special equipment that is issued to individual workers to provide protection against actual or potential exposure to ionizing radiations. It is used to protect each worker against the prevailing risk of external or internal exposure in circumstances in which it is not reasonably practicable to provide complete protection by means of engineering controls or administrative methods. Adequate personal protection depends on PPE being correctly selected, fitted and maintained. Appropriate training for the users and arrangements to monitor usage are also necessary to ensure that PPE provides the intended degree of protection effectively. This Manual explains the principal types of PPE, including protective clothing and respiratory protective equipment (RPE). Examples of working procedures are also described to indicate how PPE should be used within a safe system of work. The Manual will be of most benefit if it forms part of a more comprehensive training programme or is supplemented by the advice of a qualified expert in radiation protection. Some of the RPE described in this Manual should be used under the guidance of a qualified expert

  5. Personal radiation protection in nuclear industry

    International Nuclear Information System (INIS)

    Gol'dshtejn, D.S.; Koshcheev, V.S.

    1983-01-01

    Specific peculiarities of organization of personal radiation protection at various nuclear industry enterprises when dealing with radioactive and other toxic substances are illuminated. Effect of heatin.g and cooling microclimate is discussed. Medical and technical requirements for personal protection means and tasks of personal protection in the field of nuclear industry are considered in short along with some peculiarities of application of different kinds of personal protection means and psychological aspects of personnel protection

  6. A privacy protection model to support personal privacy in relational databases.

    OpenAIRE

    2008-01-01

    The individual of today incessantly insists on more protection of his/her personal privacy than a few years ago. During the last few years, rapid technological advances, especially in the field of information technology, directed most attention and energy to the privacy protection of the Internet user. Research was done and is still being done covering a vast area to protect the privacy of transactions performed on the Internet. However, it was established that almost no research has been don...

  7. Data Protection Issues in Higher Education with Technological Advancements

    Science.gov (United States)

    McKelvey, Nigel

    2014-01-01

    Adhering to laws whilst working or studying in an educational establishment is often fraught with challenges. The Irish Data Protection Act 1988 (Amendment 2003) strives to protect the individual where their personal data is potentially being abused. The advancements in technologies have facilitated educational establishments by improving…

  8. BIOETHICAL SENSIBILITY OF THE LAW ON PROTECTION OF PERSONS WITH MENTAL DIFFICULTIES

    Directory of Open Access Journals (Sweden)

    Velinka Grozdanić

    2017-01-01

    Full Text Available A more and more obvious gap between the human spiritual development, which mostly stagnates, and often even regresses, and the technological development of society, which intensively and unstoppably grows, has been the initiation of numerous bioethical discussions that cover a wide range of topics, i.e. from a concern for a man and his health to a concern for nature and preservation of life in general. No matter the fact that numerous ethical discussions, which highlighted the last decade, have resulted with commonly accepted principles, several ethical issues were left without clear and unambiguous solutions. Within this context, the legal regulations expected to protect persons from unacceptable and harmful actions, but at the same time not to present an obstacle to scientific and technological development of society, have gained a special meaning. This is a significant challenge due to the fact that through statutory provisions we need to reach a balance between the freedom of scientific research and protection of a man. Although ethical dilemmas follow almost every field of human actions, bioethical contents are especially associated with the unimaginable technological achievements in medicine. Thereby, persons with mental difficulties, as one of the most vulnerable groups of patients, demand a highlighted bioethical sensibility within the meaning of humanity, understanding and enhanced awareness when ethically questionable medical procedures are applied on them, and especially when these patients are included in, sometimes even hazardous, biomedical researches. A basic protective mechanism for this category of persons in the Republic of Croatia is the Law on Protection of Persons with Mental Difficulties. The Law establishes a clear legal framework to proceed with actions designated for persons with mental difficulties, and certain legal provisions embodied within the Law could be considered a quite concrete answer to numerous ethical

  9. Experimental investigation of centrifugal fans for personal protection equipment - effect of used 3D printing technologies

    Science.gov (United States)

    Dvořák, Václav; Votrubec, Radek; Šafka, Jiří; Kracík, Jan

    2018-06-01

    The aim of the research is experimental investigation of centrifugal fans for a personal protection equipment. The aim of the fan is to drive the contaminated air containing harmful or irritating particles through the filters and then into the mask of workers, such as a fireman, a labourer or a lab worker. The fan is measured on the test stand, the characteristics and performances are evaluated, i.e. the dependencies of the working pressure on the flow rate. The characteristics are measured for three constant speed settings. The characteristics of the wheels produced by the different 3D printing technology are compared. It is found that the production technology has only a minimal effect, the performance of the wheels is more influenced by the position of the impeller on the motor shaft and hence by the mutual position of the impeller and the diffuser.

  10. Safety of persons protected by the Government Protection Bureau

    Directory of Open Access Journals (Sweden)

    Wojciech Lis

    2015-12-01

    Full Text Available The state is the organizational structure, which unites the whole nation by providing optimal conditions for the functioning and development. One of the conditions for the basic functions of the state is efficient administration headed by a person with the role of management. They not only hold the highest position, but also represent the authority of the state. For this reason, they need special protection. Each attack undermines the authority of the administration and trust in the state institutions. For the protection of persons performing managerial functions in the state corresponds to the Government Protection Bureau that providing them protection at the same time protect the state.

  11. Personal Protective Equipment

    National Research Council Canada - National Science Library

    1998-01-01

    ... of personal protective equipment A safety program for new employees is a necessary part of any orientation program An on-going safety program should be used to motivate employees to continue to use...

  12. Experimental investigation of centrifugal fans for personal protection equipment – effect of used 3D printing technologies

    Directory of Open Access Journals (Sweden)

    Dvořák Václav

    2018-01-01

    Full Text Available The aim of the research is experimental investigation of centrifugal fans for a personal protection equipment. The aim of the fan is to drive the contaminated air containing harmful or irritating particles through the filters and then into the mask of workers, such as a fireman, a labourer or a lab worker. The fan is measured on the test stand, the characteristics and performances are evaluated, i.e. the dependencies of the working pressure on the flow rate. The characteristics are measured for three constant speed settings. The characteristics of the wheels produced by the different 3D printing technology are compared. It is found that the production technology has only a minimal effect, the performance of the wheels is more influenced by the position of the impeller on the motor shaft and hence by the mutual position of the impeller and the diffuser.

  13. Protection of personality rights in civil law

    Directory of Open Access Journals (Sweden)

    Simonović Ivana

    2014-01-01

    Full Text Available Personality rights have long been described as the youngest member of the civil law family of absolute subjective (individual civil rights. By establishing these rights, an individual is guaranteed full and direct legal authority and control over one's personal assets, which include the most important human values such as: life, integrity, dignity and privacy. The ultimate importance of these personal assets is supported by appropriate legal protection of personality rights, which have been guaranteed in numerous provisions of constitutional law, civil law, criminal law and administrative law. The legal protection of personality rights stems from the understanding that a human being cannot be reduced to a biological entity; being part of the community, man is also a social being. Taking into account constant interactions and mutual relations between members of the society, man should be guaranteed certain rights. It primarily implies the guaranteed right to inviolability of one's personality, which is the basis for generating other personality rights. These rights are inherent, inalienable and absolute in terms of their effects; as such, they provide protection from the interference of the state and any third party. Focusing on the rules of civil law, the authors have explored the potentials and the scope of legal protection of personality rights provided by awarding a civil sanction. Although civil sanction is basically monetary sanction, it is deemed to be quite appropriate for the protection of personal (non-patrimonial assets.

  14. Personal Ice Cooling System (PICS). Innovative technology summary report

    International Nuclear Information System (INIS)

    1998-11-01

    The United States Department of Energy (DOE) continually seeks safer and more cost-effective remediation technologies for use in the decontamination and decommissioning (D and D) of nuclear facilities. To this end, the Deactivation and Decommissioning Focus Area (DDFA) of the DOE's Office of Science and Technology sponsors Large-Scale Demonstration and Deployment Projects (LSDDPs) in which developers and vendors of improved or innovative technologies showcase products that are potentially beneficial to the DOE's projects and to others in the D and D community. Benefits sought include decreased health and safety risks to personnel and the environment, increased productivity, and decreased cost of operation. As buildings are demolished as part of the DOE Fernald Environmental Management Project's (FEMP's) D and D Plan, many of the activities are performed in hot weather and usually require use of various types and layers of personal protective equipment (PPE). While PPE is designed to protect the worker from contamination, it also significantly compromises the body's ability to cool itself, leading to potentially serious heat stress situations. This report describes a comparative demonstration between the methodology currently used for heat stress management (i.e., limited stay times and cool-down rooms) and an alternative personal ice cooling suit technology. The baseline methodology for heat stress management is limited stay times when working in hot conditions. The FEMP's Safety Performance Requirements outline the procedures and stay times to be followed and consider the temperature of the working environment, work load, and the type and amount of PPE required for the job. While these common criteria for determining stay times, other sites may have different requirements. This demonstration investigates the feasibility of using the personal ice cooling suite as a tool for managing heat stress in workers at the FEMP. This report provides a comparative analysis of

  15. Personal Ice Cooling System (PICS). Innovative technology summary report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    The United States Department of Energy (DOE) continually seeks safer and more cost-effective remediation technologies for use in the decontamination and decommissioning (D and D) of nuclear facilities. To this end, the Deactivation and Decommissioning Focus Area (DDFA) of the DOE`s Office of Science and Technology sponsors Large-Scale Demonstration and Deployment Projects (LSDDPs) in which developers and vendors of improved or innovative technologies showcase products that are potentially beneficial to the DOE`s projects and to others in the D and D community. Benefits sought include decreased health and safety risks to personnel and the environment, increased productivity, and decreased cost of operation. As buildings are demolished as part of the DOE Fernald Environmental Management Project`s (FEMP`s) D and D Plan, many of the activities are performed in hot weather and usually require use of various types and layers of personal protective equipment (PPE). While PPE is designed to protect the worker from contamination, it also significantly compromises the body`s ability to cool itself, leading to potentially serious heat stress situations. This report describes a comparative demonstration between the methodology currently used for heat stress management (i.e., limited stay times and cool-down rooms) and an alternative personal ice cooling suit technology. The baseline methodology for heat stress management is limited stay times when working in hot conditions. The FEMP`s Safety Performance Requirements outline the procedures and stay times to be followed and consider the temperature of the working environment, work load, and the type and amount of PPE required for the job. While these common criteria for determining stay times, other sites may have different requirements. This demonstration investigates the feasibility of using the personal ice cooling suite as a tool for managing heat stress in workers at the FEMP. This report provides a comparative analysis of

  16. Google and personal data protection

    NARCIS (Netherlands)

    van der Sloot, B.; Zuiderveen Borgesius, F.; Lopez-Tarruella, A.

    2012-01-01

    This chapter discusses the interplay between the European personal data protection regime and two specific Google services, Interest-Based Advertising and Google Street View. The chapter assesses first the applicability of the Data Protection Directive, then jurisdictional issues, the principles

  17. The Use of Speech Technology to Protect the Document Turnover

    Directory of Open Access Journals (Sweden)

    Alexandr M. Alyushin

    2017-06-01

    Full Text Available The wide current paper documents implementation in practice workflows are shown. The basic aspects of document protection related to the protection of their content and legal components are underlined. For contextual component assigned semantic information aspect of the document is considered. For legal component attributed facts and conditions for the creation, approval, negotiation of the document to specific persons is viewed. The documents protection problem importance is shown in connection with possible terrorist threats. The importance of such factor as the time of fraud detection towards the efficiency of documents protection is shown. The fraud detection time requirements for documents of different nature – financial, legal, management is analyzed. The documents used for the operational management of dangerous objects is point out as the most sensitive to the falsification. It is shown that their deliberate falsification can lead to accidents and technogenic catastrophes and human casualties. A comparative analysis of currently used protecting documents methods are presented. Biometric and non-biometric methods of documents protection are point out.Theanalysis of their short comings are given. The conclusion about the prospects of document protection on the basis of the voice signature technology are done. The basic steps of voice information processing in the implementation of this technology are analyzed. The software that implements a documents counterfeiting new protection technology is proposed. The technology is based on the audiomarkers usage at the end of the document, which contains a general information about it. The technology is applicable to the wide range of documents such as financial and valuable papers, contracts, etc. One of the most important advantages of this technology is that any changes in the document can not be done without the author of the document because audiomarker keeps the biometric data of the person

  18. 22 CFR 212.22 - Protection of personal privacy.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying details...

  19. DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT FOR DECONTAMINATION AND DECOMMISSIONING

    International Nuclear Information System (INIS)

    Ebadian, M.A.

    1999-01-01

    The purpose of this one-year investigation is to perform a technology integration/search, thereby ensuring that the safest and most cost-effective options are developed and subsequently used during the deactivation and decommissioning (D and D) of U.S. Department of Energy Environmental Management (DOE-EM) sites. Issues of worker health and safety are the main concern, followed by cost. Two lines of action were explored: innovative Personal Cooling Systems (PCS) and Personal Monitoring Equipment (PME). PME refers to sensors affixed to the worker that warn of an approaching heat stress condition, thereby preventing it. Three types of cooling systems were investigated: Pre-Chilled or Forced-Air System (PCFA), Umbilical Fluid-Chilled System (UFCS), and Passive Vest System (PVS). Of these, the UFCS leads the way. The PVS or Gel pack vest lagged due to a limited cooling duration. And the PCFA or chilled liquid air supply was cumbersome and required an expensive and complex recharge system. The UFCS in the form of the Personal Ice Cooling System (PICS) performed exceptionally. The technology uses a chilled liquid circulating undergarment and a Personal Protective Equipment (PPE) external pump and ice reservoir. The system is moderately expensive, but the recharge is low-tech and inexpensive enough to offset the cost. There are commercially available PME that can be augmented to meet the DOE's heat stress alleviation need. The technology is costly, in excess of $4,000 per unit. Workers easily ignore the alarm. The benefit to health and safety is indirect so can be overlooked. A PCS is a more justifiable expenditure

  20. Insertion Loss of Personal Protective Clothing

    International Nuclear Information System (INIS)

    Shull, D.J.

    1999-01-01

    The use of personal protective clothing that covers the head is a common practice in many industries. Such personal protective clothing will impact the sound pressure level and the frequency content of sounds to which the wearer will be exposed. The use of such clothing, then, may impact speech and alarm audibility. A measure of the impact of such clothing is its insertion loss. Insertion loss measurements were performed on four types of personal protective clothing in use by Westinghouse Savannah River Company personnel which utilize cloth and plastic hood configurations to protect the head. All clothing configurations tested at least partially cover the ears. The measurements revealed that insertion loss of the items tested was notable at frequencies above 1000 Hz only and was a function of material stiffness and acoustic flanking paths to the ear. Further, an estimate of the clothing's noise reduction rating reveals poor performance in that regard, even though the insertion loss of the test articles was significant at frequencies at and above 1000 Hz.'

  1. Protection of civil rights and technological development

    International Nuclear Information System (INIS)

    Wagner, H.

    1985-01-01

    The question of how the consequences of technological development are to be mastered on the legal level is not primarily a problem of the administrative procedure. The essential point in the discussion on protection of basic rights is not to be seen in the citizen's right to participate in administrative procedures, but rather in the substantive civil rights of individual persons as against the government, together with the system of values established in the Basic Law and derived from the basic rights, as well as in the proper functioning of the principle of separation of powers (legislature, administration, and judicature). The law on procedure and thus the idea of (protection of civil rights by rules of procedure) in this context only have an enhancing effect. Practical protection of civil rights is also ascertained in the Federal Republic of Germany by the particularly well-established guarantee of access to the courts. Another idea to be mentioned in this context is an approach that can be termed as 'protection of civil rights by government-funded research'. Other facts contributing to building a protective shield against infringement of civil rights by technology, activities or installations, include e.g. the federal structure of the state and the administration, type and scope of organisation of the public service, the established system of environmental protection and the safety provided by the current system of expert opinions. (orig./HSCH) [de

  2. Protection of civil rights and technological development

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, H

    1985-01-01

    The question of how the consequences of technological development are to be mastered on the legal level is not primarily a problem of the administrative procedure. The essential point in the discussion on protection of basic rights is not to be seen in the citizen's right to participate in administrative procedures, but rather in the substantive civil rights of individual persons as against the government, together with the system of values established in the Basic Law and derived from the basic rights, as well as in the proper functioning of the principle of separation of powers (legislature, administration, and judicature). The law on procedure and thus the idea of (protection of civil rights by rules of procedure) in this context only have an enhancing effect. Practical protection of civil rights is also ascertained in the Federal Republic of Germany by the particularly well-established guarantee of access to the courts. Another idea to be mentioned in this context is an approach that can be termed as 'protection of civil rights by government-funded research'. Other facts contributing to building a protective shield against infringement of civil rights by technology, activities or installations, include e.g. the federal structure of the state and the administration, type and scope of organisation of the public service, the established system of environmental protection and the safety provided by the current system of expert opinions. (orig./HSCH).

  3. Mars Technology Program Planetary Protection Technology Development

    Science.gov (United States)

    Lin, Ying

    2006-01-01

    The objectives of the NASA Planetary Protection program are to preserve biological and organic conditions of solar-system bodies for future scientific exploration and to protect the Earth from potential hazardous extraterrestrial contamination. As the exploration of solar system continues, NASA remains committed to the implementation of planetary protection policy and regulations. To fulfill this commitment, the Mars Technology Program (MTP) has invested in a portfolio of tasks for developing necessary technologies to meet planetary protection requirements for the next decade missions.

  4. Mars Technology Program: Planetary Protection Technology Development

    Science.gov (United States)

    Lin, Ying

    2006-01-01

    This slide presentation reviews the development of Planetary Protection Technology in the Mars Technology Program. The goal of the program is to develop technologies that will enable NASA to build, launch, and operate a mission that has subsystems with different Planetary Protection (PP) classifications, specifically for operating a Category IVb-equivalent subsystem from a Category IVa platform. The IVa category of planetary protection requires bioburden reduction (i.e., no sterilization is required) The IVb category in addition to IVa requirements: (i.e., terminal sterilization of spacecraft is required). The differences between the categories are further reviewed.

  5. Systematic approach in protection and ergonomics testing personal protective equipment

    NARCIS (Netherlands)

    Hartog. E.A. den

    2009-01-01

    In the area of personal protection against chemical and biological (CB) agents there is a strong focus on testing the materials against the relevant threats. The testing programs in this area are elaborate and are aimed to guarantee that the material protects according to specifications. This

  6. Second meeting of competent persons in radiation protection

    International Nuclear Information System (INIS)

    2000-01-01

    This conference treats the subjects interesting the competent persons in radiation protection. It is divided in four sessions. The first one concerns the regulatory bases for the action of competent persons and includes three articles, the second one is about the operational dosimetry and includes six articles, the third session is devoted to the sources and waste management and represents two texts, the last and fourth session concerns the competent person in radiation protection and gives evidence. (N.C.)

  7. Information booklet on personal protective equipment: arm and hand protection

    International Nuclear Information System (INIS)

    1992-01-01

    Fire, heat, cold, electro-magnetic and ionising radiation, electricity, chemicals, impacts, cuts, abrasion, etc. are the common hazards for arms and hands at work. The gloves chosen for protection of the arm and hand should cover those parts adequately and the material of the gloves should be capable of offering protection against the specific hazard involved. Criteria for choosing arm and hand protection equipment will be based on their shape and part of the arm and hand protected. Guide lines for choosing such personal protection equipment for nuclear facilities are given. (M.K.V.). 3 annexures, 1 appendix

  8. FIRE PROTECTION SYSTEMS AND TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Aristov Denis Ivanovich

    2016-03-01

    Full Text Available The All-Russian Congress “Fire Stop Moscow” was de-voted to the analysis of the four segments of the industry of fire protection systems and technologies: the design of fire protec-tion systems, the latest developments and technologies of active and passive fire protection of buildings, the state and the devel-opment of the legal framework, the practice of fire protection of buildings and structures. The forum brought together the repre-sentatives of the industry of fire protection systems, scientists, leading experts, specialists in fire protection and representatives of construction companies from different regions of Russia. In parallel with the Congress Industrial Exhibition of fire protection systems, materials and technology was held, where manufacturers presented their products. The urgency of the “Fire Stop Moscow” Congress in 2015 organized by the Congress Bureau ODF Events lies primarily in the fact that it considered the full range of issues related to the fire protection of building and construction projects; studied the state of the regulatory framework for fire safety and efficiency of public services, research centers, private companies and busi-nesses in the area of fire safety. The main practical significance of the event which was widely covered in the media space, was the opportunity to share the views and information between management, science, and practice of business on implementing fire protection systems in the conditions of modern economic relations and market realities. : congress, fire protection, systems, technologies, fire protection systems, exhibition

  9. Study to the current protection of personal data in the educational sector in Indonesia

    Science.gov (United States)

    Rosmaini, E.; Kusumasari, T. F.; Lubis, M.; Lubis, A. R.

    2018-03-01

    This study examines how legal expert interpret UU ITE to protect personal data based on privacy principle by using content analysis. This act has importance in order to govern the process of collection, use, transfer, disclose and store personal data for profit or other commercial purposes. By recognizing both the right of individual for privacy and the need of organization to utilize the customer data, the Act, which was amended by Parliament at October, 27th 2016 have critical role for protection guideline in Indonesia. Increasingly, with the use of advanced technology, data protection became one of the main issues on various sectors, especially in the educational sector. Educational institutions require large amount of personal data to run their business process to support learning, teaching, research and administration process. It involves wide range of personal data from institution, agencies, colleges, lecturers, students and parents, which might consist of several sensitive and confidential data such as historical, health, financial, academic and experience background. Underestimating and ignoring these issues can lead to disaster such as blackmailing, stalking, bullying or improper use of personal data. In aggregation, they might deliver huge loss to institution either financially or trust. Thus, this study analyse the privacy principle of UU ITE through 21 coders from legal expert to obtain more understanding of appropriate approach to implement privacy policy in the educational sector.

  10. Measured results and assessment of personal protection appliances against ionizing radiation

    International Nuclear Information System (INIS)

    Ge Lijuan; Lin Zhikai; Cao Jisheng; Zhu Pei; Tang Haiying; Liu Baiqun

    2011-01-01

    Objective: To monitor the protective qualities of personal protective appliances and to ensure the health and safety of radiological working personnel. Methods: The lead-equivalent thickness of personal protective appliances and materials was measured by means of standard lead slices. The lead equivalent thickness represents in terms of mm Pb. Results: 77 pieces of products and samples were measured altogether. The results indicate that the specific lead equivalents of lead-rubber plates were between 0.20-0.39 mm Pb/mm for 37 pieces of lead-rubber plates and the values of 6 pieces of samples were less than 0.25 mm Pb/mm, which did not accord with the requirement of the relational standard. 27 pieces of personal protection appliances were measured altogether. They were 12 pieces of protective clothes, 4 pieces of protective headgears, 5 pieces of protective neckpieces, 4 pieces of protective gloves and 2 pieces of protective masks. 13 pairs of lead-glass spectacles among them were measured altogether. The measured results for personal protective appliances and lead-glass spectacles showed that actually measured lead-equivalent were higher than the nominal lead-equivalent. Conclusions: The protective qualities are reliable for personal protection materials and appliances to be made in home and imported abroad. But the protective qualities of interventional protection gloves should be improved and made them better. (authors)

  11. INDIVIDUAL AND ORGANIZATIONAL VARIABLES AFFECTING THE USE OF PERSONAL PROTECTIVE EQUIPMENT

    Directory of Open Access Journals (Sweden)

    TUNÇ DEMİRBİLEK

    2013-06-01

    Full Text Available Management’s safety approach and commitment are related to occupational health and safety applications in workplaces. However, personal characteristics and attitudes on their health of employees are very influential factors on occupational health and safety applications. For examine of interaction between behaviors and the health and safety applications it is required that determine of employee’s perceptions. For this reason this paper’s purpose is to establish of safety needs, attitudes and behaviors of employees and their perceptions regarding management’s safety approach and applications. The study’s focal point is use of personal protective equipment as an indicator “safety behavior”. In empirical study, assumption variables regarding the use of personal protective equipment are safety effectively, safety need, management attitudes and protective equipment conditions. The fundamental hypothesis of this paper is use of personal protective equipment is related to individual and organizational variables. Implications of research findings are to indicate impelling the workers to safety behaviour or using the personal protective equipment by their feeling of the safety behaviour and availability of personal protective equipment.

  12. 36 CFR 902.56 - Protection of personal privacy.

    Science.gov (United States)

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or employee...

  13. Information booklet on personal protective equipment: eye and face protection

    International Nuclear Information System (INIS)

    1992-01-01

    In all work places where hazards of various kinds are present and the same cannot be totally controlled by engineering methods, suitable personal protective equipment (PPE) shall be used. There are several types of eye and face protection devices available in the market and it is important that employees use the proper type for the particular job. The main classes of eye and face protection devices required for the industrial operations are as follows: (a) eye protection devices which includes: (i) safety goggles (ii) safety spectacles (iii) safety clipons and eye and face protection devices which are (i) eye shield, (ii) face shield, (iii) wire mesh screen guard. Guide lines for selecting appropriate ear and face protection equipment for nuclear installations are given. (M.K.V.). 4 annexures, 1 appendix

  14. Hybrid Paradigm from European and America Concerning Privacy and Personal Data Protection in Indonesia

    Directory of Open Access Journals (Sweden)

    Edmon Makarim

    2013-05-01

    Full Text Available In the emerging era of information and technology, the importance of privacy and data protection is growing ever since. However, despite such common concern from the society, there is some confusion about the mechanisms of differentiation and scope of discussion about privacy with the protection of personal data and even impressed blended with issues of spamming issues. With comparison to Europe and the US legal perspectives, Therefore, this paper tries to discuss such problem in accordance to the perspective of laws to the communication itself.

  15. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  16. Implications of the Protection of Personal Information (POPI)

    African Journals Online (AJOL)

    The main purpose of the POPI act is to protect the processing of personal information ... a smartphone, iPad or personal computer), digital storage devices. (iCloud, Dropbox ... (vi) Reasonable security regarding the safeguarding, integrity and.

  17. Data Protection in Financial Technology Services (A Study in Indonesian Legal Perspective

    Directory of Open Access Journals (Sweden)

    Dian Purnama Anugerah

    2018-01-01

    Full Text Available The banking sector is facing a new competitor, namely Financial Technology (Fin-tech. Fin-tech itself can be described as an industry composed of companies using a new tech-nology and innovation with available resources in order to compete in the marketplace of tradi-tional financial institutions and intermediaries in the delivery of financial services. In Indonesia, Fin-tech has been widely developed since the past 3 years. Fin-tech faces a new challenge as a new service for financial consumer which adapts to new ways of living in modern digital tech-nology era. Basically, Fin-tech offers three main categories such as payment, personal finance, and financing. In financing application there are peer to peer financing, social crowd funding, and loan marketplace. All of these kinds of application have some issues in legal framework and data protection due to the use of communication technologies such as internet, social networks, Smartphone, massive use of data with the Big Data, connected objects, etc. The use of big data and those new technologies create new opportunities for these sectors, and this development also raises significant data protection concerns. This paper discusses two legal issues of Fin-tech, the legal aspect, and the data protection.

  18. Safety of nursing staff and determinants of adherence to personal protective equipment.

    Science.gov (United States)

    Neves, Heliny Carneiro Cunha; Souza, Adenícia Custódia Silva e; Medeiros, Marcelo; Munari, Denize Bouttelet; Ribeiro, Luana Cássia Miranda; Tipple, Anaclara Ferreira Veiga

    2011-01-01

    A qualitative study conducted in a teaching hospital with 15 nursing professionals. Attempted to analyze the reasons, attitudes and beliefs of nursing staff regarding adherence to personal protective equipment. Data were collected through focus groups, analyzed by the method of interpretation of meanings, considering Rosenstock's model of health beliefs as a reference framework. Data revealed two themes: Occupational safety and Interpersonal Relationship. We identified several barriers that interfere in matters of safety and personal protective equipment, such as communication, work overload, physical structure, accessibility of protective equipment and organizational and management aspects. Adherence to personal protective equipment is determined by the context experienced in the workplace, as well as by individual values and beliefs, but the decision to use the personal protective equipment is individual.

  19. Assessing personal disposition of individuals towards technology adoption

    Directory of Open Access Journals (Sweden)

    Irbha Magotra

    2016-06-01

    Full Text Available The present study has attempted to explore personal disposition of individuals towards technology adoption through the development of an index named as Technology Adoption Index. For developing the index, exploratory factor analysis approach has been employed on the sample of 1201 responses collected from the residents of 12 different cities in India. Accordingly, the results of the index have indicated significant role of seven personal traits, namely, optimism, innovativeness, self-efficacy, risk taking propensity, habit, social influence and psychological resilience while manifesting personal disposition of individuals towards technology adoption, i.e., the technology adoption propensity of the individuals. Further, an attempt has also been made to explore the socio-economic characteristics of the individuals possessing distinct level of personal disposition towards technology adoption. Accordingly, the results have unveiled that the personal disposition of the individuals towards technology adoption increases with enhancement in their income and qualification but decreases with enhancement in their age. As a measurement tool, Technology Adoption Index can be used as ready-recknor by practitioners for the identification of technology adoption propensity of the individuals. This will facilitate organizations in developing and designing new products and services which can be readily accepted by the individuals.

  20. Mandatory certification of personal protection equipment against ionizing radiation

    International Nuclear Information System (INIS)

    Palacios, Tulio A.

    2000-01-01

    This paper analyze the regulations establishing mandatory certification of personal protection equipment, including those aim to protect against ionizing radiation due to the external irradiation and to the radioactive contamination. (author)

  1. Protecting personal information: Implications of the Protection of Personal Information (POPI) Act for healthcare professionals.

    Science.gov (United States)

    Buys, M

    2017-10-31

    Careless handling of patient information in daily medical practice can result in Health Professions Council of South Africa sanction, breach of privacy lawsuits and, in extreme cases, serious monetary penalty or even imprisonment. This review will focus on the Protection of Personal Information (POPI) Act (No. 4 of 2013) and the implications thereof for healthcare professionals in daily practice. Recommendations regarding the safeguarding of information are made.

  2. Personal health record systems and their security protection.

    Science.gov (United States)

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  3. Personal Data Protection in New Zealand: Lessons for South Africa?

    Directory of Open Access Journals (Sweden)

    A Roos

    2008-12-01

    Full Text Available In 1995 the European Union adopted a Directive on data protection. Article 25 of this Directive compels all EU member countries to adopt data protection legislation and to prevent the transfer of personal data to non-EU member countries ('third countries' that do not provide an adequate level of data protection. Article 25 results in the Directive having extra-territorial effect and exerting an influence in countries outside the EU. Like South Africa, New Zealand is a 'third' country in terms of the EU Directive on data protection. New Zealand recognised the need for data protection and adopted a data protection Act over 15 years ago. The focus of this article is on the data protection provisions in New Zealand law with a view to establishing whether South Africa can learn any lessons from them. In general, it can be said that although New Zealand law does not expressly recognise a right to privacy, it has a data protection regime that functions well and that goes a long way to providing adequate data protection as required by the EU Directive on data protection. Nevertheless, the EU has not made a finding to that effect as yet. The New Zealand data protection act requires a couple of amendments before New Zealand might be adjudged ‘adequate’. South Africa’s protection of the right to privacy and identity is better developed and more extensive than that of New Zealand. Privacy is recognised and protected in the law of delict and by the South African Constitution. Despite South Africa’s apparently high regard for the individual’s right to privacy and identity and our well-developed common and constitutional law of privacy, South Africa does not meet the adequacy requirement of the EU Directive, because we do not have a data protection Act. This means that South African participants in the information technology arena are at a constant disadvantage. It is argued that South Africa should follow New Zealand’s example and adopt a data

  4. The Personal Health Technology Design Space

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Frost, Mads

    2016-01-01

    . To enable designers to make informed and well-articulated design decision, the authors propose a design space for personal health technologies. This space consists of 10 dimensions related to the design of data sampling strategies, visualization and feedback approaches, treatment models, and regulatory......Interest is increasing in personal health technologies that utilize mobile platforms for improved health and well-being. However, although a wide variety of these systems exist, each is designed quite differently and materializes many different and more or less explicit design assumptions...

  5. Specificity of psychon structure forming the personality of transgressive and protective spouses

    Directory of Open Access Journals (Sweden)

    Dakowicz Andrzej

    2015-12-01

    Full Text Available In terms of psychotransgressionism, personality is a network of five equipollent psychons, the content of which determines the personality’s functioning. The strength and power of the individual psychons underlies the tendency to undertake transgressive actions. In this study, we hypothesized that transgressive spouses are characterized by greater potential strength, greater power of cognitive, instrumental, motivational, emotional, and personal psychons than protective spouses. We operationalized all psychons, created the appropriate research tools, and then studied married couples. Using the Transgression Scale developed by Studenski, we found a group of spouses with higher levels of transgression (transgressive, and a group of spouses with lower levels of transgression (protective. Transgressive wives are characterized by better knowledge about their husbands’ operational sphere, and are more aware of personal beliefs than protective wives. Similarly, transgressive husbands have greater knowledge of their wives’ operational sphere, stronger cognitive needs, and weaker personal needs than protective husbands. Transgressive husbands are characterized by a positive affective shift and have a greater awareness of personal beliefs than protective husbands. The potential brought into interpersonal relationships by transgressive spouses may create a climate conducive to building a satisfying marital relationship.

  6. EMP protection technology interchange

    International Nuclear Information System (INIS)

    Martin, L.C.

    1977-01-01

    Investigation and assessment of the potential degrading and destructive effects associated with the nuclear electromagnetic (EMP) phenomena has created a large technological base. This base is indeed quite broad owing to the unique and system-pervasive character of the EMP. One of the aims of an emerging discipline, such as that associated with EMP, is to provide for adequate transfer and integration of the developing technology into the overall engineering community. The needs of the community and how EMP hardening and protection information can be transferred or exchanged are reviewed. Many of the current and generally available sources of information are listed, examples of interchange methods are provided, and problems of developing specifications, standards, and suitable guidelines for design and incorporation of protection are also discussed

  7. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Science.gov (United States)

    2010-07-01

    ..., DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life... in a sanitary and reliable condition wherever it is necessary by reason of hazards of processes or... construction for the work to be performed. (d) Payment for protective equipment. (1) Except as provided by...

  8. Toward Better Personal Ballistic Protection

    Science.gov (United States)

    2014-03-04

    Toward Better Personal Ballistic Protection Manon Bolduc1, Jason Lo2, Ruby Zhang2, Dan Walsh2, Shuqiong Lin3, Benoit Simard3, Ken Bosnick4, Mike...presenc particulate gr atly increase ceramic mad er, knowing e ceramic ma the alumina y on the mat a layered with s on the coat stantial prope C) magnif...mic fiber ma site ceramics such, thod. this fore, on of t has 8. CONCLUSION In an attempt to improve the failure resistance of ceramic

  9. Designing Personalization in Technology-Based Services

    Science.gov (United States)

    Lee, Min Kyung

    2013-01-01

    Personalization technology has the potential to optimize service for each person's unique needs and characteristics. One way to optimize service is to allow people to customize the service themselves; another is to proactively tailor services based on information provided by people or inferred from their past behaviors. These approaches function…

  10. Personal Data Protection in New Zealand: Lessons for South Africa ...

    African Journals Online (AJOL)

    In 1995 the European Union adopted a Directive on data protection. Article 25 of this Directive compels all EU member countries to adopt data protection legislation and to prevent the transfer of personal data to non-EU member countries (\\'third countries\\') that do not provide an adequate level of data protection. Article 25 ...

  11. USING RF TECHNOLOGY FOR PROTECTED ASSET TRACKING

    International Nuclear Information System (INIS)

    Younkin, James R.; Pickett, Chris A.; Richardson, Dave; Stinson, Brad J.

    2008-01-01

    The Oak Ridge National Laboratory (ORNL) is working on systems that use a new radio frequency (RF) technology called Rubee to manage and inventory many types of protected assets, including weapons housed in Department of Energy (DOE) armories, tooling, and nuclear material containers. Rubee is being considered for an IEEE Standard, and is used on several projects at ORNL because of its high performance when used in, on, and around metal-an environment that is typical of that found in an armory vault and that of many other protected assets locations within nuclear facilities. The primary objective using Rubee is to supply sustainable technology that provides timely information on the status and location of protected assets. This paper focuses on the results from a deployment of this technology at a DOE armory and discusses the applicability of Rubee for use with other protected assets within nuclear facilities. Key Words: Rubee, low radio frequency, protected assets

  12. Marco Civil da Internet: Limits From the Express and Unequivocal Requirement Consent as a Legal Protection of Personal Data on the Internet

    Directory of Open Access Journals (Sweden)

    Marco Antonio Lima

    2016-10-01

    Full Text Available This article examines the limits of the legal determination of express and unequivocal consent for the collection, use, storage, processing and protection of personal data as provided for in the Marco Civil da Internet (Law 12.965/2014 provided for in the list of rights and guarantees of users of the World Wide Web. With the increasing use of personal data from the Internet, for purposes of market analysis, prospecting investment trends, consumption and guidance of advertising campaigns - possible through technological resources for treatment and analysis of information - it is urgent to effectiveness the legal protection of this intangible property.

  13. NCTA v. FCC - Do Commercial Free Speech Justifications Trump Consumers' Personal Data Protection Rights? Answer To Shape Mobile Advertising Industry

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix; King, Nancy J.

    2010-01-01

    's right to communicate with their customers. Considering privacy risks associated with advances in computer technology, the complexities of modern information processing and evolving mobile advertising (m-advertising) practices, privacy regulations should not be equated with unwarranted speech regulations...... balance between protecting consumers' information privacy in an era of pervasive data processing and protecting the rights of marketers to engage in protected commercial free speech that involves using customers' personal information. A ruling against the FCC would have limited the use of government...... to support the growth of the global mobile advertising (m-advertising) industry....

  14. Eighth meeting of the radiation protection-skilled persons - Conference proceedings

    International Nuclear Information System (INIS)

    Juhel, Thierry; Lahaye, Thierry; Rousse, Carole; Perrin, Marie-Line; Billarand, Yann; Scanff, Pascale; Celier, David; El Jammal, Marie-Helene; Jacob, Sophie; Vecchiola, Sophie; Bulla, Giuseppina; Guillalmon, Christophe; Mechin, Guillaume; Guersen, Joel; Blaise, Philipp; Ammerich, Marc; Bordy, Jean-Marc; Sevestre, Bernard; Massiot, Philippe; Michel, Xavier; Raffoux, Yann; Kernisant, Billy; Lefaure, Christian; Balduyck, Sebastien; Wassilieff, Serge; Ouabdelkader, Said; Lecu, Alexis; Roy, Catherine; Pigree, Gilbert; Barbey, Pierre; Bergeron, Christophe; Schieber, Caroline

    2012-12-01

    This eighth meeting of the radiation protection skilled persons celebrated the 15. anniversary of this type of meetings. It is the occasion for radiation protection specialists to share information and their experience on various topics, in particular the recent evolutions of the regulation. This document gathers the available presentations given during this conference: 1 - Opening talk (T. Juhel); 2 - Regulatory evolutions in the domain of protection of workers exposed to ionising radiations (T. Lahaye); 3 - Evolution of the regulatory documents on the basis of the French public health law (C. Rousse); 4 - Relations between IRSN and Companies - regulatory obligations from the perspective of the radiation protection-skilled person (Y. Billarand); 5 - IRSN's follow up of workers' exposure (P. Scanff); 6 - Contribution of a 18 F preparation and injection system to the radiation protection of workers (D. Celier); 7 - Workplace analysis in interventional radiology (G. Bulla, C. Guillalmon); 8 - Interest of Workplace analyses in risk information (G. Mechin); 9 - Running of a joint operators/contractors club of radiation protection skilled persons at the scale of a CEA centre (P. Blaise); 10 - Radiological exposure of the maintenance personnel of aerial monitoring radars (X. Michel); 11 - The IRSN barometer (M.H. El Jammal); 12 - An original network of professional radiation protection: the GoogleGroup for dental radiation protection-skilled persons (Y. Raffoux); 13 - Cirkus radiation protection association - a portal for a practical and operational radiation protection (B. Kernisant); 14 - Situation of networks - what do we do in a network? What is the role of the national coordination? (S. Balduyck, C. Lefaure); 15 - Update on the situation at Fukushima (M. Ammerich); 15 - Radio-induced cataracts: why lowering the eye lens legal limit? (S. Wassilieff); 16 - O'CLOC study - Radio-induced cataracts among interventional Cardiologists (S. Jacob); 17 - Photon dosimetry of

  15. Designing physical protection technology for insider protection

    International Nuclear Information System (INIS)

    Trujillo, A.A.; Waddoups, I.G.

    1986-01-01

    Since its inception, the nuclear industry has been engaged in providing protection against an insider threat. Although insider protection activities have been fairly successful in the past, present societal conditions require increased protection to further minimize the existence of an insider or the consequences of an insider-perpetrated incident. Integration of insider protection techniques into existing administrative and operational procedures has resulted in economic and operational impacts. Future increases in insider protection may result in even greater impacts, so we must proceed wisely as new approaches are developed. Increased emphasis on background investigations, security clearances, human reliability programs, security awareness activities, and the development of technology to address the insider threat are evidence of continuing concern in this area. Experience ranging from operational test and evaluation of developmental equipment to conceptual designs for new facilities has led to the development of general principles and conclusions for mitigating the insider threat while minimizing adverse impacts on site operations. Important principles include real-time monitoring of personnel and material and requiring that the physical protection and material control and accounting systems to be much more coordinated and integrated than in the past

  16. Development of radiation protection and measurement technology

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Si Young; Lee, T. Y.; Kim, J. L.; Kim, B. H.; Lee, B. J.; Chung, K. K.; Lee, K. C.; Chung, R. I.; Han, Y. D.; Kim, J. S.; Lee, H. S.; Kim, C. K.; Yoon, K. S.; Jeong, D. Y.; Yoon, S. C.; Yoon, Y. C.; Lee, S. Y.; Kim, J. S.; Seo, K. W. [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of); Kim, J. K.; Lee, J. K. [Hanyang Univ., Seoul (Korea, Republic of)

    1997-07-01

    Reference X-, gamma, beta and neutron radiation fields complying with the ISO and ANSI standards have been established and evaluated to provide a basic technical support in national radiation protection dosimetry program and to provide calibration measurement devices. Personal dose evaluation algorithm has been developed with these reference radiation fields, which comply well with both domestic and the new ANSI N13.11, to evaluate accurate personal dose equivalents. A personal internal dosimetry algorithm which can estimate the intakes of radionuclides from the results of in vivo bioassay and the resulting internal doses has been developed and verified its performance. It was also evaluated to be equality excellent compared with those being used in foreign countries and used to make a computer code for internal dose evaluation which can be run with PC under the Windows environment. A BOMAB phantom for precise calibration of in vivo system has been also designed, fabricated and test-evaluated. Based on the ALARA concept of the optimization principle of radiation protection, a method for estimating the cost for radiation protection has been studied and an objective monetary cost of detriment due to radiation exposure, called {alpha} value ($/man-Sv) has been derived and proposed based on the Korean socio-economic situation and human risk factors to provide basic data for the radiation protection optimization study in Korea. (author). 100 refs., 104 tabs., 69 figs.

  17. Chlorobenzylidenemalonitrile Gas Exposure from A Novelty Personal-Protection Gun

    Directory of Open Access Journals (Sweden)

    Dong, Christopher

    2007-05-01

    Full Text Available We present an unusual case of chlorobenzylidenemalonitrile (CS tear-gas exposure from the unwitting discharge of a personal-protection handgun loaded with CS gas. The gun was in a bag of toys purchased from a local thrift store and was discharged by a child. The responding paramedic presumptively identified the substance as CS based solely on personal experience. This recognition led to suboptimal field management of the incident with the paramedic failing to follow the standard operating procedures for an unknown chemical exposure. As this was a benign agent, there were no serious consequences. This case highlights the pre-hospital and emergency department challenges associated with the management of an unknown chemical exposure and the potential consequences if the chemical is a toxic substance. A methodical approach following established protocols can reduce the potential for negative outcomes. Review of the literature found no other report of CS gas exposure from such a personal-protection weapon.

  18. Personal protective equipment for registration purposes of pesticides

    NARCIS (Netherlands)

    Gerritsen-Ebben, M.G.; Brouwer, D.H.; Hemmen, J.J. van

    2007-01-01

    Regulatory authorities in North America, Europe and Australia use different approaches for the estimation of exposure reduction effectiveness of personal protective equipment (PPE) in registration processes of agrochemical pesticides. TNO has investigated current views and facts for the use of

  19. Evaluation of the use of personal protective equipment in radiodiagnostic services in Sergipe

    International Nuclear Information System (INIS)

    Santos, Lucas R. dos; Oliveira, Celso A.; Silva, Fabio A.R.; Souza, Divanizia N.

    2008-01-01

    The theme ionizing radiation is frequently associated with danger. Therefore this subject induces to think about accessories to personal protection. These accessories can contain metal heavy (as example, lead) so that we have an efficient protection. Our analysis was done with the main objective of evidence that is not enough the radiodiagnostic services have personal protective equipment to disposal to the radiology technicians have an efficient protection, because the procedures with ionizing radiation will be safe only with the use accomplish of the security procedures and of adequate use and storing of personal protective equipment. In our analysis the accessories in question were the lead rubber X-ray protection aprons and thyroid gland protectors. We have tested these accessories through of a similar methodology utilized to checking the half-value layer of the X-ray units. It was investigated also the importance given to use of these accessories by the radiology technicians. (author)

  20. Electronic Contracts and the Personal data Protection of the Consumer: Sources Dialogue Between the Consumer Protection Code and the Internet Civil Mark.

    Directory of Open Access Journals (Sweden)

    Rosane Leal Da Silva

    2016-10-01

    Full Text Available This paper analyzes the personal data protection of the consumer and your vulnerability in interactive electronic contracts, aiming to point means of defense. For this, uses the deductive approach and starts of the electronic contracting to discuss the legal protection of the consumer in light of the capturing and processing of personal data by the furnisher. Considering the absence of law about personal data, concludes that electronic contracting expands the consumer vulnerability, which requires the principles application of the Consumer Protection Code, adding the Internet Civil Mark in relation to the privacy protection.

  1. Intelligent textiles for personal protection and safety

    National Research Council Canada - National Science Library

    Jayaraman, Sundaresan; Kiekens, Paul; Grancaric, Ana Marija

    2006-01-01

    .... Each chapter in the book provides an in-depth assessment of one particular facet of this emerging discipline - from analysis of the threats and sensing technologies to ergonomics of protecting...

  2. 29 CFR 1977.5 - Persons protected by section 11(c).

    Science.gov (United States)

    2010-07-01

    ... OCCUPATIONAL SAFETY AND HEALTH ACT OF 1970 General § 1977.5 Persons protected by section 11(c). (a) All employees are afforded the full protection of section 11(c). For purposes of the Act, an employee is defined... Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION...

  3. Technological measures of protection in the copyright system

    Directory of Open Access Journals (Sweden)

    Radovanović Sanja

    2011-01-01

    Full Text Available Digital exploitation of works often exceed the limit to which the holder can control the exploitation of their intellectual creations, and the protection provided by legal norms are, in the era of a fast exchange of information, may prove to be insufficiently effective. For these reasons, the rights holders are increasingly opting for preventive care through placement of physical obstacles to the exploitation of copyright works, generic called technological protection measures (known as digital right management (DRM. Simultaneously with the development of the application of these measures flows the process of finding ways to circumvent them. Therefore, the effectiveness of technological measures depends on exactly the question of their legal protection, which now exists in most of modern legal systems. However, in the normative solutions there are differences, which reflect the problems in finding adequate forms of protection. They mostly stem from the fact that the sanctioning of circumvention (or preparatory actions of technological measures put into the question the purpose of copyright protection in general. Hence, in this paper we tried to point out the normative solutions accepted in modern legal systems and practical implications of what they have. Conclusion that arises is that the legal shaping of technological measures is not completed and that further technological developments open new dilemmas.

  4. Qualification criteria for persons responsible for radiation protection

    International Nuclear Information System (INIS)

    Wehner, G

    1980-01-01

    A survey of the qualification criteria included in the German atomic law (Atomic Energy Act, Radiological Protection Ordinance and X-ray Protection Ordinance) for persons responsible for radiation protection is given. Especially the various activities for which a health physics officer is required, the range of qualification in each case and the way the qualification has to be proved, are pointed out. Also the different guides that are issued to complete the legal requirements are mentioned. The definitions of the term qualification for health physics given in the different guides are cited and it is shown, that the qualification of a healt physics officer has to be based on the three criteria (I) vocational training. (II) professional experience and (III) the necessary knowledge in radiation protection. (orig./HP) [de

  5. Personal protection against biting insects and ticks

    Directory of Open Access Journals (Sweden)

    2011-02-01

    Full Text Available Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV. It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV and the French Society of Parasitology (SFP to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS. The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses, but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night and kind of stay (short or roaming, long and steady. It concerns travellers, but also expatriates, residents and nomads.

  6. Engineering innovation in healthcare: technology, ethics and persons.

    Science.gov (United States)

    Bowen, W Richard

    2011-01-01

    Engineering makes profound contributions to our health. Many of these contributions benefit whole populations, such as clean water and sewage treatment, buildings, dependable sources of energy, efficient harvesting and storage of food, and pharmaceutical manufacture. Thus, ethical assessment of these and other engineering activities has often emphasized benefits to communities. This is in contrast to medical ethics, which has tended to emphasize the individual patient affected by a doctor's actions. However technological innovation is leading to an entanglement of the activities, and hence ethical responsibilities, of healthcare professionals and engineering professionals. The article outlines three categories of innovation: assistive technologies, telehealthcare and quasi-autonomous systems. Approaches to engineering ethics are described and applied to these innovations. Such innovations raise a number of ethical opportunities and challenges, especially as the complexity of the technology increases. In particular the design and operation of the technologies require engineers to seek closer involvement with the persons benefiting from their work. Future innovation will require engineers to have a good knowledge of human biology and psychology. More particularly, healthcare engineers will need to prioritize each person's wellbeing, agency, human relationships and ecological self rather than technology, in the same way that doctors prioritize the treatment of persons rather than their diseases.

  7. Knowledge and Use of Personal Protective Measures Against ...

    African Journals Online (AJOL)

    Background: Mosquito borne diseases (MBDs) are major public health problem in India. State of Delhi is endemic for dengue and other MBDs. The increasing incidence of MBDs in Delhi in recent years warrants a pro.active approach for their prevention. Knowledge and use of personal protective measures (PPMs) presents ...

  8. Is prevention of acute pesticide poisoning effective and efficient, with Locally Adapted Personal Protective Equipment?

    DEFF Research Database (Denmark)

    Varma, Anshu; Neupane, Dinesh; Ellekilde Bonde, Jens Peter

    2016-01-01

    BACKGROUND: Farmers' risk of pesticide poisoning can be reduced with personal protective equipment but in low-income countries farmers' use of such equipment is limited. OBJECTIVE: To examine the effectiveness and efficiency of Locally Adapted Personal Protective Equipment to reduce organophosphate...... exposure among farmers. METHODS: In a crossover study, 45 male farmers from Chitwan, Nepal, were randomly allocated to work as usual applying organophosphate pesticides wearing Locally Adapted Personal Protective Equipment or Daily Practice Clothing. For seven days before each experiment, each farmer.......08;0.06]. Wearing the Locally Adapted Personal Protective Equipment versus Daily Practice Clothing gave the following results, respectively: comfort 75.6% versus 100%, sense of heat 64.4% versus 31.3%, other problems 44.4% versus 33.3%, likeability 95.6% versus 77.8%. CONCLUSION: We cannot support the expectation...

  9. Satellite systems for personal applications concepts and technology

    CERN Document Server

    Richharia, Madhavendra

    2010-01-01

    Presents the concepts, technology, and role of satellite systems in support of personal applications, such as mobile and broadband communications, navigation, television, radio and multimedia broadcasting, safety of life services, etc. This book presents a novel perspective on satellite systems, reflecting the modern personal technology context, and hence a focus on the individual as end-user. The book begins by outlining key generic concepts before discussing techniques adopted in particular application areas; next, it exemplifies these techniques through discussion of state-of-art c

  10. The competent person in radiation protection: practical radiation protection for industry and research - unsealed sources

    International Nuclear Information System (INIS)

    Bruchet, H.

    2009-01-01

    The mission of the competent person in radiation protection has been broadly developed these last years to take an essential function in firm:study of working place, delimitation of regulated areas, monitoring of exposure, relations with authorities. The competent person in radiation protection must follow a training, defined by decree and shared in two parts: a theoretical part used as compulsory subjects and a practical part specific to the different sectors of activity (research, industry, medical centers, nuclear facilities) as well as the radiation use type. This volume corresponds to the practical module devoted to the industrial and research facilities concerned by the possession of management of sealed or unsealed sources. In accordance with the regulations stipulating that this module must allow to apply the theoretical knowledge to concrete situations in work. It includes eight chapters as following: radiation protection in industrial and research facilities, use of sources and associated risks, fitting out professional premises, evaluation of exposure, control of radiation protection; use of detection equipment and radioactive contamination and exposure measurement equipment, associated to methods and calculation tools; radioactive waste management; accidental or damaged situations management; methodology of working place analysis completed by the application to practical cases found in laboratories. (N.C.)

  11. Personality and Persuasive Technology: An Exploratory Study on Health-Promoting Mobile Applications

    Science.gov (United States)

    Halko, Sajanee; Kientz, Julie A.

    Though a variety of persuasive health applications have been designed with a preventive standpoint toward diseases in mind, many have been designed largely for a general audience. Designers of these technologies may achieve more success if applications consider an individual's personality type. Our goal for this research was to explore the relationship between personality and persuasive technologies in the context of health-promoting mobile applications. We conducted an online survey with 240 participants using storyboards depicting eight different persuasive strategies, the Big Five Inventory for personality domains, and questions on perceptions of the persuasive technologies. Our results and analysis revealed a number of significant relationships between personality and the persuasive technologies we evaluated. The findings from this study can guide the development of persuasive technologies that can cater to individual personalities to improve the likelihood of their success.

  12. INJECTION TECHNOLOGY RESEARCH OF THE PROTECTIVE SCREEN

    Directory of Open Access Journals (Sweden)

    MENEJLYUK A. I.

    2016-12-01

    Full Text Available Formulation of the problem. This article contains information about the methods and the planning principles used in experimental research study of the injection technology of impervious screen. Today, there are ways to create impervious screens and curtains solve soil protection issues in the field impermeable layer arrangement at a shallow depth. However, for Ukraine, in the burial sites of radiation and other wastes is urgent issue of protection of underground space in places with deep impermeable layer. Classical methods can not fully solve such problems. To solve them, you need to develop innovative technology to create such a screen, which will lie authentic sole object to be protected, at the project depth. For the experiments, it is necessary to choose the most important indicator, and technological factors affecting it. This is due to the fact that the proposed technology provides for lesser known technical solutions, the use of which should ultimately result in impervious screens with desired properties. Goal. The aim of this study is the selection of technological parameters of injection, design of experiments and the selection of indicators characterizing the efficient operation of the screen. Such constructs must first have almost zero permeability. In this paper, it was of interest to study the influence of process parameters on the filtration rate of the protective screen. Conclusion. As a result of the design of experiments, the basic technological factors that have a significant effect on the studied parameters. varying levels of these factors are also identified, which in turn makes it possible to determine the optimum process parameters creating a screen that meets all the desired properties and characteristics. Based on a series of experiments it is possible to obtain optimal formulations for different types of soils.

  13. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    Science.gov (United States)

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  14. Determinants of the Intention to Protect Personal Information among Facebook Users

    Directory of Open Access Journals (Sweden)

    Bum Soo Chon

    2018-02-01

    Full Text Available This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.

  15. Radiation protection in newer imaging technologies

    International Nuclear Information System (INIS)

    Rehani, M. M.

    2010-01-01

    Not even a week passes without a paper getting published in peer reviewed journals on radiation protection in newer imaging technologies that either did not exist 10 y ago or were not established for routine use. Computed tomography (CT) happens to be a common element in most of these technologies. Radiation protection is high on the agenda of manufacturers and researchers and that is becoming a driving force for users and international organisations. The media and thus the public have their own share in increasing the momentum. The slice war seems to be shifting to dose war. Manufacturers are now chasing the target of sub-mSv CT. The era of two digit mSv effective dose for a CT procedure is far from losing ground, although cardiac CT within 5 mSv seems possible. A few years ago the change in technology was faster than adoption of dose management but currently even the development of dose reduction techniques is faster than its adoption. There is dearth of large scale surveys of practice and lack of surveys with change in technology. (authors)

  16. Special Article Personal Wearable Technologies in Education: Value or Villain?

    Science.gov (United States)

    Borthwick, Arlene C.; Anderson, Cindy L.; Finsness, Elizabeth S.; Foulger, Teresa S.

    2015-01-01

    Wearable personal learning technologies can gather data from the person wearing the device or from the surrounding environment and enable that data to be transferred to another device or shared via the cloud. Wearable technologies can serve as a valuable asset in the classroom enhancing differentiation of instruction and student engagement. They…

  17. What can information technology do for environmental protection?

    International Nuclear Information System (INIS)

    Trauboth, H.

    1987-01-01

    Information technology plays an important role in the accomplishment of an effective environmental protection. Prerequisite for its comprehensive implementation is the legal and economic achievement of closed material cycles for supply and waste discharge in production and consumption as well as in nuclear technology. Modern information processing may be used for the inventory of natural and emission sources, to gain knowledge on the functioning mechanisms of nature, for the planning of a considerate exploitation of natural recources and for the ecology-oriented monitoring and control of industrial plants. The state of the art of the corresponding information technology and new areas of research especially in measurement technology are shown. The breadth of the great opportunities of information technology for environmental protection is discribed. (orig.) [de

  18. Depersonalization of personal data and «big data» technology (bigdata

    Directory of Open Access Journals (Sweden)

    Churakova E.N.

    2017-04-01

    Full Text Available the question of the citizens' personal data processing is very important, and the solution for this problem should be the adoption of legislation expressly regulating the activities of personal data operators. The authors considered one of the most effective approaches to personal data protection – anonymization, as well as identified two developments to adoption of legislation. Anonymization not only protects the interests of the state and, first and foremost, the citizens, but it is also a mechanism that will allow advertising, insurance and other companies to improve the quality of their products and services.

  19. Leveraging physical protection technology for international safeguards applications

    International Nuclear Information System (INIS)

    Glidewell, Don

    2001-01-01

    Full text: In an effort to improve the effectiveness, efficiency, and reliability of equipment used for International Safeguards, the European Safeguards Research and Development Association (ESARDA) Reflection Group requested the ESARDA Containment and Surveillance Working Group to investigate the feasibility of employing physical protection technologies for international safeguards applications. The physical protection market has traditionally been much greater than the international safeguards market. Consequently, physical protection technology has been subjected to greater testing and evaluation, and has enjoyed much greater real world experience. The larger market yields economies of scale, and the greater testing and experience should arguably result in improved reliability. This paper will compare requirements for physical protection versus international safeguards equipment, and identify types of physical protection equipment, which have potential for safeguards applications. It will evaluate both Commercial Off-the-Shelf (COTS) and non-COTS equipment. Finally, for selected physical protection equipment, the paper will evaluate the degree of modification that would be needed to make it acceptable for safeguards applications. (author)

  20. Major breakthrough in personal dust protection

    Energy Technology Data Exchange (ETDEWEB)

    Chadwick, J.

    2004-09-15

    With new studies highlighting one in every 20 miners developing 'black lung', USA labour, industry and government have joined forces to develop a solution. The rapid advance in Personal Dust Monitor (PDM) technology is a perfect example. The article reports a PDM, which is developed by the US National Institute for Occupational Safety and Health, working in the partnership with the United Mine Workers of America, the Bituminous Coal Operators Association and the National Mining Association.

  1. PEDAGOGICAL ASPECTS IMPLEMENTATION PERSONALLY ORIENTED APPROACH WHILE PREPARING TEACHERS FUTURE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Olena Shuryn

    2017-07-01

    Full Text Available The pedagogical aspects of the implementation of the personality oriented approach in training future technology teachers are considered. The theoretical analysis of scientific studies in the area of professional training of the future teacher, the technology teacher in particular, is carried out. The dictionary interpretation of the personality oriented approach is analyzed. The study of the substantiation of this method in scientific works has been carried out. The main positions for understanding of the essence of personality oriented education are outlined, namely ensuring the disclosure of the individuality of each student, his abilities, inclinations, interests, value orientations and subjective experience; Realization of the educational process taking into account personal abilities of students; Creation of conditions for self-development, self-expression and self-improvement of future specialists; Deeper, holistic understanding of the student's personality in the educational process. The features of personality oriented education are determined. The emphasis is made on the principle of natural conformity as the basic principle of personality oriented education. There have been determined the basic tasks and the initial provisions of the construction of the personality oriented system of education, which envisages the creation of a suitable educational environment, democratization of the teacher-student relations, as well as the activation of each student in order to develop his personal and professional abilities and qualities, strengthening his subjective functions. The criteria of effective organization of personality oriented education are outlined. The approaches of personality oriented education, namely individual, social-psychological, age, activity, system-psychological, multilevel, differentiated and subjective-personal, are defined. There have been highlighted the main methodical components of the personality oriented training

  2. Protection of personal information in South Africa: a framework for biometric data collection security

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-11-01

    Full Text Available personal information. Like many other countries, South Africa, in 2013 officially approved and enacted the Protection of Personal Information Act, which gives guidelines that should be followed when processing personal information. The Act regards biometric...

  3. Proceedings: 2003 Radiation Protection Technology Conference

    International Nuclear Information System (INIS)

    2004-01-01

    Health physics professionals within the nuclear industry are continually upgrading their programs with new methods and technologies. The Third Annual EPRI Radiation Protection Technology Conference facilitated this effort by communicating technical developments, program improvements, and experience throughout the nuclear power industry. When viewed from the perspective of shorter outages, diminishing numbers of contract RP technicians and demanding emergent work, this information flow is critical for the industry

  4. Interprofessional education for personalized medicine through technology-based learning.

    Science.gov (United States)

    Haga, Susanne B; Mills, Rachel; Aucoin, Julia; Taekman, Jeff

    2015-06-01

    The delivery of personalized medicine utilizing genetic and genomic technologies is anticipated to involve many medical specialties. Interprofessional education will be key to the delivery of personalized medicine in order to reduce disjointed or uncoordinated clinical care, and optimize effective communication to promote patient understanding and engagement regarding the use of or need for these services. While several health professional organizations have endorsed and/or developed core competencies for genetics and genomics, the lack of interprofessional guidelines and training may hamper the delivery of coordinated personalized medicine. In this perspective, we consider the potential for interprofessional education and training using technology-based approaches, such as virtual simulation and gaming, compared with traditional educational approaches.

  5. The Civil Identity Registry Unification and Personal Data Protection in Brazil

    Directory of Open Access Journals (Sweden)

    José Renato Gaziero Cella

    2016-06-01

    . Article search thus demonstrate, through hypothetical-deductive method, the urgency of adopting a specific law on the protection of personal data in Brazil. To this end, it comes to point out that privacy and forms of protection are usually aligned with the technology available in each season and, with the advent of so-called Information Society captained especially the Internet and the instant and ubiquitous circulation of data it provides. The article demonstrates that even public agencies, such as the Sirc, respect the constitutional principles aimed at protecting the privacy of citizens, a fact that confirms and justifies the initial hypothesis of this work, which is, as stated, the demonstration of urgency the institution in Brazil, a specific law on personal data protection.

  6. Accidents, injuries and the use of personal protective equipment ...

    African Journals Online (AJOL)

    They are often neglected and their health and safety are generally overlooked. This study ... respondents had an accident at the workplace while 4% had injury, 60% had burns/scald injury while 72% had falls. In all, 6(54.5%) who ... Key words: Hospital cleaners, personal protective equipment, accidents, injuries, workplace.

  7. Second meeting of competent persons in radiation protection; Deuxiemes rencontres des personnes competentes en radioprotection

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    This conference treats the subjects interesting the competent persons in radiation protection. It is divided in four sessions. The first one concerns the regulatory bases for the action of competent persons and includes three articles, the second one is about the operational dosimetry and includes six articles, the third session is devoted to the sources and waste management and represents two texts, the last and fourth session concerns the competent person in radiation protection and gives evidence. (N.C.)

  8. Teaching e-Commerce Personalization Technology: The Need for a Comprehensive View

    Science.gov (United States)

    Sicilia, Miguel-Angel

    2005-01-01

    Personalization technology has become an important topic in e-commerce, fostered by the emergence of the relationship-marketing paradigm. But teaching e-commerce personalization technology is a challenging task, since it requires a balance between marketing and management and technical implementation issues that must be calibrated according to the…

  9. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC MONITORING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This technology ...

  10. Advanced protection technology for ground combat vehicles.

    Science.gov (United States)

    Bosse, Timothy G

    2012-01-01

    Just as highway drivers use radar detectors to attempt to stay ahead of police armed with the latest radar technology, the Armed Forces are locked in a spiral to protect combat vehicles and their crews against the latest threats in both the contemporary operating environment and the anticipated operating environment (ie, beyond 2020). In response to bigger, heavier, or better-protected vehicles, adversaries build and deploy larger explosive devices or bombs. However, making improvements to combat vehicles is much more expensive than deploying larger explosives. In addition, demand is increasing for lighter-weight vehicles capable of rapid deployment. Together, these two facts give the threat a clear advantage in the future. To protect vehicles and crews, technologies focusing on detection and hit avoidance, denial of penetration, and crew survivability must be combined synergistically to provide the best chance of survival on the modern battlefield.

  11. The Emergence of Personalized Health Technology.

    Science.gov (United States)

    Allen, Luke Nelson; Christie, Gillian Pepall

    2016-05-10

    Personalized health technology is a noisy new entrant to the health space, yet to make a significant impact on population health but seemingly teeming with potential. Devices including wearable fitness trackers and healthy-living apps are designed to help users quantify and improve their health behaviors. Although the ethical issues surrounding data privacy have received much attention, little is being said about the impact on socioeconomic health inequalities. Populations who stand to benefit the most from these technologies are unable to afford, access, or use them. This paper outlines the negative impact that these technologies will have on inequalities unless their user base can be radically extended to include vulnerable populations. Frugal innovation and public-private partnership are discussed as the major means for reaching this end.

  12. Person expert in radiation protection: changing profiles

    International Nuclear Information System (INIS)

    Anon.

    2015-01-01

    In all French enterprises producing or using ionizing radiations, a person is in charge of the protection of workers against radiations: the expert in radiation protection (PCR). The education and training of this profession has been recently reformed, and its status will evolve by 2018 with a transposition of a European directive. While indicating the six main missions of PCRs (risk assessment, definition of protection measures, zoning optimisation, training of exposed workers, dosimetry follow-up, periodic controls), this article comments the current professional profile of PCRs who can be technicians, engineers as well as researchers. It also outlines aspects of the reform which do not satisfy PCRs' needs. A second article reports how PCRs perceive their mission on a daily basis, which obstacles they face, how they are organised to communicate between them and not to be isolated (a map of PCR regional networks is provided with indications of the number of members and of the main actions), and how the IRSN helps them. A third article evokes the content of a new standard (NF C 15-160) which defines the requirements for X ray generating installations, and the related theoretical and practical training proposed by the IRSN

  13. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  14. Protection of persons occupationally exposed to radiation and of patients

    International Nuclear Information System (INIS)

    Stieve, F.E.

    1976-01-01

    The experiences of the last ten years have shown that the measures of the First Radiation Protection Ordinance generally proved to be sufficient for the protection of the employed or of the patients. They had to be amended in so far as the exposure to radiation for those occupationally exposed can be reduced. This results in changes to the regulations so that certain groups of persons can also be effectively controlled. The recognition that medical supervision for radiation protection reasons is reasonable only if exposure has occurred should be additionally utilized in the regulations if the Euratom standards make this possible. The protection of patients attains some new rules which can be derived from handling and from therapeutical use. In this case too experience resulted in a more reasonable application of ionizing radiation and radioactive materials than was expected when the First Radiation Protection Ordinance was issued. (orig.) [de

  15. Towards Personal Exposures: How Technology Is Changing Air Pollution and Health Research.

    Science.gov (United States)

    Larkin, A; Hystad, P

    2017-12-01

    We present a review of emerging technologies and how these can transform personal air pollution exposure assessment and subsequent health research. Estimating personal air pollution exposures is currently split broadly into methods for modeling exposures for large populations versus measuring exposures for small populations. Air pollution sensors, smartphones, and air pollution models capitalizing on big/new data sources offer tremendous opportunity for unifying these approaches and improving long-term personal exposure prediction at scales needed for population-based research. A multi-disciplinary approach is needed to combine these technologies to not only estimate personal exposures for epidemiological research but also determine drivers of these exposures and new prevention opportunities. While available technologies can revolutionize air pollution exposure research, ethical, privacy, logistical, and data science challenges must be met before widespread implementations occur. Available technologies and related advances in data science can improve long-term personal air pollution exposure estimates at scales needed for population-based research. This will advance our ability to evaluate the impacts of air pollution on human health and develop effective prevention strategies.

  16. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    Science.gov (United States)

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  17. Radiation protection technology. Specific course for authorized radiation protection representatives according the qualification guidelines technology for the radiation protection regulations (StrlSchV) and X-ray regulation (RoeV). 2. rev. ed.

    International Nuclear Information System (INIS)

    Rahn, Hans-Joachim

    2012-01-01

    The specific course for authorized radiation protection representatives according the qualification guidelines technology for the radiation protection regulations (StrlSchV) and X-ray regulation (RoeV). Covers the following issues: radiation protection - generally; licenses and notifications; scientific fundamentals; dosimetry, surveillance, control, documentation; technical radiation protection; radiation protection calculations.

  18. Radiation protection knowledge transfer according to the state of science and technology; Vermittlung von Fachwissen zum Strahlenschutz auf dem neuesten Stand von Wissenschaft und Technik

    Energy Technology Data Exchange (ETDEWEB)

    Strilek, Ralf

    2015-07-01

    The 19th summer school of radiation protection took place in 2015 in Berlin. The main topics were effects and hazards of ionizing radiation, trends and legal regulations in radiation protection, dosimetry and measuring techniques, radiation exposure in nuclear medicine, radiation exposure in industry, radiation exposure in the nuclear technology - final disposal and dismantling problems Several case studies covered the issues accident management, personal and environmental dosimetry, skin contamination, modern techniques in medicine, radiation protection for radiography.

  19. Electrostatic Properties of Selected Personal Protective Equipment Regarding Explosion Hazard

    Directory of Open Access Journals (Sweden)

    Marcin Jachowicz

    2013-01-01

    Full Text Available In industries such as the mining, petrochemistry or power industries, personal protective equipment is often used in explosive atmospheres. What causes the occurrence of explosive hazards is ever-present in the work environment they include, electrostatic phenomena as well as the build-up of electrical charges on the surface of the protective equipment used. This paper presents the results of studies which were aimed at determining the fundamental electrostatic parameters of protective helmets as well as eye and face protection, surface resistance and the voltage of electrostatic fields. Examinations on the typical structure of the above mentioned equipment was conducted including the variable values of ambient humidity, which can occur in the working environment and with the use of various types of materials used to generate a charge. The adopted methods and testing equipment have been presented. Using the current, general requirements regarding the electrostatic properties of materials, the examined helmets and eye protection were assessed for their use in explosive atmospheres.

  20. Impact of Different Personal Protective Clothing on Wildland Firefighters' Physiological Strain

    OpenAIRE

    Carballo-Leyenda, Belén; Villa, José G.; López-Satué, Jorge; Rodríguez-Marroyo, Jose A.

    2017-01-01

    Wildfire firefighting is an extremely demanding occupation performed under hot environment. The use of personal protective clothing (PPC) is needed to protect subjects from the thermal exposure. However, the additional use of PPC may increase the wildland firefighters' physiological strain, and consequently limit their performance. The aim of this study was to analyze the effect of four different PPC on the physiological strain of wildland firefighters under moderate conditions (30?C and 30% ...

  1. WS-010: EPR-First Responders: Personal monitoring techniques and protective clothing

    International Nuclear Information System (INIS)

    2011-01-01

    The purpose of this working session is that the participant can apply their knowledge in relation to the personal monitoring techniques and protective clothing. They have to know the use of the radiation measurement instrumentation available in each region

  2. Evaluation of Personal Chemical Vapor Protection for Patrol and Tactical Law Enforcement

    National Research Council Canada - National Science Library

    Fedele, Paul D; Lake, William L; Arca, Victor J; Marshall, Stephen M; Mitchell, David B

    2002-01-01

    In Domestic Preparedness efforts, the US Army Soldier and Biological Chemical Command and the Maryland State Police, have evaluated personal chemical protective systems for use in patrol and tactical...

  3. Evaluation of commercial products for personal protection against mosquitoes.

    Science.gov (United States)

    Revay, Edita E; Junnila, Amy; Xue, Rui-De; Kline, Daniel L; Bernier, Ulrich R; Kravchenko, Vasiliy D; Qualls, Whitney A; Ghattas, Nina; Müller, Günter C

    2013-02-01

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, mesh-enclosed greenhouses, in Israel, with either 1500 Aedes albopictus or 1500 Culex pipiens released on consecutive study nights. The products tested in this study were the OFF!(®) Clip-On™ Mosquito Repellent (Metofluthrin 31.2%) and the Terminix(®) ALLCLEAR(®) Sidekick Mosquito Repeller (Cinnamon oil 10.5%; Eugenol 13%; Geranium oil 21%; Peppermint 5.3%; Lemongrass oil 2.6%), which are personal diffusers; Super Band™ Wristband (22% Citronella oil) and the PIC(®) Citronella Plus Wristband (Geraniol 15%; Lemongrass oil 5%, Citronella oil 1%); the Sonic Insect Repeller Keychain; the Mosquito Guard Patch (Oil of Lemon Eucalyptus 80mg), an adhesive-backed sticker for use on textiles; and the Mosquito Patch (vitamin B1 300mg), a transdermal patch. It was determined that the sticker, transdermal patch, wristbands and sonic device did not provide significant protection to volunteers compared with the mosquito attack rate on control volunteers who were not wearing a repellent device. The personal diffusers: - OFF!(®) Clip-On™ and Terminix(®) ALLCLEAR(®) Sidekick - provided superior protection compared with all other devices in this study. These diffusers reduced biting on the arms of volunteers by 96.28% and 95.26% respectively, for Ae. albopictus, and by 94.94% and 92.15% respectively, for Cx. pipiens. In a second trial conducted to compare these devices directly, biting was reduced by the OFF!(®) Clip-On™ and the Terminix(®) ALLCLEAR(®) by 87.55% and 92.83%, respectively, for Ae. albopictus, and by 97.22% and 94.14%, respectively, for Cx. pipiens. There was no significant difference between the performances of the two diffusers for each species. Copyright © 2012 Elsevier B.V. All rights reserved.

  4. Personal technology use by U.S. military service members and veterans: an update.

    Science.gov (United States)

    Bush, Nigel E; Wheeler, William M

    2015-04-01

    Although personal electronic devices, such as mobile phones, computers, and tablets, increasingly are being leveraged as vehicles for health in the civilian world, almost nothing is known about personal technology use in the U.S. military. In 2012 we conducted a unique survey of personal technologies used by U.S. military service members. However, with the rapidly growing sophistication of personal technology and changes in consumer habits, that knowledge must be continuously updated to be useful. Accordingly, we recently surveyed new samples of active duty service members, National Guard and Reserve, and veterans. We collected data by online surveys in 2013 from 239 active, inactive, and former service members. Online surveys were completed in-person via laptop computers at a large military installation and remotely via Web-based surveys posted on the Army Knowledge Online Web site and on a Defense Center Facebook social media channel. We measured high rates of personal technology use by service members at home across popular electronic media. The most dramatic change since our earlier survey was the tremendous increase in mobile phone use at home for a wide variety of purposes. Participants also reported moderate non-work uses of computers and tablets while on recent deployment to Iraq and Afghanistan, but almost no mobile phone use, ostensibly because of military restrictions in the war zone. These latest results will enable researchers and technology developers target their efforts on the most promising and popular technologies for psychological health in the military.

  5. IMPLEMENTING INNOVATIVE TECHNOLOGIES OF FUTURE SPECIALISTS’ PERSONAL AND PROFESSIONAL DEVELOPMENT IN THE TRAINING PROCESS

    Directory of Open Access Journals (Sweden)

    Halyna Kovalchuk

    2017-04-01

    Full Text Available The article deals with the problem of implementing innovative technologies of future specialists’ personal and professional development in the training process. The necessity of developing professional and personality-centered education is disclosed in National Doctrine of Education Development. The analysis of studied issue proves that it has various components and manifests that are revealed in the scientists’ works (I. Bekh, A. Heilyk, H. Zborovskyi, T. Parson, V. Bezpalko, V. Bykov, S, Ziazun and others. The aim of the article is to highlight the methodological and methodical approaches to future specialists’ personal and professional development by means of innovative teaching technologies. The article discloses some aspects of implementing technologies of profession-oriented, competence and personality-oriented training of future specialists in higher educational establishments. The special attention is paid to their personal and professional development by means of innovative teaching technologies. The personal dimension is considered to be a leading factor of achieving the main aim of humanistic school – personal self-realization. The role of autonomic learning for achieving didactic goals and future specialists’ self-designing at universities is identified. The methodological approaches (anthropocentric and sociocentric, action-praxeological, axiological, acmeological, productive, integrative, interactive, narrative, which promote implementing professional-oriented, competence and personality-centered technologies of future specialists’ training, are characterized. The conclusion is drawn that educational technologies are the main tools for supporting training quality of future specialists in the field of economics and business; forming their professional competences and professionally significant personal qualities that are the components of humanitarian principles of community development; providing quality of life at the

  6. Experimental Evaluation of the Effectiveness Offered by Different Types of Personal Protective Clothing Against Nanoaerosols

    Science.gov (United States)

    Domat, M.; Pla, J.; Cadavid-Rodríguez, M. C.; Fito, C.

    2017-06-01

    The rapid expansion of nanotechnology is outpacing health and safety recommendations for engineered nanomaterials. Thus, there is a lack of information about the effects that nanomaterials can induce in the human health. Nevertheless, workers in nanotechnology-related industries are potentially at risk of being exposed to nanomaterials. Therefore, there is a need of characterize the behaviour of personal protective equipment against penetration nanoparticles, in order to provide an adequate protection to the workers. In this study, the efficiency of several protective dermal equipment against water-based NaCl aerosol was evaluated. For this purpose, different protective clothing and gloves were selected to carry out the assays, simulating typical use conditions of protective equipment under occupational settings. Results obtained exposed that the level of protection offered by the distinct types of personal protective coveralls depended not only on the fabric, but also on their fitting to the body of the subject. On the other hand, the efficiency of the protective gloves was set in the range from 95% to 99%, depending on the thickness and the type of material.

  7. Personal monitoring services available at Institute for Radiation Protection of ENEA

    International Nuclear Information System (INIS)

    Fantuzzi, E.; Bonarelli, T.

    1999-01-01

    Personnel monitoring provides the means to measure and record the radiation doses received by individual workers. The ionising radiation decree (230/95) set out the circumstances when the assessment and recording of person's exposure is legally required. Many employers issue dosemeters to staff even though there is no legal requirement to do so. This may be part of a quality assurance programme or as a reassurance measure. Dosemeter readings will serve to ensure compliance with legal dose limits and assure the employer that radiation exposure is as low as reasonably achievable. The ENEA (National Agency for New Technology, Energy and the Environment) IRP (Institute for Radiation Protection) individual monitoring service has been running for over 30 years. It offers personnel dosemeters which are based on its expertise and backed up by continual research and development. The report provides details of the dosemeters in use at IRP enable to decide which ones most suit the needs and shows IMS's organisation, customer and communications, dose reports form and administrative items. A short mention of future development will also be given [it

  8. Role and missions of the person competent in radiation protection (PCR)

    International Nuclear Information System (INIS)

    Abadia-Benoist, Genevieve; Basile, Sandy; Gauron, Christine; Guillemy, Nathalie; Moureaux, Patrick; Billarand, Yann; Rannou, Alain; Scanff, Pascale; Vidal, Jean-Pierre

    2014-01-01

    Radiation protection is a hot topic and has been the matter of debates between the French national institute of research and safety (INRS) and the French institute of radiation protection and nuclear safety (IRSN). It has been also the main topic of a joint IRSN/INRS workshop held in 2013 about the use of dosimetric data. This paper presents the joint position of both institutes with regards to the key-role, status and missions of the person competent in radiation protection (PCR) in the domain of risk prevention and access to dosimetric data. It presents also some possible measures of evolution of this occupation

  9. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC TREATMENT TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techn...

  10. [Applications of DNA identification technology in protection of wild animals].

    Science.gov (United States)

    Ni, Ping-Ya; Pei, Li; Ge, Wen-Dong; Zhang, Ying; Yang, Xue-Ying; Xu, Xiao-Yu; Tu, Zheng

    2011-12-01

    With the development of biotechnology, forensic DNA identification technology in protection of wild animals has been used more and more widely. This review introduces the global status of wildlife crime and the relevant protection to wildlife, outlines the practical applications of forensic DNA identification technology with regard to species identification, determination of geographic origin, individual identification and paternity identification. It focus on the techniques commonly used in DNA typing and their merits and demerits, as well as the problems and prospects of forensic DNA technology for wildlife conservation.

  11. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  12. Seventh meeting of radiation protection skilled persons

    International Nuclear Information System (INIS)

    Juhel, Th.; Briandchamplong, J.; Gambini, D.J.; Ammerich, M.; Aubert, B.; Barbey, P.; Biau, A.; Bruchet, H.; Capelle, M.H.; Flon, E.; Gauron, Ch.; Gravelotte, D.; Guerin, Ch.; Le Denmat, D.; Lemoine, Th.; Lombard, J.; Lucas, St.; Menechal, Ph.; Mignien, S.; Million, M.; Mozziconacci, J.G.; Prevot, S.; Radecki, J.J.; Rigaud, S.; Taillandier, P.; Timbert, M.; Vidal, J.P.; Bardelay, Ch.; Lahaye, Th.; Balduyck, S.; Chasson, E.; Rehel, J.L.; Chatellier, Ch.; Barret, Ch.; Guersen, J.; Degrange, J.P.; Sevestre, B.; Lahaye, Th.; Rodde, S.; Marchal, C.; Lefaure, Ch.; Bouk'il, H.; Gneiting, M.; Auboiroux, B.; Riedel, A.; Feuardent, J.; Scanff, P.; Bof, M.; Lochard, J.; Godet, J.L.

    2011-01-01

    This document gathers the slides of the available presentations given during these conference days. Twenty-three presentations out of 25 are assembled in the document and deal with: 1 - the evolution of workers' international protection rules against ionizing radiation risks (C. Bardelay); 2 - presentation of the report of the working group on radiation protection (P. Barbey); 3 - position of the French nuclear safety authority and of the labor general direction about the position of permanent expert groups in radiation protection concerning the expected evolutions in the occupation and training of radioprotection skilled persons (RSP), (T. Lahaye); 4 - experience feedback: RSP in surgery operating theater - a sometimes delicate intervention (S. Balduyck); 5 - workplace analysis in dental surgery: constraints and specificities (D. Le Denmat); 6 - workplace analysis: tritium atmospheric contamination (S. Rigaud); 7 - revision of the NFC 15-160 standard relative to radiology facilities (J.L. Rehel); 8 - example of area tele-dosimetry usage - the Pitie Salpetriere hospital experiment (C. Chatellier and C. Barret); 9 - contribution of radio-attenuation lead gloves in interventional radiology (J. Guersen); 10 - zoning in the medical domain: encountered problems typology and evaluation of possible solutions (Degrange, J.P.); 11 - management of used sealed sources distributed by the CEA and CISBIO (B. Sevestre); 12 - how to perform a measurement in radiation protection - how about measurement uncertainty (M. Ammerich); 13 - national campaign of control about the application of workers radiation protection rules (T. Lahaye); 14 - transparency and inspection approach in local nuclear applications: gamma-graphy, research, nuclear medicine, interventional radiography and radiotherapy (S. Rodde and C. Marchal); 15 - local/regional networks of RSPs and radiation protection actors: 2008 audit results and recent evolutions (C. Lefaure); 16 - role and missions of the external RSP

  13. Suitability of integrated protection diodes from diverse semiconductor technologies

    NARCIS (Netherlands)

    van Wanum, Maurice; Lebouille, Tom; Visser, Guido; van Vliet, Frank Edward

    2009-01-01

    Abstract In this article diodes from three different semiconductor technologies are compared based on their suitability to protect a receiver. The semiconductor materials involved are silicon, gallium arsenide and gallium nitride. The diodes in the diverse semiconductor technologies themselves are

  14. Protection and Control with FPGA technology

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, K. Y.; Yi, W. J. [Korea Reliability Technology and System, Daejeon (Korea, Republic of); Koo, I. S. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-03-15

    To cope with the experiences such as unsatisfied response time of control and protection system, components obsolescence of those systems, and outstanding coercion of system modernization, nuclear society is striving to resolve this issue fundamentally. The reports and standards issued from IAEA and other standard organization like IBC is interested in the FPGA technology, which is fairly mature technology in other fields of industry. Intuitively it is replacing the high level of micro-processor type equipped with various software and hardware, which causes to accelerate the aging and obsolescence, and demands for system modernization in I and C system in Nuclear Power Plant. Thus utility has to spend much time and effort to upgrade I and C system throughout a decease. This paper summarizes the need of FPGA technology in Nuclear Power Plant, describing the characteristics of FPGA, test methodology and design requirements. Also the specific design and implementation experiences brought up in the course of FPGA-based controller, which has been conducted in KoRTS. The certification and verification and validation process to ensure the integrity of FPGA-based controller will be addressed. After that, Diverse Protection System (DPS) for YGN Unit 3 and 4 that is implemented via VHDL through SDLC is loaded on FPGA-based controller for run-time experimentations such as functionality, performance, integrity and reliability. Some of the test data is addressed in this paper.

  15. Protection and Control with FPGA technology

    International Nuclear Information System (INIS)

    Sohn, K. Y.; Yi, W. J.; Koo, I. S.

    2012-01-01

    To cope with the experiences such as unsatisfied response time of control and protection system, components obsolescence of those systems, and outstanding coercion of system modernization, nuclear society is striving to resolve this issue fundamentally. The reports and standards issued from IAEA and other standard organization like IBC is interested in the FPGA technology, which is fairly mature technology in other fields of industry. Intuitively it is replacing the high level of micro-processor type equipped with various software and hardware, which causes to accelerate the aging and obsolescence, and demands for system modernization in I and C system in Nuclear Power Plant. Thus utility has to spend much time and effort to upgrade I and C system throughout a decease. This paper summarizes the need of FPGA technology in Nuclear Power Plant, describing the characteristics of FPGA, test methodology and design requirements. Also the specific design and implementation experiences brought up in the course of FPGA-based controller, which has been conducted in KoRTS. The certification and verification and validation process to ensure the integrity of FPGA-based controller will be addressed. After that, Diverse Protection System (DPS) for YGN Unit 3 and 4 that is implemented via VHDL through SDLC is loaded on FPGA-based controller for run-time experimentations such as functionality, performance, integrity and reliability. Some of the test data is addressed in this paper

  16. Personal Protection of Permethrin-Treated Clothing against Aedes aegypti, the Vector of Dengue and Zika Virus, in the Laboratory.

    Science.gov (United States)

    Orsborne, James; DeRaedt Banks, Sarah; Hendy, Adam; Gezan, Salvador A; Kaur, Harparkash; Wilder-Smith, Annelies; Lindsay, Steve W; Logan, James G

    2016-01-01

    The dengue and Zika viruses are primarily transmitted by Aedes aegypti mosquitoes, which are most active during day light hours and feed both in and outside of the household. Personal protection technologies such as insecticide-treated clothing could provide individual protection. Here we assessed the efficacy of permethrin-treated clothing on personal protection in the laboratory. The effect of washing on treated clothing, skin coverage and protection against resistant and susceptible Ae. aegypti was assessed using modified WHO arm-in-cage assays. Coverage was further assessed using free-flight room tests to investigate the protective efficacy of unwashed factory-dipped permethrin-treated clothing. Clothing was worn as full coverage (long sleeves and trousers) and partial coverage (short sleeves and shorts). Residual permethrin on the skin and its effect on mosquitoes was measured using modified WHO cone assays and quantified using high-pressure liquid chromatography (HPLC) analysis. In the arm-in-cage assays, unwashed clothing reduced landing by 58.9% (95% CI 49.2-66.9) and biting by 28.5% (95% CI 22.5-34.0), but reduced to 18.5% (95% CI 14.7-22.3) and 11.1% (95% CI 8.5-13.8) respectively after 10 washes. Landing and biting for resistant and susceptible strains was not significantly different (ptreated clothing reduced landing by 24.3% (95% CI 17.4-31.7) and biting by 91% (95% CI 82.2-95.9) with partial coverage reducing landing and biting by 26.4% (95% CI 20.3-31.2) and 49.3% (95% CI 42.1-59.1) respectively with coverage type having no significant difference on landing (p80% one hour after wearing treated clothing. Whilst partially covering the body with permethrin-treated clothing provided some protection against biting, wearing treated clothing with long sleeves and trousers provided the highest form of protection. Washing treated clothing dramatically reduced protection provided. Permethrin-treated clothing could provide protection to individuals from Ae

  17. A systems approach to the design of personal armour for explosive ordnance disposal

    OpenAIRE

    Couldrick, C A

    2004-01-01

    A qualitative description of the personal armour design system is elicited by comparing armour throughout the ages. Inputs that 'shape' designs are the materials technology, threat, wearer, task and environment. The emergent properties of protection, ergonomic effectiveness and financial cost form the basis of trade-offs to select final solutions. Work on the protection subsystem refines the key positive emergent property of personal armour. Existing quantifications of protection effective...

  18. Fifth meeting of persons competent in radiation protection

    International Nuclear Information System (INIS)

    2007-01-01

    During this meeting will successively be approached: the statutory frame, the practical guide for the realization of the dosimetry studies of work stations presenting a risk of exposure to ionizing radiations, a study of post in conventional and interventional radiology, study of post in interventional cardiology, the roles and the missions of the P.C.R. (person competent in radiation protection) in a subcontractor company in I.N.B. (base nuclear installation), the application of the zoning order for the activities of industrial radiography, the evolution of the statutory measures in protection of the workers against the dangers of ionizing radiations, all which concerns the P.C.R. (training, missions, certification, educational role), the controls of radioprotection, the external controls of radioprotection, the surveillance of working zones, surveillance of effluents,management of the radioactive waste and effluents, classification of the personnel and the surveillance of the exposure, dosimetry by radio photo luminescence, the systeme S.I.S.E.R.I.. (N.C.)

  19. The protection of personal and medical data - a call for confidentiality

    African Journals Online (AJOL)

    international and local statutory instruments that protect such personal ... management of a patient, for example between the treating physician and the ... The electronic data dilemma ... a network security specialist at AT+T Bell Laboratories in the. USA. ... profession or outside of my profession or in daily commerce with men ...

  20. A review of technology for contact protection of remediation manipulators (WHC Issue 39)

    International Nuclear Information System (INIS)

    Thunborg, S.

    1994-09-01

    Remediation of waste from Underground Storage Tanks (UST) at Hanford will require the use of large remotely controlled equipment. Inherent safety methods need to be identified and incorporated into the retrieval system to prevent contact damage to the UST or to the remediation equipment. This report discusses the requirements for an adequate protection system and reviews the major technologies available for inclusion in a damage protection system. The report proposes that adequate reliability of a protection system can be achieved through the use of two fully-independent subsafety systems. Safety systems technologies reviewed were Force/Torque Sensors, Overload Protection Devices, Ultrasonic Sensors, Capacitance Sensors, Controller Software Limit Graphic Collision Detection, and End Point Tracking. A relative comparison between retrieval systems protection technologies is presented

  1. A study on the radiation and environmental safety -Development of radiation protection and measurement technology-

    Energy Technology Data Exchange (ETDEWEB)

    Jang, See Yung; Lee, Tae Yung; Lee, Hyung Sub; Kim, Jan Ryul; Kim, Chang Kyung; Kim, Bong Hwan; Yoon, Kyung Soo; Jung, Kyung Kee; Jung, Duk Yun; Lee, Bong Jae; Chul, Yoon Suk; Lee, Kee Chang; Yoon, Yu Chang; Jung, Rae Ik; Lee, Sang Yoon; Han, Yung Dae; Kim, Jong Soo, I; Kim, Jong Soo, II; Suh, Kyung Won [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of); Kim, Jong Kyung [Han Yang Univ., Seoul (Korea, Republic of)

    1995-07-01

    Reference X- and neutron radiation fields have been established and evaluated to support the national radiation protection programme under which performance evaluation test for domestic personal dosimetry will be implemented by the ministerial ordinance 1992-15, and to provide a basic technical support in radiation protection dosimetry. Personal dose evaluation algorithm has been developed with the KAERI reference radiation fields which comply well with those in the new ANSI N13.11(1993) to evaluate accurate personal dose equivalents. A personal internal dosimetry algorithm which can estimate the intakes of radionuclides from the results of whole body direct bioassay and the resulting internal doses has been also developed and evaluated to be equally excellent compared with those being used in foreign countries. A BOMAB phantom for precise WBC calibration has also designed, fabricated and test-evaluated. A principal method for estimating the cost for radiation protection which is important in performing a cost-benefit analysis for the radiation protection optimization study based on the ALARA principle has been preliminarily investigated and suggested. 49 figs, 67 tabs, 50 refs. (Author).

  2. Towards a conceptual framework for protection of personal information from the perspective of activity theory

    Directory of Open Access Journals (Sweden)

    Tiko Iyamu

    2017-11-01

    Full Text Available Background: Personal information about individuals is stored by organisations including government agencies. The information is intended to be kept confidential and strictly used for its primary and legitimate purposes. However, that has not always been the case in many South African government agencies and departments. In recent years, personal information about individuals and groups has been illegally leaked for other motives, in which some were detrimental. Even though there exists a legislation, Protection of Personal Information (POPI Act, which prohibits such malpractices, illegally leaked information has however, not stopped or reduced. In addition to the adoption of the POPI Act, a more stringent approach is therefore needed in order to improve sanity in the use and management of personal information. Otherwise, the detriment that such malpractices cause too many citizens can only be on the increase. Objectives: The objectives of this study were in twofold: (1 to examine and understand the activities that happen with personal information leaks, which includes why and how information is leaked; and (2 to develop a conceptual framework, which includes identification of the factors that influence information leaks and breaches in an environment. Method: Qualitative research methods were followed in achieving the objectives of the study. Within the qualitative methods, documents including existing literature were gathered. The activity theory was employed as lens to guide the analysis. Result: From the analysis, four critical factors were found to be of influence in information leaks and breaches in organisations. The factors include: (1 information and its value, (2 the roles of society and its compliance to information protection, (3 government and its laws relating to information protection and (4 the need for standardisation of information usage and management within a community. Based on the factors, a conceptual framework was

  3. The Changing Nature of Law’s Natural Person: The Impact of Emerging Technologies on the Legal Concept of the Person

    NARCIS (Netherlands)

    van Beers, B.C.

    This article discusses the legal concept of the person against the background of technological developments. Emerging technologies are offering radical ways to transform the biological and physical aspects of life. Several legal scholars claim that the technological artificialization of human life

  4. [Management of Personal Information in Clinical Laboratory Medicine:--Chairmen's Introductory Remarks].

    Science.gov (United States)

    Yoshida, Hiroshi; Shimetani, Naoto

    2014-11-01

    The Japanese Society of Laboratory Medicine has been running its own Medical Safety Committee, and holding a symposium on medical safety during the annual meeting. The medical world is filled with a considerable amount of personal information, including genetic information, the ultimate personal information. We, as medical staff, have to manage such personal information not only in times of peace but also during disasters or emergency situations. In Japan, the Act on the Protection of Personal Information is currently being implemented, but a number of problems remain. Human beings have entered the information technology era, including electrical medical record systems, which is useful for research and education besides medical practice. This is why personal information must be more effectively protected from leakage, misconception, and abuse. We should create a sound system to manage personal information, with the spirit of protecting patient information that originated from the Oath of Hippocrates.

  5. Technology transfer - insider protection workshop (Safeguards Evaluation Method - Insider Threat)

    International Nuclear Information System (INIS)

    Strait, R.S.; Renis, T.A.

    1986-01-01

    The Safeguards Evaluation Method - Insider Threat, developed by Lawrence Livermore National Laboratory, is a field-applicable tool to evaluate facility safeguards against theft or diversion of special nuclear material (SNM) by nonviolent insiders. To ensure successful transfer of this technology from the laboratory to DOE field offices and contractors, LLNL developed a three-part package. The package includes a workbook, user-friendly microcomputer software, and a three-day training program. The workbook guides an evaluation team through the Safeguards Evaluation Method and provides forms for gathering data. The microcomputer software assists in the evaluation of safeguards effectiveness. The software is designed for safeguards analysts with no previous computer experience. It runs on an IBM Personal Computer or any compatible machine. The three-day training program is called the Insider Protection Workshop. The workshop students learn how to use the workbook and the computer software to assess insider vulnerabilities and to evaluate the benefits and costs of potential improvements. These activities increase the students' appreciation of the insider threat. The workshop format is informal and interactive, employing four different instruction modes: classroom presentations, small-group sessions, a practical exercise, and ''hands-on'' analysis using microcomputers. This approach to technology transfer has been successful: over 100 safeguards planners and analysts have been trained in the method, and it is being used at facilities through the DOE complex

  6. Revisiting Respect for Persons in Genomic Research

    Directory of Open Access Journals (Sweden)

    Debra J. H. Mathews

    2014-01-01

    Full Text Available The risks and benefits of research using large databases of personal information are evolving in an era of ubiquitous, internet-based data exchange. In addition, information technology has facilitated a shift in the relationship between individuals and their personal data, enabling increased individual control over how (and how much personal data are used in research, and by whom. This shift in control has created new opportunities to engage members of the public as partners in the research enterprise on more equal and transparent terms. Here, we consider how some of the technological advances driving and paralleling developments in genomics can also be used to supplement the practice of informed consent with other strategies to ensure that the research process as a whole honors the notion of respect for persons upon which human research subjects protections are premised. Further, we suggest that technological advances can help the research enterprise achieve a more thoroughgoing respect for persons than was possible when current policies governing human subject research were developed. Questions remain about the best way to revise policy to accommodate these changes.

  7. An E-government Interoperability Platform Supporting Personal Data Protection Regulations

    Directory of Open Access Journals (Sweden)

    Laura González

    2016-08-01

    Full Text Available Public agencies are increasingly required to collaborate with each other in order to provide high-quality e-government services. This collaboration is usually based on the service-oriented approach and supported by interoperability platforms. Such platforms are specialized middleware-based infrastructures enabling the provision, discovery and invocation of interoperable software services. In turn, given that personal data handled by governments are often very sensitive, most governments have developed some sort of legislation focusing on data protection. This paper proposes solutions for monitoring and enforcing data protection laws within an E-government Interoperability Platform. In particular, the proposal addresses requirements posed by the Uruguayan Data Protection Law and the Uruguayan E-government Platform, although it can also be applied in similar scenarios. The solutions are based on well-known integration mechanisms (e.g. Enterprise Service Bus as well as recognized security standards (e.g. eXtensible Access Control Markup Language and were completely prototyped leveraging the SwitchYard ESB product.

  8. Health-illness transition among persons using advanced medical technology at home.

    Science.gov (United States)

    Fex, Angelika; Flensner, Gullvi; Ek, Anna-Christina; Söderhamn, Olle

    2011-06-01

    This study aimed to elucidate meanings of health-illness transition experiences among adult persons using advanced medical technology at home. As an increasing number of persons perform self-care while using different sorts of advanced medical technology at home, knowledge about health-illness transition experiences in this situation may be useful to caregivers in supporting these patients. A qualitative design was used. Five women and five men, all of whom performed self-care at home, either using long-term oxygen therapy from a ventilator or oxygen cylinder, or performing peritoneal or haemodialysis, were interviewed. Ethics committee approval was obtained. Informed consent was received from all participants, and ethical issues concerning their rights in research were raised. The interviews were analysed using a phenomenological hermeneutical methodology, including both an inductive and a deductive structural analysis. This method offers possibilities to obtain an increased understanding by uncovering a deeper meaning of lived experiences through interviews transcribed as texts. The health-illness transition for adult persons in this context was found to mean a learning process of accepting, managing, adjusting and improving daily life with technology, facilitated by realizing the gain from technology at home. Further, the meaning of the health-illness transition experience was interpreted as contentment with being part of the active and conscious process towards transcending into a new state of living, in which the individual and the technology were in tune. The healthy transition experience was characterized by human growth and becoming. This study elucidates one meaning of health-illness transition experiences in relation to the use of advanced medical technology on a more generic level, independent of the specific type of technology used. A positive attitude towards technology at home facilitates the transition. © 2010 The Authors. Scandinavian Journal of

  9. Access to Justice for Persons with Disabilities: An Emerging Strategy

    Directory of Open Access Journals (Sweden)

    David Allen Larson

    2014-05-01

    Full Text Available Persons with disabilities often find themselves marginalized by society and by our justice systems. We can improve access to justice by training better advocates. Advocates not only must be knowledgeable concerning relevant laws and regulations, but also must be able to interact effectively on a personal, professional level with persons who have disabilities. We also want to make certain that persons with disabilities have the opportunity to learn to advocate for themselves and for other persons with disabilities. Technologies are available that can help us accomplish these goals. This article provides a brief survey of legal protections (and gaps in such protection for persons with disabilities. Successful advocate training programs from around the world are identified and described. The article provides examples of how technology is being used to support these efforts and provides suggestions regarding additional ways in which technology could be employed. Law schools around the world have begun to embrace the goal of better advocacy, but improving access will require well-prepared advocates to answer the call. Training advocates to provide services to a population that may have significantly different needs even within that population may be a more efficient and effective way to improve access to justice than by attempting to draft laws and regulations that somehow address all possible circumstances.

  10. Personal dosimetry service of VF, a.s. company

    International Nuclear Information System (INIS)

    Prasek, P.

    2009-01-01

    The VF, a.s. Company will extend its services in the area of personal dosimetry at the end of 2008, which is fully in compliance with the requirements of the Atomic Act, section 9 paragraph (1) letter r) and Decree on Radiation Protection, section 59 paragraph (1) letter a). Optically stimulated luminescence was selected in VF .a.s. as the most advantageous and the most advanced technology for the integral personal dosimetry. Optically stimulated luminescence (OSL) has been using in dosimetry for more than ten years. Although it is relatively new technology , its indisputable advantages predetermine that technology has significantly benefited in personal dosimetry services within a short time all over the advanced world. The VF, a.s. personal dosimetry service is based on the licensed products of LANDAUER, the US company, which is the world leader in OSL dosimetry. Crystalline Al 2 O 3 :C was selected as the detection material. All equipment of personal dosimetry service is installed in the VF Centre of Technology in Cerna Hora. The personal dosimetry service is incorporated in the International LANDAUER Dosimetry Service Network, and in the European Union, it is directly linked to the LANDAUER European Headquarters with its office in Paris. As a part of the OSL technology licence, the VF personal dosimetry service was included in the inter-laboratory comparison programme of the LANDAUER syndicate. (author)

  11. Personal dosimetry service of VF, a.s. company

    International Nuclear Information System (INIS)

    Prasek, P.

    2008-01-01

    The VF, a.s. Company will extend its services in the area of personal dosimetry at the end of 2008, which is fully in compliance with the requirements of the Atomic Act, section 9 paragraph (1) letter r) and Decree on Radiation Protection, section 59 paragraph (1) letter a). Optically stimulated luminescence was selected in VF .a.s. as the most advantageous and the most advanced technology for the integral personal dosimetry . Optically stimulated luminescence (OSL) has been using in dosimetry for more than ten years. Although it is relatively new technology , its indisputable advantages predetermine that technology has significantly benefited in personal dosimetry services within a short time all over the advanced world. The VF, a.s. personal dosimetry service is based on the licensed products of LANDAUER, the US company, which is the world leader in OSL dosimetry. Crystalline Al 2 O 3 :C was selected as the detection material. All equipment of personal dosimetry service is installed in the VF Centre of Technology in Cerna Hora. The personal dosimetry service is incorporated in the International LANDAUER Dosimetry Service Network, and in the European Union, it is directly linked to the LANDAUER European Headquarters with its office in Paris. As a part of the OSL technology licence, the VF personal dosimetry service was included in the inter-laboratory comparison programme of the LANDAUER syndicate. (author)

  12. Do Smartphone Power Users Protect Mobile Privacy Better than Nonpower Users? Exploring Power Usage as a Factor in Mobile Privacy Protection and Disclosure.

    Science.gov (United States)

    Kang, Hyunjin; Shin, Wonsun

    2016-03-01

    This study examines how consumers' competence at using smartphone technology (i.e., power usage) affects their privacy protection behaviors. A survey conducted with smartphone users shows that power usage influences privacy protection behavior not only directly but also indirectly through privacy concerns and trust placed in mobile service providers. A follow-up experiment indicates that the effects of power usage on smartphone users' information management can be a function of content personalization. Users, high on power usage, are less likely to share personal information on personalized mobile sites, but they become more revealing when they interact with nonpersonalized mobile sites.

  13. The availability of appropriately fitting personal protective aprons and jackets for angiographic and interventional radiology personnel

    International Nuclear Information System (INIS)

    Cremen, S.A.; McNulty, J.P.

    2014-01-01

    Purpose: This study explored the availability of personal protective equipment, lead or lead-free aprons or jackets, in angiographic and interventional radiology suites in the Republic of Ireland with a focus on the sizes available, appropriateness of fit and purchasing practices. Methods: All centres providing an angiographic or interventional radiology service in the Republic of Ireland were invited to participate with data being collected by means of a postal questionnaire exploring the above issues. Results: The mean number of aprons or jackets available across the centres who responded to the survey was 18.4 with the majority of these, 72%, being medium or large in size. Clinical specialists in three centres identified that there were insufficient aprons or jackets sized extra small or extra large within their departments and only one centre had a purchasing policy in place where individual staff were assigned a personal apron or jacket. Conclusion: Ill-fitting aprons or jackets will reduce the shielding provided to certain body regions by personal protective equipment. The use of over-sized aprons or jackets by staff is of particular concern based on the potential for inadvertent exposure to tissues where cancers may potentially be induced due to poor armhole fit. It is important to carefully consider purchasing practices and range of personal protective equipment sizes available in order to ensure that all staff receive the greatest possible protection from occupational radiation exposure

  14. Do privacy and data protection rules apply to legal persons and should they? A proposal for a two-tiered system

    NARCIS (Netherlands)

    van der Sloot, B.

    2015-01-01

    Privacy and data protection rules are usually said to protect the individual against intrusive governments and nosy companies. These rights guarantee the individual's freedom, personal autonomy and human dignity, among others. More and more, however, legal persons are also allowed to invoke the

  15. Using scoring methods to assess the performance of CBRN personal protective systems in different scenarios.

    NARCIS (Netherlands)

    Houwelingen, T.; Kistemaker, L.A.; Kant, S. de; Hartog, E.A. den

    2010-01-01

    The past decades show an increasing variety in the design and application of personal protective equipment, PPE. Even within the PPE aimed at CBRN protection the future user can choose from a bewildering amount of producers and models. To make his predicament even worse he also has to deal with a

  16. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...

  17. The personal dosimetry in Mexico; La dosimetria personal en Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Salazar, M.A. [Proxtronics/ Asesoria Integral en Dosimetria Termoluminiscente S.A. de C.V., Canal de Miramontes 2030-14, Col. Educacion, 04400 Mexico D.F. (Mexico)]. e-mail: aidtsa@avantel.net

    2006-07-01

    The Personal Dosimetry in Mexico, has an approximately 30 year-old history; and it had been and it is at the moment, one of the more important resources with which the personnel that works with ionizing radiation sources counts for its protection. The Personal Dosimetry begins with the film dosimetry, technique that even continues being used at the present time by some users, and the main reason of its use is for economic reasons. At the moment this technique, it has been surpassed, by the Thermoluminescent dosimetry, which has taken a lot of peak, mainly by the technological development with which it is counted at the present time; what has given as a result that this technique becomes tip technology; that supported in the characteristic of the used materials, as the handling and processing of the information associated with the new PC, digitizer cards, software etc, what has allowed increases it potential. In this work the current necessities of the market are presented as well as an analysis of the future real necessities in Mexico, at national level, the companies that provide this service and that they spread to satisfy this necessity of the market, including the different used technologies are also mentioned. The application ranges, at the same time, of the advantages and disadvantages of the different systems of Personal Dosimetry in the market. The companies that at the moment provide the service of Personal Dosimetry, its use materials and equipment in indistinct form, for the monitoring of gamma radiation, beta particles, different qualities of x-ray radiation, and sometimes neutrons. The monitoring of the exposed personnel at the diverse sources of ionizing radiation mentioned is carried out in many occasions without having with the materials (detectors), neither the appropriate infrastructure and therefore without the quality control that guarantees a correct evaluation of the dose equivalent, as a result of the exposure to the ionizing radiations; it

  18. Double-Loop Health Technology: Enabling Socio-technical Design of Personal Health Technology in Clinical Practice

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Frost, Mads

    2018-01-01

    present a case of designing personal health technology for mental health, which is integrated into hospital-based treatment. This system helps patients to manage their disease by tracking and correlation behavior and disease progression and provide feedback to them, while also deployed as part......Personal health technology is rapidly emerging as a response to the challenges associated with significant increase in chronic noncommunicable diseases. The overall design paradigm behind most of these applications is to manually and automatically sample data from sensors and smartphones and use...... this to provide patients with an awareness of their illness and give recommendation for treatment, care, and healthy living. Few of these systems are, however, designed to be part of a complex socio-technical care and treatment processes in existing healthcare systems and clinical pathways. In this chapter, we...

  19. Genome technologies and personalized dental medicine.

    Science.gov (United States)

    Eng, G; Chen, A; Vess, T; Ginsburg, G S

    2012-04-01

    The addition of genomic information to our understanding of oral disease is driving important changes in oral health care. It is anticipated that genome-derived information will promote a deeper understanding of disease etiology and permit earlier diagnosis, allowing for preventative measures prior to disease onset rather than treatment that attempts to repair the diseased state. Advances in genome technologies have fueled expectations for this proactive healthcare approach. Application of genomic testing is expanding and has already begun to find its way into the practice of clinical dentistry. To take full advantage of the information and technologies currently available, it is vital that dental care providers, consumers, and policymakers be aware of genomic approaches to understanding of oral diseases and the application of genomic testing to disease diagnosis and treatment. Ethical, legal, clinical, and educational initiatives are also required to responsibly incorporate genomic information into the practice of dentistry. This article provides an overview of the application of genomic technologies to oral health care and introduces issues that require consideration if we are to realize the full potential of genomics to enable the practice of personalized dental medicine. © 2011 John Wiley & Sons A/S.

  20. Anti-Spam Legislation in Consideration of Personal Data Protection and Other Legal Instruments

    Czech Academy of Sciences Publication Activity Database

    Matejka, Ján

    2016-01-01

    Roč. 6, č. 2 (2016), s. 90-114 ISSN 1805-8396 R&D Projects: GA ČR(CZ) GA16-26910S Institutional support: RVO:68378122 Keywords : spam * personal data protection * e- marketing Subject RIV: AG - Legal Sciences

  1. When does risk perception predict protection motivation for health threats? A person-by-situation analysis

    Science.gov (United States)

    Klein, William M. P.; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation. PMID:29494705

  2. When does risk perception predict protection motivation for health threats? A person-by-situation analysis.

    Science.gov (United States)

    Ferrer, Rebecca A; Klein, William M P; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation.

  3. Proceedings: Radiation Protection Technology Conference: Providence, RI, November 2001

    International Nuclear Information System (INIS)

    2002-01-01

    Health physics (HP) professionals within the nuclear industry are continually upgrading their respective programs with new methods and technologies. The move to shorter outages combined with a diminishing group of contract HP technicians and demanding emergent work makes such changes even more important. The EPRI Radiation Protection Technology Conference focused on a number of key health physics issues and developments

  4. Environmental protection technologies and prospect for uranium mining and metallurgy in China

    International Nuclear Information System (INIS)

    Pan Yingjie

    2002-01-01

    Based on practices of production and environmental protection of China's uranium mining and metallurgy, control and protection of the three wastes in uranium mining and metallurgy are discussed. Prospects for environmental protection technologies of uranium mining and metallurgy is made

  5. Using Technology and Assessment to Personalize Instruction: Preventing Reading Problems.

    Science.gov (United States)

    Connor, Carol McDonald

    2017-09-15

    Children who fail to learn to read proficiently are at serious risk of referral to special education, grade retention, dropping out of high school, and entering the juvenile justice system. Accumulating research suggests that instruction regimes that rely on assessment to inform instruction are effective in improving the implementation of personalized instruction and, in turn, student learning. However, teachers find it difficult to interpret assessment results in a way that optimizes learning opportunities for all of the students in their classrooms. This article focuses on the use of language, decoding, and comprehension assessments to develop personalized plans of literacy instruction for students from kindergarten through third grade, and A2i technology designed to support teachers' use of assessment to guide instruction. Results of seven randomized controlled trials demonstrate that personalized literacy instruction is more effective than traditional instruction, and that sustained implementation of personalized literacy instruction first through third grade may prevent the development of serious reading problems. We found effect sizes from .2 to .4 per school year, which translates into about a 2-month advantage. These effects accumulated from first through third grade with a large effect size (d = .7) equivalent to a full grade-equivalent advantage on standardize tests of literacy. These results demonstrate the efficacy of technology-supported personalized data-driven literacy instruction to prevent serious reading difficulties. Implications for translational prevention research in education and healthcare are discussed.

  6. Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection.

    Science.gov (United States)

    Lee, Ji Yeon

    2016-10-01

    Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection.

  7. La tutela constitucional de las personas con discapacidad // The constitutional protection of persons with disabilities

    Directory of Open Access Journals (Sweden)

    Héctor Álvarez García

    2017-12-01

    The work begins with an historical journey through the different models implemented by public authorities to address the phenomenon of disability. This journey culminates with the mixed paradigm —medical and social— embodied in the Spanish Constitution of 1978. The article interprets the «social protections norms» of the Constitution, in the light of the International Convention on the Rights of Persons with Disabilities and the doctrine of the Constitutional Court, in order to determine the content and scope of constitutional protection of the capacity to act of persons with disabilities. This is essential to ensure the free development of the personality of this large group of citizens, whose lives have traditionally been governed by the will of others, if not been directly deprived of their liberty through their institutionalization.

  8. A cyborg ontology in health care: traversing into the liminal space between technology and person-centred practice.

    Science.gov (United States)

    Lapum, Jennifer; Fredericks, Suzanne; Beanlands, Heather; McCay, Elizabeth; Schwind, Jasna; Romaniuk, Daria

    2012-10-01

    Person-centred practice indubitably seems to be the antithesis of technology. The ostensible polarity of technology and person-centred practice is an easy road to travel down and in their various forms has been probably travelled for decades if not centuries. By forging ahead or enduring these dualisms, we continue to approach and recede, but never encounter the elusive and the liminal space between technology and person-centred practice. Inspired by Haraway's work, we argue that healthcare practitioners who critically consider their cyborg ontology may begin the process to initiate and complicate the liminal and sought after space between technology and person-centred practice. In this paper, we draw upon Haraway's idea that we are all materially and ontologically cyborgs. Cyborgs, the hybridity of machine and human, are part of our social reality and embedded in our everyday existence. By considering our cyborg ontology, we suggest that person-centred practice can be actualized in the contextualized, embodied and relational spaces of technology. It is not a question of espousing technology or person-centred practice. Such dualisms have been historically produced and reproduced over many decades and prevented us from recognizing our own cyborg ontology. Rather, it is salient that we take notice of our own cyborg ontology and how technological, habitual ways of being may prevent (and facilitate) us to recognize the embodied and contextualized experiences of patients. A disruption and engagement with the habitual can ensure we are not governed by technology in our logics and practices of care and can move us to a conscious and critical integration of person-centred practice in the technologized care environments. By acknowledging ourselves as cyborgs, we can recapture and preserve our humanness as caregivers, as well as thrive as we proceed in our technological way of being. © 2012 Blackwell Publishing Ltd.

  9. Personal Hearing Protection including Active Noise Reduction (Les dispositifs de protection de l'ouie, y compris l'attenuation du bruit actif) (CD-ROM)

    National Research Council Canada - National Science Library

    Steeneken, H. J; Dancer, A; McKinley, R; Buck, K; James, S

    2005-01-01

    .... SYSTEMS DETAIL NOTE: Adobe Acrobat Reader is included on disc. ABSTRACT: Personal hearing protection and speech communication facilities are essential for optimal performance in military operations...

  10. Occupational Noise Pollution and Hearing protection in selected industries

    Directory of Open Access Journals (Sweden)

    Ghorbanali Mohammadi

    2014-01-01

    Full Text Available ABSTRACT The use of technology in industries is ever increasing. With the introduction of this technology come new safety and human performance concerns. Hearing loss caused by industrial noise has been recognized for many years, and protection of employee hearing has been made mandatory by governmental agencies. This paper presents an investigation of occupational noise exposure and Personal hearing protective devices (PHPD in selected industries in the south-eastern Iran. A questionnaire has been used to collect data for workers with high noise exposure and Personal hearing protective devices (PHPD. The subjects were 354 industrial workers expose to noise pressure levels greater than the action level defined in Iranian legislation (85dB (A 8h/d. The results of this study indicated that only younger workers with minor professional experience and with high educational background are used PHPD to protect and preserve their hearing. The finding of this study shows that approximately 75% of the workers with age 18-36 reported the use of personal protective Devices at all the time, and 73% of workers with age more than 46 years old reported that they had never used them PHPD, even though it was mandatory in their workplaces. Statistical data show that, the percentage of male workers (82 with age more than 37 years old having headaches at workplace are higher than female (3.4 with the same age groups. A noise training and education program must be developed for industrial employees in order to protect them from hazardous noise pollution. Employers must play an important role in promoting the regular use of Personal hearing protective devices. Noise level in work areas must be considered in the early design of Hearing Conservation Program.

  11. Personal Protective Equipment in the humanitarian governance of Ebola: between individual patient care and global biosecurity

    NARCIS (Netherlands)

    Pallister-Wilkins, P.

    2016-01-01

    This article focuses on the use of Personal Protective Equipment in humanitarianism. It takes the recent Ebola outbreak as a case through which to explore the role of objects in saving individual lives and protecting populations. The argument underlines the importance of PPE in mediating between

  12. ConstitutionalJustice: Cases of Protection of Freedom and Personal Security in Colombia

    Directory of Open Access Journals (Sweden)

    Viridiana Molinares Hassan

    2014-07-01

    Full Text Available In this paper we present the results of an investigation about judicial protection of freedom and personal security granted by the Constitutional Court (cc of Colombia, with a comparative analysis between the period 1992-2001, to which governments have appointed period of postconstitucionales, which coincides with the issuance of the 1991 Constitution, and the creation of constitutional jurisdiction, and the period 2002-2010, during which it ran the Democratic Security Policy (dsp as a government policy proposal by former president Álvaro Uribe, whose aim was to achieve peace through the declaration of war to the guerrilla group Revolutionary Armed Forces of Colombia (farc. Our interest is to show that the protection of freedom and personal security as the basis of the Constitutional (ec finds in the cc his greatest guarantor, even against closing courts in other jurisdictions that are still rooted in the failed legal positivist paradigm, ignoring the postulates of neoconstitutionalism dc sufficiently developed from a process of creative interpretation and decision-making. This coupled with the importance for the branches of power and knowledge associated scope of freedom and personal security developed by the cc in the difficult context of irregular warfare that exists in Colombia, yet it is, for universal constitutionalism, an example of the development of legal guarantor in the context of current constitutionalism.

  13. Decree of the 29. december 2003 relative to the education modes of the competent person in radiation protection and the trainer certification

    International Nuclear Information System (INIS)

    2004-01-01

    This decree details the content of the training of the radiation protection competent person that must allow to the applicant to execute the missions assigned by the article R.231-106 from the Labour code. The different chapters are as follow: radioactivity; radiation-matter interaction; protection principle against external exposure; protection principle against contamination; radiation detection; biological radiation effects; exposure sources for man; regulation; the work of the competent person in radiation protection; optimization in radiation protection. (N.C.)

  14. What is good radiation protection?

    International Nuclear Information System (INIS)

    Lorenz, B.

    2016-01-01

    Radiation protection is based on the ICRP-System with its pillars justification, limitation and optimization. From this radiation protection should be the same irrespective of the application of radiation. But radiation protection in the nuclear industry is much different from the use of radiation sources or X-ray units. This is by far not due to the different technologies. It originates from the different interpretation of the system. For one person good radiation protection would mean to have no radiation exposures, to avoid radiation at all as best option and to use it only if there are no alternatives. For another person the best radiation protection would be the one which does not produce much efforts and costs. So what is reasonable? In reality the first interpretation prevails, at least in Germany. A change is needed. If we continue to exercise radiation protection as we do it today the beneficial application of radiation will be restricted unduly and might become impossible at all. A stronger orientation towards the naturally occurring radiation would help instead to regulate natural radiation in the same way as it is done for artificial radiation. The system of ICRP has to be changed fundamentally.

  15. Employers' Statutory Vicarious Liability in Terms of the Protection of Personal Information Act

    Directory of Open Access Journals (Sweden)

    Daleen Millard

    2016-07-01

    Full Text Available A person whose privacy has been infringed upon through the unlawful, culpable processing of his or her personal information can sue the infringer's employer based on vicarious liability or institute action based on the Protection of Personal Information Act 4 of 2013 (POPI. Section 99(1 of POPI provides a person (a "data subject" whose privacy has been infringed upon with the right to institute a civil action against the responsible party. POPI defines the responsible party as the person who determines the purpose of and means for the processing of the personal information of data subjects. Although POPI does not equate a responsible party to an employer, the term "responsible party" is undoubtedly a synonym for "employer" in this context. By holding an employer accountable for its employees' unlawful processing of a data subject's personal information, POPI creates a form of statutory vicarious liability. Since the defences available to an employer at common law and developed by case law differ from the statutory defences available to an employer in terms of POPI, it is necessary to compare the impact this new statute has on employers. From a risk perspective, employers must be aware of the serious implications of POPI. The question that arises is whether the Act perhaps takes matters too far. This article takes a critical look at the statutory defences available to an employer in vindication of a vicarious liability action brought by a data subject in terms of section 99(1 of POPI. It compares the defences found in section 99(2 of POPI and the common-law defences available to an employer fending off a delictual claim founded on the doctrine of vicarious liability. To support the argument that the statutory vicarious liability created by POPI is too harsh, the defences contained in section 99(2 of POPI are further analogised with those available to an employer in terms of section 60(4 of the Employment Equity Act 55 of 1998 (EEA and other

  16. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  17. Rise of radiation protection: science, medicine and technology in society, 1896--1935

    International Nuclear Information System (INIS)

    Serwer, D.P.

    1976-12-01

    The history of radiation protection before World War II is treated as a case study of interactions between science, medicine, and technology. The fundamental concerns include the following: are how medical and technical decisions with social impacts are made under conditions of uncertainty; how social pressures are brought to bear on the development of science, medicine, and technology; what it means for medicine or technology to be scientific; why professional groups seek international cooperation; and the roles various professionals and organizations play in controlling the harmful side effects of science, medicine, and technology. These questions are addressed in the specific context of protection from the biological effects of x-rays and radium in medical use

  18. Rise of radiation protection: science, medicine and technology in society, 1896--1935

    Energy Technology Data Exchange (ETDEWEB)

    Serwer, D.P.

    1976-12-01

    The history of radiation protection before World War II is treated as a case study of interactions between science, medicine, and technology. The fundamental concerns include the following: are how medical and technical decisions with social impacts are made under conditions of uncertainty; how social pressures are brought to bear on the development of science, medicine, and technology; what it means for medicine or technology to be scientific; why professional groups seek international cooperation; and the roles various professionals and organizations play in controlling the harmful side effects of science, medicine, and technology. These questions are addressed in the specific context of protection from the biological effects of x-rays and radium in medical use.

  19. Polycyclic aromatic hydrocarbons produced by electrocautery smoke and the use of personal protective equipment 1

    Directory of Open Access Journals (Sweden)

    Caroline Vieira Claudio

    Full Text Available ABSTRACT Objective: analyze the concentration of polycyclic aromatic hydrocarbons in electrocautery smoke in operating rooms and the use of personal protective equipment by the intraoperative team when exposed to hydrocarbons. Method: exploratory and cross-sectional field research conducted in a surgery center. Gases were collected by a vacuum suction pump from a sample of 50 abdominal surgeries in which an electrocautery was used. A form was applied to identify the use of personal protective equipment. Gases were analyzed using chromatography. Descriptive statistics and Spearman's test were used to treat data. Results: there were 17 (34% cholecystectomies with an average duration of 136 minutes, while the average time of electrocautery usage was 3.6 minutes. Airborne hydrocarbons were detected in operating rooms in 100% of the surgeries. Naphthalene was detected in 48 (96.0% surgeries and phenanthrene in 49 (98.0%. The average concentration of these compounds was 0.0061 mg/m3 and a strong correlation (0.761 was found between them. The intraoperative teams did not use respirator masks such as the N95. Conclusion: electrocautery smoke produces gases that are harmful to the health of the intraoperative team, which is a concern considering the low adherence to the use of personal protective equipment.

  20. Digital Technologies Supporting Person-Centered Integrated Care - A Perspective.

    Science.gov (United States)

    Øvretveit, John

    2017-09-25

    Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning "digitalisation" of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care.

  1. Whether blockchain technology violates the right to be forgotten?

    OpenAIRE

    Žymančius, Juras

    2018-01-01

    This master thesis analyzes the issues associated with the compliance of blockchain technology with the right to erasure or “right to be forgotten” in the General Data Protection Regulation. The first chapter reviews blockchain technology, how it works, types it has that is relevant to this thesis problem. In addition, it ascertains that there is no current legislation or guidelines regarding blockchain technology and its impact on personal data protection. The second chapter revi...

  2. UNHCR and the pursuit of international protection: accountability through technology?

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov; Sandvik, Kristin B.

    2018-01-01

    Better management and new technological solutions are increasingly portrayed as the way to improve refugee protection and enhance the accountability of humanitarian actors. Taking concepts of legibility, quantification and co-production as the point of departure, this article explores how techno-bureaucratic...... practices shape conceptions of international refugee protection. We do this by examining the evolving roles of results-based management (RBM), biometrics and cash-based interventions as ‘accountability technologies’ in the United Nations High Commissioner for Refugees’ international protection efforts...

  3. How Uninformed is the Average Data Subject? A Quest for Benchmarks in EU Personal Data Protection

    Directory of Open Access Journals (Sweden)

    Gloria González Fuster

    2014-11-01

    Full Text Available

    Information obligations have always been crucial in personal data protection law. Reinforcing these obligations is one of the priorities of the legislative package introduced in 2012 by the European Commission to redefine the personal data protection legal landscape of the European Union (EU. Those responsible for processing personal data (the data controllers must imperatively convey certain pieces of information to those whose data is processed (the data subjects, and they are expected to do so in an increasingly transparent manner. Beyond these punctual information requirements, however, data subjects appear to always be and inevitably remain in a state of relative ignorance, as in almost constant need of further guidance. Data subjects are nowadays often depicted as unknowing consumers of online services, services which surreptitiously take away from them personal data thus conceived as a valuable asset. In light of these developments, this contribution critically investigates how EU law is envisaging data subjects in terms of knowledge. The paper reviews the birth and evolution of information obligations as an element of European personal data protection law, and asks whether thinking of data subjects as consumers is consistent with the notion of average consumer functioning in EU consumer law. Finally, it argues that the time might have come to openly clarify when data subjects are unlawfully misinformed, and that, in the meantime, individuals might benefit not only from accessing more transparent information, but also from being made more aware of the limitations of the information available to them.   

  4. The Columbia River Protection Supplemental Technologies Quality Assurance Project Plan

    Energy Technology Data Exchange (ETDEWEB)

    Fix, N. J.

    2008-03-12

    Pacific Northwest National Laboratory researchers are working on the Columbia River Protection Supplemental Technologies Project. This project is a U. S. Department of Energy, Office of Environmental Management-funded initiative designed to develop new methods, strategies, and technologies for characterizing, modeling, remediating, and monitoring soils and groundwater contaminated with metals, radionuclides, and chlorinated organics. This Quality Assurance Project Plan provides the quality assurance requirements and processes that will be followed by the Technologies Project staff.

  5. Career transitions for persons with severe physical disabilities: integrating technological and psychosocial skills and accommodations.

    Science.gov (United States)

    Lash, M; Licenziato, V

    1995-01-01

    This article describes a vocational training program entitled, 'Careers in Automation for Persons with Severe Physical Disabilities', that was developed by the Department of Physical Medicine and Rehabilitation at Tufts University School of Medicine in collaboration with the Massachusetts Rehabilitation Commission. Its goal is to secure employment for individuals with severe physical impairments by using computers and technology as job related accommodations. Psychosocial, educational, and vocational profiles are presented for 24 clients over 4 years. Three case studies involving persons with traumatic, chronic and developmental disabilities illustrate the importance of matching technological accommodations with employer needs and personal preferences. Discussion of employment outcomes illustrates that the effective use of computers and technology by persons with disabilities is best measured not by the degree of sophistication and engineering of systems and devices, but by employer and employee satisfaction with job performance and productivity.

  6. Protective personality traits: High openness and low neuroticism linked to better memory in multiple sclerosis.

    Science.gov (United States)

    Leavitt, Victoria M; Buyukturkoglu, Korhan; Inglese, Matilde; Sumowski, James F

    2017-11-01

    Memory impairment in multiple sclerosis (MS) is common, although few risk/protective factors are known. To examine relationships of personality to memory/non-memory cognition in MS. 80 patients completed a cognitive battery and a personality scale measuring the "Big 5" traits: openness, neuroticism, agreeableness, extraversion, and conscientiousness. Memory was most related to openness, with higher openness linked to better memory and lower risk for memory impairment, controlling for age, atrophy, education, and intelligence quotient (IQ). Lower neuroticism was also related to better memory, and lower conscientiousness to memory impairment. Non-memory cognition was unrelated to personality. Personality may inform predictive models of memory impairment in MS.

  7. Operator dermal exposure and protection provided by personal protective equipment and working coveralls during mixing/loading, application and sprayer cleaning in vineyards.

    Science.gov (United States)

    Thouvenin, Isabelle; Bouneb, Françoise; Mercier, Thierry

    2017-06-01

    The efficiency of a working coverall combined with personal protective equipment to protect operators against dermal exposure to plant protection products under field conditions was studied. Operators wore a non-certified water-repellent finish polyester/cotton coverall plus a certified gown during the mixing/loading and the cleaning phases. Insecticide foliar application to a vineyard was selected as the exposure scenario. The overall dermal residue levels measured in this study were in the range of data recently collected in Europe. The water-repellent finish working coverall reduced body exposure by a factor of approximately 95%. Wearing a Category III Type 3 partial body gown during mixing/loading and cleaning of the application equipment led to a further protective effect of 98.7%. The combination of a water-repellent finish working coverall and partial body protection during specific tasks provided satisfactory levels of protection and can be considered as suitable protection for the conditions of use studied.

  8. New technologies, virtual reality and multimedia, in Radiation Protection training

    International Nuclear Information System (INIS)

    Felipe, A.; Sanchez-Mayoral, M. L.; Lamela, B.; Merino, A.; Sarti, F.

    2003-01-01

    Iberdrola Ingenieria y Consultoria (Iberinco) has developed some computer applications based in New Technologies, Virtual Reality and Multimedia, with the aim to optimise the formation and training of professionally exposed workers as well as to inform the public. The use of the new technologies could be an important help for the workers training. Virtual Reality Projects developed by Iberinco are: a) CIPRES: Interactive Calculations of Radiological Protection in a Simulation Environmental and, b) ACEWO: Workers Control Access to Nuclear Power Plants, virtual Reality could be directly applicable to several aspects related with Radiological Protection Training, for example. An application that workers could used to learn the main aspects of Radiological Protection related with: a) Physical concepts, b) Regulations, c) Use of protective clothing, d) Access into and exit out controlled areas, e) ALARA criterion. An examples is the project ACEWO. A training program based on Virtual Reality systems with simulations of procedures in which the operators could receive high doses. In this way, the operation time and dose could be minimised according to the ALARA criterion owing to the ability of repeating the exercise, or the work, as many times as be necessary, like project CIPRES. Iberinco has been developed an educational CD multimedia on nuclear energy and the protection measures foreseen in the emergency plans for the Spanish Civil Protection Agency, with the aim of being distributed to all the schools placed near a nuclear power plant. (Author) 4 refs

  9. [The real-world effectiveness of personal protective equipment and additional risks for workers' health].

    Science.gov (United States)

    Denisov, É I; Morozova, T V; Adeninskaia, E E; Kur'erov, N N

    2013-01-01

    The effectiveness of personal protective equipment (PPE) of hearing, respiratory organs and hands is considered. It is shown that real effect of PPE is twice lower than declared by supplier; this presumes some derating system. The aspects of discomfort and additional risks are analyzed. The hygienic and physiologic evaluation of PPE is required along with elaboration of an official document (OSH standard or sanitary regulation) on selection, personal fit, organization of use and individual training of workers and their motivation.

  10. Perceived difficulty in use of everyday technology in persons with acquired brain injury of different severity: a comparison with controls.

    Science.gov (United States)

    Fallahpour, Mandana; Kottorp, Anders; Nygård, Louise; Lund, Maria Larsson

    2014-07-01

    To compare the perceived difficulty in use of everyday technology in persons with acquired brain injury with different levels of severity of disability with that of controls. This comparison study recruited 2 samples of persons with acquired brain injury and controls, comprising a total of 161 participants, age range 18-64 years. The long and short versions of the Everyday Technology Use Questionnaire and the Extended Glasgow Outcome Scale were used to evaluate participants. Persons with acquired brain injury demonstrated lower mean levels of perceived ability in use of everyday technology than controls (F = 21.84, degrees of freedom = 1, p technology between persons with severe disability and good recovery, between persons with severe disability and controls, and between persons with moderate disability and controls. No significant mean difference was found between persons with severe disability and moderate disability, between persons with moderate disability and good recovery, and between persons with good recovery and controls. Perceived difficulty in using everyday technology is significantly increased among persons with acquired brain injury with severe to moderate disability compared with controls. Rehabilitation services should consider the use of everyday technology in order to increase participation in everyday activities after acquired brain injury.

  11. The Columbia River Protection Supplemental Technologies Quality Assurance Project Plan

    International Nuclear Information System (INIS)

    Fix, Anne

    2007-01-01

    The U.S. Department of Energy (DOE) has conducted interim groundwater remedial activities on the Hanford Site since the mid-1990s for several groundwater contamination plumes. DOE established the Columbia River Protection Supplemental Technologies Project (Technologies Project) in 2006 to evaluate alternative treatment technologies. The objectives for the technology project are as follows: develop a 300 Area polyphosphate treatability test to immobilize uranium, design and test infiltration of a phosphate/apatite technology for Sr-90 at 100-N, perform carbon tetrachloride and chloroform attenuation parameter studies, perform vadose zone chromium characterization and geochemistry studies, perform in situ biostimulation of chromium studies for a reducing barrier at 100-D, and perform a treatability test for phytoremediation for Sr-90 at 100-N. This document provides the quality assurance guidelines that will be followed by the Technologies Project. This Quality Assurance Project Plan is based on the quality assurance requirements of DOE Order 414.1C, Quality Assurance, and 10 CFR 830, Subpart A--Quality Assurance Requirements as delineated in Pacific Northwest National Laboratory?s Standards-Based Management System. In addition, the technology project is subject to the Environmental Protection Agency (EPA) Requirements for Quality Assurance Project Plans (EPA/240/B-01/003, QA/R-5). The Hanford Analytical Services Quality Assurance Requirements Documents (HASQARD, DOE/RL-96-68) apply to portions of this project and to the subcontractors. HASQARD requirements are discussed within applicable sections of this plan.

  12. HEALTH RECORDS AND INFORMATION TECHNOLOGY IN SUPPORT OF EXCHANGE OF HEALTH INFORMATION

    Directory of Open Access Journals (Sweden)

    Jordan Deliversky

    2017-05-01

    Full Text Available The exchange of health information in conditions directly related to electronic environment is referred as health information technology. Usually the protection of personal health related data is comprised of various elements such as ways of information usage and access to sensitive health information. The protection of individually identifiable health information is possible with combination of measures. Protective measures include administrative, technical and physical elements. Through such protective measures is possible to ensure confidentiality, integrity and availability of the information, while at the same time could be guaranteed the prevention of unauthorized access. Sensitive records usually contain personal health information. Personal medical data requires high level of protection, as its content includes medical condition or diagnosis, where unauthorized access could have negative impact on one’s personal and professional life.

  13. Correlates of in-person and technology-facilitated sexual harassment from an online survey among young Australians.

    Science.gov (United States)

    Douglass, Caitlin H; Wright, Cassandra J C; Davis, Angela C; Lim, Megan S C

    2018-06-01

    Background: Technology-facilitated sexual harassment is an emerging phenomenon. This study investigates correlates of sexual harassment among young Australians. Methods: Participants aged 15-29 were recruited for an online survey. Participants reported how often in the past year they experienced sexual harassment in person, via phone, social media and dating apps. Correlates of in-person and technology-facilitated sexual harassment were identified using logistic regression. Results: Of all participants (n=1272, 70% female), two-thirds reported sexual harassment in person, 34% through social media and 26% via phone. Of participants who used a dating app in the past year (n=535), 57% experienced sexual harassment. Sexual harassment in person was correlated with being female (aOR=9.2, CI=6.9-12.2), trans and gender diverse (aOR=2.6, CI=1.2-5.7) and being aged 20-24 years (aOR=1.5, CI=1.1-2.1). Heterosexual identity reduced the odds of sexual harassment in person (aOR=0.7, CI=0.5-0.9). Technology-facilitated sexual harassment was correlated with female (aOR=3.5, CI=2.6-4.6) and trans and gender diverse identities (aOR=3.0, CI=1.4-6.5). Older age [25-29 years (aOR=0.5, CI=0.4-0.8)] and heterosexual identity (aOR=0.7, CI=0.5-0.9) significantly reduced the odds of technology-facilitated sexual harassment. Conclusion: Young people identifying as female, trans and gender diverse and non-heterosexual are at risk of in-person and technology-facilitated sexual harassment. Service and technology providers, academics, and policy makers must respond with innovative strategies.

  14. A personal history: Technology to energy strategy

    International Nuclear Information System (INIS)

    Starr, C.

    1995-01-01

    This personal history spans a half century of participation in the frontiers of applies science and engineering ranging from the nuclear weapons project of World War II, through the development of nuclear power, engineering education, and risk analysis, to today's energy research and development. In each of these areas, this account describes some of the exciting opportunities for technology to contribute to society's welfare, as well as the difficulties and constraints imposed by society's institutional and political systems. The recounting of these experiences in energy research and development illustrates the importance of embracing social values, cultures, and environmental views into the technologic design of energy options. The global importance of energy in a rapidly changing and unpredictable world suggests a strategy for the future based on these experiences which emphasizes the value of applied research and development on a full spectrum of potential options

  15. Privacy and data protection: Legal aspects in the Republic of Macedonia

    Directory of Open Access Journals (Sweden)

    Nora Osmani

    2016-07-01

    Full Text Available The purpose of this paper is to present a theoretical assessment of the existing Law on Personal Data Protection in the Republic of Macedonia. The paper aims to analyse whether there is a need for additional legal tools in order to achieve a balance between maintaining data integrity in the digital age and the use of modern technology. The paper discusses the meaning of “information privacy” in the age of big data, cyber threats and the domestic and international response to these issues. Special focus is dedicated to privacy policy enforcement in European Union Law. Having regard to the development of new technologies, prevailing data protection legislation may no longer be able to provide effective protection for individuals’ personal information. Therefore, existing laws should be continuously adapted to respond to new challenges and situations deriving from different online activities and communications.

  16. CLIQ. A new quench protection technology for superconducting magnets

    NARCIS (Netherlands)

    Ravaioli, Emanuele

    2015-01-01

    CLIQ, the Coupling-Loss Induced Quench system, is a new method for protecting superconducting magnets after a sudden transition to the normal state. It offers significant advantages over the conventional technology due to its effective mechanism for heating the superconductor relying on coupling

  17. CLIQ. A new quench protection technology for superconducting magnets

    CERN Document Server

    Ravaioli, Emmanuele; ten Kate, H H J

    CLIQ, the Coupling-Loss Induced Quench system, is a new method for protecting superconducting magnets after a sudden transition to the normal state. It offers significant advantages over the conventional technology due to its effective mechanism for heating the superconductor relying on coupling loss and its robust electrical design, which makes it more reliable and less interfering with the coil winding process. The analysis of the electro-magnetic and thermal transients during and after a CLIQ discharge allows identifying the system parameters that affect the system performance and defining guidelines for implementing this technology on coils of various characteristics. Most existing superconducting magnets can be protected by CLIQ as convincingly shown by test results performed on magnets of different sizes, superconductor types, geometries, cables and strand parameters. Experimental results are successfully reproduced by means of a novel technique for modeling non-linear dynamic effects in superconducting...

  18. Guidance on the use of protective lead aprons in medical radiology protection efficiency and correction factors for personal dosimetry

    International Nuclear Information System (INIS)

    Franken, Y.

    2002-01-01

    Workers in clinical radiology wear lead aprons when standing in the vicinity of a patient being exposed to x-rays. A lead apron protects the person's trunk against radiation scattered rom the patient. Our research is focused on two main issues: 1. How much protection does a lead apron provide, and what are the main factors that determine the protection efficiency 2. How can measured badge dose be translated into a realistic estimate of the effective dose, and how does this depend on dosemeter placement Using a model for x-ray shielding and dosimetry we calculated equivalent organ doses and personal depth dose HP(10) for various exposure conditions, x-ray energies and types of aprons that occur in clinical practice. We concluded that apron model and fit are often more important than lead thickness. In others, increasing lead thickness of a badly chosen apron will not provide better protection. For many fluoroscopy applications an apron of good model and fit need not be thicker than 0.5 mm of lead (equivalent). In case of intensive and frequent interventional work lead we advise higher lead thickness (0.35 mm), and preferably additional neck shielding for protection of the oesophagus and thyroid. A well chosen lead apron reduces effective dose by 75%up to 90%. We also concluded that the dosemeter badge should always be worn outside the apron, at mid front of collar or chest. In our view this dosemeter position enables reliable evaluation of effective dose from badge readings. As a standard practice we recommend translating measured badge dose to effective dose by dividing by a factor of five, provide that the worker wears a suitable lead apron. Finally, some research was done on the subject of the protective effect of lead aprons for the uterus, and the relation of uterus dose and badge dose. Use of a lead apron is found to reduce uterus dose by a factor of 5 to 10. Our study shows that in case of worker pregnancy, exposure of the unborn child may de adequately

  19. Promoting fluoroscopic personal radiation protection equipment: unfamiliarity, facts and fears

    International Nuclear Information System (INIS)

    Balter, Stephen

    2017-01-01

    An incomplete understanding of risk can cause inappropriate fear. Personal protective equipment (PPE) offered for the prevention of brain cancer in interventional fluoroscopists (IR-PPE). Similar items are offered for cell-phone use (RF-PPE). Publications on fluoroscopy staff brain cancer and similar papers on cell-phone induced brain cancer were reviewed. An internet safety product search was performed, which resulted in many tens of thousands of hits. Vendor claims for either ionizing radiation or radio frequency products seldom addressed the magnitude of the risk. Individuals and institutions can buy a wide variety of safety goods. Any purchase of radioprotective equipment reduces the funds available to mitigate other safety risks. The estimated cost of averting an actuarial fatal brain cancer appears to be in the order of magnitude $10 000 000-$100 000 000. Unwarranted radiation fears should not drive the radiation protection system to the point of decreasing overall safety. (authors)

  20. Priorities in radiation protection. Propositions for a better protection of persons against the danger of ionizing radiations. Report of the Vrousos commission

    International Nuclear Information System (INIS)

    2004-03-01

    this report presents priorities for actions and recommendations on subjects such communication, information, education, and also research, monitoring of technological development, expertise or giving users more responsibility. these recommendations are given with actions propositions on field of workers radiation protection or patients protection or radioactive sources management. (N.C.)

  1. Technologies for developing an advanced intelligent ATM with self-defence capabilities

    Science.gov (United States)

    Sako, Hiroshi

    2010-01-01

    We have developed several technologies for protecting automated teller machines. These technologies are based mainly on pattern recognition and are used to implement various self-defence functions. They include (i) banknote recognition and information retrieval for preventing machines from accepting counterfeit and damaged banknotes and for retrieving information about detected counterfeits from a relational database, (ii) form processing and character recognition for preventing machines from accepting remittance forms without due dates and/or insufficient payment, (iii) person identification to prevent machines from transacting with non-customers, and (iv) object recognition to guard machines against foreign objects such as spy cams that might be surreptitiously attached to them and to protect users against someone attempting to peek at their user information such as their personal identification number. The person identification technology has been implemented in most ATMs in Japan, and field tests have demonstrated that the banknote recognition technology can recognise more then 200 types of banknote from 30 different countries. We are developing an "advanced intelligent ATM" that incorporates all of these technologies.

  2. Personalized medicine and access to genetic technologies.

    Science.gov (United States)

    den Exter, André

    2010-01-01

    Personalized medicine started after the Human Genome Project and is a relatively new concept that will dramatically change clinical practice. It offers clear clinical advantages by applying genetic diagnostic tests and then treating the patient with targeted medicines based on his or her genetic make-up. Its potential seems promising but there are quite a few legal concerns. One of these questions deals with the right to health care and access to genetic technologies. In this paper, the author explains the meaning of such a right to health care under international human rights law, its relevance for making genetic services eligible for public funding, how to cope with quality concerns of commercial testing, and finally, the patentability controversy and clinical access to genetic information. Apart from more traditional human rights concerns (consent, privacy, confidentiality) and genetics, States should be aware of the meaning of the equal access concept under international law and its consequences when introducing new technologies such genetic testing and services.

  3. Safety of nursing staff and determinants of adherence to personal protective equipment

    OpenAIRE

    Neves,Heliny Carneiro Cunha; Souza,Adenícia Custódia Silva e; Medeiros,Marcelo; Munari,Denize Bouttelet; Ribeiro,Luana Cássia Miranda; Tipple,Anaclara Ferreira Veiga

    2011-01-01

    A qualitative study conducted in a teaching hospital with 15 nursing professionals. Attempted to analyze the reasons, attitudes and beliefs of nursing staff regarding adherence to personal protective equipment. Data were collected through focus groups, analyzed by the method of interpretation of meanings, considering Rosenstock’s model of health beliefs as a reference framework. Data revealed two themes: Occupational safety and Interpersonal Relationship. We identified several barriers that i...

  4. "Insensitive" to touch: fabric-supported lubricant-swollen polymeric films for omniphobic personal protective gear.

    Science.gov (United States)

    Damle, Viraj G; Tummala, Abhishiktha; Chandrashekar, Sriram; Kido, Cassidee; Roopesh, Ajay; Sun, Xiaoda; Doudrick, Kyle; Chinn, Jeff; Lee, James R; Burgin, Timothy P; Rykaczewski, Konrad

    2015-02-25

    The use of personal protective gear made from omniphobic materials that easily shed drops of all sizes could provide enhanced protection from direct exposure to most liquid-phase biological and chemical hazards and facilitate the postexposure decontamination of the gear. In recent literature, lubricated nanostructured fabrics are seen as attractive candidates for personal protective gear due to their omniphobic and self-healing characteristics. However, the ability of these lubricated fabrics to shed low surface tension liquids after physical contact with other objects in the surrounding, which is critical in demanding healthcare and military field operations, has not been investigated. In this work, we investigate the depletion of oil from lubricated fabrics in contact with highly absorbing porous media and the resulting changes in the wetting characteristics of the fabrics by representative low and high surface tension liquids. In particular, we quantify the loss of the lubricant and the dynamic contact angles of water and ethanol on lubricated fabrics upon repeated pressurized contact with highly absorbent cellulose-fiber wipes at different time intervals. We demonstrate that, in contrast to hydrophobic nanoparticle coated microfibers, fabrics encapsulated within a polymer that swells with the lubricant retain the majority of the oil and are capable of repelling high as well as low surface tension liquids even upon multiple contacts with the highly absorbing wipes. The fabric supported lubricant-swollen polymeric films introduced here, therefore, could provide durable and easy to decontaminate protection against hazardous biological and chemical liquids.

  5. Is prevention of acute pesticide poisoning effective and efficient, with Locally Adapted Personal Protective Equipment? A randomized crossover study among farmers in Chitwan, Nepal

    DEFF Research Database (Denmark)

    Varma, Anshu; Neupane, Dinesh; Bonde, Jens Peter Ellekilde

    2016-01-01

    Background: Farmers' risk of pesticide poisoning can be reduced with personal protective equipment but in low-income countries farmers' use of such equipment is limited. Objective: To examine the effectiveness and efficiency of Locally Adapted Personal Protective Equipment to reduce organophosphate...... exposure among farmers. Methods: In a crossover study, 45 male farmers from Chitwan, Nepal, were randomly allocated to work as usual applying organophosphate pesticides wearing Locally Adapted Personal Protective Equipment or Daily Practice Clothing. For seven days before each experiment, each farmer.......08; 0.06]. Wearing the Locally Adapted Personal Protective Equipment versus Daily Practice Clothing gave the following results, respectively: comfort 75.6% versus 100%, sense of heat 64.4% versus 31.3%, other problems 44.4% versus 33.3%, like-ability 95.6% versus 77.8%. Conclusion: We cannot support...

  6. Digital Technologies Supporting Person-Centered Integrated Care – A Perspective

    Directory of Open Access Journals (Sweden)

    John Øvretveit

    2017-09-01

    Full Text Available Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning “digitalisation” of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care.

  7. Digital Technologies Supporting Person-Centered Integrated Care – A Perspective

    Science.gov (United States)

    2017-01-01

    Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning “digitalisation” of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care. PMID:29588629

  8. Non-conventional personal dosimetry techniques

    International Nuclear Information System (INIS)

    Regulla, D.F.

    1984-01-01

    Established dosimetry has achieved a high standard in personnel monitoring. This applies particularly to photon dosimetry. Nevertheless, even in photon dosimetry, improvements and changes are being made. The reason may be technological progress, or the introduction of new tasks on the basis of the recommendations of international bodies (e.g. the new ICRU measurement unit) of national legislation. Since we are restricting ourselves here to technical trends the author would like to draw attention to various activities of current interest, e.g. the computation of receptor-related conversion coefficients from personal dose to organ or body doses, taking into account the conditions of exposure with respect to differential energy and angular distribution of the radiation field. Realistic data on exposure geometry are taken from work place analyses. Furthermore, the data banks of central personal dosimetry services are subject to statistical evaluation and radiation protection trend analysis. Technological progress and developments are considered from the point of view of personal dosimetry, partial body or extremity dosimetry and accidental dosimetry

  9. Sustainable Product: Personal Protective Equipment Manufactured with Green Plastic

    Directory of Open Access Journals (Sweden)

    Hamilton Aparecido Boa Vista

    2015-04-01

    Full Text Available This study analyzed the case of manufacturing of Personal Protective Equipment (PPE using as raw material biopolymers produced from ethanol from sugar cane, known as green polypropylene, produced since 2008 by BRASKEM. This article studied the PPE for the employee’s head protection, named helmet by NR 6, which is used in situations of exposure to weather and work scenarios in places where there is risk of impact from falling or projecting objects, burns, electric shock, and solar radiation. The MSA, green helmet manufacturer, made an inventory of greenhouse gas emissions into the atmosphere by comparing the two manufacturing processes of the helmet shell, covering the January 1 to December 31, 2011 period. It concluded that the sustainable helmet (green polyethylene and pigments robs 231g of CO2 from the atmosphere per produced unit, while the helmet’s production with traditional raw materials (polyethylene and petrochemical pigments found that, for each unit produced, 1029g of CO2 are emitted into the atmosphere. The study showed that substitution of raw materials has led to reduction in the impact generated in the helmets’ production.

  10. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  11. The Use of DLP-systems for the Protection of Personal Data

    Directory of Open Access Journals (Sweden)

    I. S. Boridko

    2012-12-01

    Full Text Available The issues of the principal possibility of the application of DLP-systems (Data Leak Prevention System for the protection of personal data are considered. Approaches of Russian company SecurIT for the prevention of leakage of information through the connected devices and network channels (Zlock system and Zgate system are analyzed. Advantages of Zgate system are revealed, which allows to increase the efficiency of detection of confidential data with the average 60—70 % for existing DLP-systems up to 95 % of the Zgate.

  12. Personal Professional Development Efforts Scale for Science and Technology Teachers Regarding Their Fields

    Science.gov (United States)

    Bilgin, Aysegül; Balbag, Mustafa Zafer

    2016-01-01

    This study has developed "Personal Professional Development Efforts Scale for Science and Technology Teachers Regarding Their Fields". Exploratory factor analysis of the scale has been conducted based on the data collected from 200 science and technology teachers across Turkey. The scale has been observed through varimax rotation method,…

  13. Perception and personal protective measures toward mosquito bites by communities in Jaffna District, northern Sri Lanka.

    Science.gov (United States)

    Surendran, S N; Kajatheepan, A

    2007-06-01

    Mosquito-borne diseases are of public health importance in war-torn northern Sri Lanka. The severity of mosquito bites and attitudes of the public toward mosquito problems were investigated using a structured questionnaire among communities in 3 administrative divisions in Jaffna District. One hundred fifty-four households were interviewed during this study. Sixty-four percent of the respondents reported that the mosquito problem was severe in their localities. Fifty-two percent stated that mosquito-biting activity was severe in the evening (1500 h-1900 h), 41% at night (after 1900 h), and 7% throughout the day. Severity of mosquito menace was found to have no association with type of house construction. Seventy-seven percent were able to name at least 1 disease transmitted by mosquitoes. Statistical analysis showed no association between education level and public awareness on mosquito-borne diseases. Nearly 88% were able to identify at least a breeding source of mosquitoes and most of them practice measures to eliminate suitable environments for mosquito breeding. Ninety-six percent used personal protective measures against mosquito bites during some seasons or throughout the year. Mosquito coils were the most commonly used personal protective method followed by bed nets. The monthly expenditure for personal protective measures varied from US$0.19 (LKR 20) to US$3.40 (LKR 350).

  14. Increasing the Usage of Personal Protective Equipments in Constructing Subway Stations: An Application of Social Marketing Model

    Directory of Open Access Journals (Sweden)

    M Shams

    2013-10-01

    Full Text Available Abstract Background & aim: Although the relationship between the use of personal protective equipment and the reduction of workplace injuries is well-known the use of these devices during operation by the staff is not so desirable. This study was based on a model of social marketing interventions to increase the use of safety devices and personal protection on the subway-station staff. Methods: The present quasi-experimental study was based on the results of a formative research consisted of a qualitative (exploring employees’ views through focus group discussions and a quantitative study (measuring attitudes and behaviors by questionnaire and checklist. Based on the formative research findings, a free package includes a helmet with a label containing the message, an anti-cut safety gloves, a dust mask, and an educational pamphlet were delivered to intervention group. After four weeks, the check list of observational behaviors in two constructing stations was completed and the results were compared with before intervention. The data were analyzed by paired t-test, t-test and logistic regression. Results: Three common behaviors were observed among staff not using caps, masks and gloves. The odds ratio for helmet and mask usage in the intervention group was more than other groups. After the intervention, the use of safety helmets and masks significantly increased (p < 0.05. The odds ratio for the use of helmets and masks after intervention in the intervention group was significantly higher than other groups (p < 0.05. Conclusion: The experimental basis of the safety devices and personal protection needs and demands of the audience, material and immaterial costs of the equipment, supplies, and promoting their use in the right place, can encourage the staff to continuously use the safety devices at workplace. Key Words: Workplace, Injuries, Personal Protective Equipment, Social Marketing

  15. Radiation protection

    International Nuclear Information System (INIS)

    Kamalaksh Shenoy, K.

    2013-01-01

    Three main pillars underpin the IAEA's mission: Safety and Security - The IAEA helps countries to upgrade their infrastructure for nuclear and radiation safety and security, and to prepare for and respond to emergencies. Work is keyed to international conventions, the development of international standards and the application of these standards. The aim is to protect people and the environment from the harmful effects of exposure to ionizing radiation. Science and Technology - The IAEA is the world's focal point for mobilizing peaceful applications of nuclear science and technology for critical needs in developing countries. The work contributes to alleviating poverty, combating disease and pollution of the environment and to other goals of sustainable development. Safeguards and Verification - The IAEA is the nuclear inspectorate, with more than four decades of verification experience. Inspectors work to verify that nuclear material and activities are not diverted towards military purposes. Quantities and Units: Dose equivalent is the product of absorbed dose of radiation and quality factor (Q). For absorbed dose in rads, dose equivalent is in rems. If absorbed dose is in gray, the dose equivalent is in sievert. Quality factor is defined without reference to any particular biological end point. Quality factors are recommended by committees such as the International Commission on Radiological Protection (ICRP) or the National Council on Radiation Protection and Measurements (NCRP), based on experimental RBE values but with some judgment exercised. Effective Dose Equivalent: It is the sum of the weighted dose equivalents for all irradiated tissues, in which the weighting factors represent the different risks of each tissue to mortality from cancer and hereditary effects. Committed dose equivalent: It is the integral over 50 years of dose equivalent following the intake of a radionuclide. Collective effective dose equivalent: It is a quantity for a population and is

  16. Control and prevention of healthcare-associated tuberculosis: the role of respiratory isolation and personal respiratory protection.

    Science.gov (United States)

    Humphreys, H

    2007-05-01

    Although the prevalence of tuberculosis continues to decline in most developed countries, the risk of healthcare-associated tuberculosis, remains for patients or healthcare staff. Outbreaks of healthcare-associated tuberculosis are usually associated with delays in diagnosis and treatment, or the care of patients in sub-optimal facilities. The control and prevention of tuberculosis in hospitals is best achieved by three approaches, namely administrative (early investigation diagnosis, etc.), engineering (physical facilities e.g. ventilated isolation rooms) and personal respiratory protection (face sealing masks which are filtered). Recent guidelines on the prevention of tuberculosis in healthcare facilities from Europe and the USA have many common themes. In the UK, however, negative pressure isolation rooms are recommended only for patients with suspected multi-drug resistant TB and personal respiratory protection, i.e. filtered masks, are not considered necessary unless multi-drug resistant TB is suspected, or where aerosol-generating procedures are likely. In the US, the standard of care for patients with infectious tuberculosis is a negative pressure ventilated room and the use of personal respiratory protection for all healthcare workers entering the room of a patient with suspected or confirmed tuberculosis. The absence of clinical trials in this area precludes dogmatic recommendations. Nonetheless, observational studies and mathematical modelling suggest that all measures are required for effective prevention. Even when policies and facilities are optimal, there is a need to regularly review and audit these as sometimes compliance is less than optimal. The differences in recommendations may reflect the variations in epidemiology and the greater use of BCG vaccination in the UK compared with the United States. There is a strong argument for advising ventilated facilities and personal respiratory protection for the care of all patients with tuberculosis, as

  17. The personal dosimetry in Mexico

    International Nuclear Information System (INIS)

    Salazar, M.A.

    2006-01-01

    The Personal Dosimetry in Mexico, has an approximately 30 year-old history; and it had been and it is at the moment, one of the more important resources with which the personnel that works with ionizing radiation sources counts for its protection. The Personal Dosimetry begins with the film dosimetry, technique that even continues being used at the present time by some users, and the main reason of its use is for economic reasons. At the moment this technique, it has been surpassed, by the Thermoluminescent dosimetry, which has taken a lot of peak, mainly by the technological development with which it is counted at the present time; what has given as a result that this technique becomes tip technology; that supported in the characteristic of the used materials, as the handling and processing of the information associated with the new PC, digitizer cards, software etc, what has allowed increases it potential. In this work the current necessities of the market are presented as well as an analysis of the future real necessities in Mexico, at national level, the companies that provide this service and that they spread to satisfy this necessity of the market, including the different used technologies are also mentioned. The application ranges, at the same time, of the advantages and disadvantages of the different systems of Personal Dosimetry in the market. The companies that at the moment provide the service of Personal Dosimetry, its use materials and equipment in indistinct form, for the monitoring of gamma radiation, beta particles, different qualities of x-ray radiation, and sometimes neutrons. The monitoring of the exposed personnel at the diverse sources of ionizing radiation mentioned is carried out in many occasions without having with the materials (detectors), neither the appropriate infrastructure and therefore without the quality control that guarantees a correct evaluation of the dose equivalent, as a result of the exposure to the ionizing radiations; it

  18. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  19. NCTA v. FCC - Do Commercial Free Speech Justifications Trump Consumers' Personal Data Protection Rights? Answer To Shape Mobile Advertising Industry

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix; King, Nancy J.

    2010-01-01

    telecommunication carriers' personal data sharing practices in order to protect their customers' data privacy when the regulation restricts use of the data for marketing purposes. In this case National Cable and Telecommunications Association (NCTA) challenged a new Federal Communications Commission (FCC) rule...... requiring carriers to obtain customers' advance approval before releasing their telephone record information for marketing purposes. NCTA claimed the FCC's new opt-in rule violates companies' First Amendment right to engage in commercial speech. At stake in this appeal was the constitutionally required...... balance between protecting consumers' information privacy in an era of pervasive data processing and protecting the rights of marketers to engage in protected commercial free speech that involves using customers' personal information. A ruling against the FCC would have limited the use of government...

  20. Risk and protective factors of different functional trajectories in older persons : Are these the same?

    NARCIS (Netherlands)

    Kempen, G.I.; Ranchor, A.V.; van Sonderen, E.; van Jaarsveld, C.H.; Sanderman, R.

    We examined whether risk and protective factors of different functional trajectories were the same in 1,765 Dutch older persons. We assessed disability in 1993 and reassessed it in 2001. For 2001 as compared with 1993, we distinguished three trajectory groups: substantially poorer, somewhat poorer,

  1. Periodic inspections of lightning protection systems in intermediate storage facilities of nuclear technological plants

    International Nuclear Information System (INIS)

    Witzel, Andre; Schulz, Olav

    2013-01-01

    Especially for nuclear technological plants, periodic inspections of lightning protection systems are of great importance. This article shows the sequence of maintenance programs using the examples of the intermediate storage facilities of the nuclear technological plants Grohnde and Unterweser as well as the central intermediate storage facility in Gorleben and gives a description of the extensive measures of inspecting the external and internal lightning protection and the global earth termination system.

  2. Liabilities of the competent person for radiation protection

    International Nuclear Information System (INIS)

    Bizet, A.

    2008-01-01

    The article R. 4456-1 of the Labour code requires employer to appoint a competent person for radiation protection (C.P.R.). Although the prerogatives of the CPR are exercised under the responsibility of the employer, the traditional rules of questioning the liability apply to the employer as well as to the C.P.R.. For the civil liability, the object of which is to guarantee the compensation of damage by its author, but also for the criminal liability, which aims at punishing an illegal behaviour, the C.P.R. does not escape these traditional rules which, however, apply in a particular way considering the daily missions of the C.P.R.. If the responsibility of the employer is more questioned, notably because of the authority he/she exercises on his/her employee, the C.P.R. must not be considered as irresponsible regarding civil and penal requirements; the C.P.R. may indeed be questioned by an employee victim of damage. The activity of the C.P.R. (and thus the cases allowing the questioning of its liability) rests widely on the means which it has and the context in which it discharges its missions. Moreover the judge does take into account the resources which an agent has to judge his responsibility. Thus, the relations of the C.P.R. with other actors of the radiation protection, internal or external in the establishment, are determining. (author)

  3. The role of personal and competent approach onto health-preserving technologies at the conditions of higher educational institution

    Directory of Open Access Journals (Sweden)

    Kamaiev O.I.

    2012-03-01

    Full Text Available The impact of personal and competent approach onto effectiveness of health-forming and health-preserving technologies in higher educational institution conditions was demonstrated. The substance of personal and competent approaches was disclosed. 54 female students took part in the research, from them - 28 in experimental and 26 in control group. It was ascertained that personal oriented approach provide for change of teacher's role and technology of teaching within educational process. Competent approach enables to reorient the teaching technology from the process to the result of education. Educational process gains the active and creative nature by introduction of mentioned approaches.

  4. Draft guidance notes for the protection of persons against ionising radiations arising from veterinary use

    International Nuclear Information System (INIS)

    1983-01-01

    These guidance notes have been prepared for those who use ionising radiation for diagnostic purposes in veterinary practice, either in private practices or in larger institutions. Ancillary activities such as the testing and calibration of equipment are also covered by these notes so far as they are carried out on the same premises. The guidance notes indicate procedures for the protection of all persons who may be exposed as a result of these practices, that is to say all employed and self-employed persons, apprentices and students, and members of the public. (author)

  5. Protecting and Evaluating Genomic Privacy in Medical Tests and Personalized Medicine

    OpenAIRE

    Ayday, Erman; Raisaro, Jean Louis; Rougemont, Jacques; Hubaux, Jean-Pierre

    2013-01-01

    In this paper, we propose privacy-enhancing technologies for medical tests and personalized medicine methods that use patients' genomic data. Focusing on genetic disease-susceptibility tests, we develop a new architecture (between the patient and the medical unit) and propose a "privacy-preserving disease susceptibility test" (PDS) by using homomorphic encryption and proxy re-encryption. Assuming the whole genome sequencing to be done by a certified institution, we propose to store patients' ...

  6. Fire-Protection Research for Energy-Technology Projects: FY 1981 year-end report

    Energy Technology Data Exchange (ETDEWEB)

    Hasegawa, H.K.; Alvares, N.J.; Lipska-Quinn, A.E.; Beason, D.G.; Foote, K.L.; Priante, S.J.

    1982-07-20

    This report summarizes research conducted in fiscal year 1981 for the DOE-supported project, Fire Protection Research for Energy Technology Projects. Initiated in 1977, this ongoing research program was conceived to advance fire protection strategies for Energy Technology Projects to keep abreast of the unique fire problems that are developing with the complexity of energy technology research. We are developing an analytical methodology through detailed study of fusion energy experiments at Lawrence Livermore National Laboratory (LLNL). Employing these facilities as models for methodology development, we are simultaneously advancing three major task areas: (1) determination of unique fire hazards of current fusion energy facilities; (2) evaluation of the ability of accepted fire management measures to meet and negate hazards; and (3) performance of unique research into problem areas we have identified to provide input into analytical fire-growth and damage-assessment models.

  7. Fire-Protection Research for Energy-Technology Projects: FY 1981 year-end report

    International Nuclear Information System (INIS)

    Hasegawa, H.K.; Alvares, N.J.; Lipska-Quinn, A.E.; Beason, D.G.; Foote, K.L.; Priante, S.J.

    1982-01-01

    This report summarizes research conducted in fiscal year 1981 for the DOE-supported project, Fire Protection Research for Energy Technology Projects. Initiated in 1977, this ongoing research program was conceived to advance fire protection strategies for Energy Technology Projects to keep abreast of the unique fire problems that are developing with the complexity of energy technology research. We are developing an analytical methodology through detailed study of fusion energy experiments at Lawrence Livermore National Laboratory (LLNL). Employing these facilities as models for methodology development, we are simultaneously advancing three major task areas: (1) determination of unique fire hazards of current fusion energy facilities; (2) evaluation of the ability of accepted fire management measures to meet and negate hazards; and (3) performance of unique research into problem areas we have identified to provide input into analytical fire-growth and damage-assessment models

  8. Marginalization of end-use technologies in energy innovation for climate protection

    Science.gov (United States)

    Wilson, Charlie; Grubler, Arnulf; Gallagher, Kelly S.; Nemet, Gregory F.

    2012-11-01

    Mitigating climate change requires directed innovation efforts to develop and deploy energy technologies. Innovation activities are directed towards the outcome of climate protection by public institutions, policies and resources that in turn shape market behaviour. We analyse diverse indicators of activity throughout the innovation system to assess these efforts. We find efficient end-use technologies contribute large potential emission reductions and provide higher social returns on investment than energy-supply technologies. Yet public institutions, policies and financial resources pervasively privilege energy-supply technologies. Directed innovation efforts are strikingly misaligned with the needs of an emissions-constrained world. Significantly greater effort is needed to develop the full potential of efficient end-use technologies.

  9. Use of remote video auditing to validate Ebola level II personal protective equipment competency.

    Science.gov (United States)

    Allar, Peter J; Frank-Cooper, Madalyn

    2015-06-01

    Faced with an Ebola-related mandate to regularly train frontline hospital staff with the donning and doffing of personal protective equipment, a community hospital's emergency department implemented remote video auditing (RVA) to assist in the training and remediation of its nursing staff. RVA was found to be useful in assessing performance and facilitating remediation. Copyright 2015, SLACK Incorporated.

  10. Fourth meeting of persons competent in radiation protection

    International Nuclear Information System (INIS)

    David, C.; Vidal, J.P.; Ammerich, M.; Feron, F.; Pasquier, J.L.; Lecomte, J.F.; Mansoux, H.; Menechal, Ph.; Briand-Champlong, J.; Gambini, D.J.; Bontemps, A.; Frobert, F.; Grandclaude, A.; Fraboulet, P.; Laporte, Ch.; Roussille, F.; Lahaye, Th.

    2005-01-01

    The different contributions are as follow: the landscape of radiation sources in France; decrees: general presentation; relation of the person competent in radiation protection (P.C.R.) with officials organisms: the part of the D.G.S.N.R.; relation of the P.C.R. with the official organisms: the part of I.R.S.N.; authorizations: industry, education, research; interlocutors of the P.C.R. in hospitals; enforcement of the decree relative to the training of the P.C.R. at the I.N.S.T.N.; the educational contribution of the P.C.R.; European equivalence of the P.C.R. synthesis of training, comparison to the French situation; P.C.R.: contribution, missions and means in the industrial medium; management of damaged situations by the P.C.R.: contribution of the training and the putting in position; coordination with the exterior companies and prevention plans out of I.N.B.; regulatory evolution. (N.C.)

  11. Facility for protection of technological, especially power assemblies

    International Nuclear Information System (INIS)

    Cichon, S.; Hahn, J.; Malatek, K.; Randak, O.; Vitovec, P.; Zidek, M.

    1987-01-01

    The facility consists of sensors producing analog signals, used as input information for the evaluation of process conditions or equipment failures. The sensors are fitted to partial functional parts of technological assemblies, such as nuclear reactors. The individual sensors are connected via unification converters to the respective protection units. The facility is resistant to breakdowns of the analog sensors and other components including the computer; it features the possibility of in-service failure detection and the capability of immediate regeneration following a failure. This capability prevents, with high probability, the production of non-accident failures of the technological assembly. The block diagram is described of the facility and its operation in the event of an emergency. (J.B.). 1 fig

  12. Training in radiation protection

    International Nuclear Information System (INIS)

    Schreiber, F.

    1998-01-01

    Persons who are exposed to ionizing radiation at their workplace have to be trained in radiation protection. According to the Radiation Protection Ordinance the person with responsibility in radiation protection has to guarantee that the training is performed twice a year. Our training material was created especially for the persons defined in the Radiation Protection Ordinance and the X-ray Ordinance. It enables persons who teach (generally the radiation protection officer) to perform the training without tedious study and preparation of the documents. Our material is not just another textbook for radiation protection but rather a folder with colour transparencies and explanatory texts which make a difference in volume and price in comparison to other existing materials. (orig.) [de

  13. Developing Personalised Education for Personal Mobile Technologies with the Pluralisation Agenda

    Science.gov (United States)

    Kucirkova, Natalia; Littleton, Karen

    2017-01-01

    This paper makes a distinctive contribution to the current debates concerning the role of personal mobile technologies (PMTs) in public education. It does this through drawing attention to the imperative to integrate digitally-mediated personalised education with teacher-mediated pluralised education. Premised on the notion that children's…

  14. Training project on Radiological Protection in medicine. Use of new technologies

    International Nuclear Information System (INIS)

    Ruis-Cruces, R.; Perez-Martinez, M.; Pastor Vega, J. M.; Diez de los Rios Delgado, A.

    2003-01-01

    Radiological protection training addressed to physicians should start during the teaching graduate and postgraduate studies, and a third phase only for those physicians using X rays and radioactive sources in diagnosis and treatment of diseases. To show a training project addressed to the teaching graduate students based on the new technologies, such as web online and interactive CD-ROM. Development of a web-online including information in.pdf (adobe acrobat) format and additional tools (as data bases, videos, news and class meetings, FAQ, tutorials). Moreover, we propose to development an interactive CD-ROM which will be used as a practical tool to complete the obligatory subject on radiological protection in the University of Malaga (Spain). We show the preliminary phase of the project. The web-online is being developed with the Microsoft FrontPage software. The first version of the CR-ROM is being developed in html format. These tools based on new technologies will be a very important support for radiological protection training, which is recommended by International Organizations (EC Report R116 and IAE Action Plan 2002-2006). (Author) 4 refs

  15. CONCEPTUAL BASES OF FORMING THE SYSTEM OF FINANCIAL AND ECONOMIC PROVIDING SOCIAL PROTECTION INVOLUNTARILY DISPLACED PERSONS WITH CLUSTER APPROACH

    Directory of Open Access Journals (Sweden)

    Svitlana Kropelnytska

    2017-08-01

    Full Text Available The article systematizes approaches to financial support and social adaptation of internally displaced persons (IDPs as well as their social protection, that is based on the analysis of legal framework, situation and sources of financial and social support to the EU member states of the IDPs in Ukraine and their social security. The study of the IDPs situation and the assessment of the required resources are based on a cluster approach, which defines optimal set of problem areas requiring priority social and financial support. This allowed to develop practical recommendations for the development of a comprehensive, transparent and unified policy of social protection through the development of a conceptual framework for the financial and economic provision of social protection IDPs, which will be the basic solution to the problems of social and financial provision forced migrants in Ukraine. Key words: forced migrants, internally displaced persons, cluster, social policy, social protection, social providing, financial providing.

  16. Knowledge Management Systems as an Interdisciplinary Communication and Personalized General-Purpose Technology

    Directory of Open Access Journals (Sweden)

    Ulrich Schmitt

    2015-10-01

    Full Text Available As drivers of human civilization, Knowledge Management (KM processes have co-evolved in line with General-Purpose-Technologies (GPT, such as writing, printing, and information and communication systems. As evidenced by the recent shift from information scarcity to abundance, GPTs are capable of drastically altering societies due to their game-changing impact on our spheres of work and personal development. This paper looks at the prospect of whether a novel Personal Knowledge Management (PKM concept supported by a prototype system has got what it takes to grow into a transformative General-Purpose-Technology. Following up on a series of papers, the KM scenario of a decentralizing revolution where individuals and self-organized groups yield more power and autonomy is examined according to a GPT's essential characteristics, including a wide scope for improvement and elaboration (in people's private, professional and societal life, applicability across a broad range of uses in a wide variety of products and processes (in multi-disciplinary educational and work contexts, and strong complementarities with existing or potential new technologies (like organizational KM Systems and a proposed World Heritage of Memes Repository. The result portrays the PKM concept as a strong candidate due to its personal, autonomous, bottom-up, collaborative, interdisciplinary, and creativity-supporting approach destined to advance the availability, quantity, and quality of the world extelligence and to allow for a wider sharing and faster diffusion of ideas across current disciplinary and opportunity divides.

  17. Privacy Protection for Personal Health Device Communication and Healthcare Building Applications

    Directory of Open Access Journals (Sweden)

    Soon Seok Kim

    2014-01-01

    Full Text Available This paper proposes a new method for protecting patient privacy when communicating with a gateway which collects bioinformation through using personal health devices, a type of biosensor for telemedicine, at home and in other buildings. As the suggested method is designed to conform with ISO/IEEE 11073-20601, which is the international standard, interoperability with various health devices was considered. We believe it will be a highly valuable resource for dealing with basic data because it suggests an additional standard for security with the Continua Health Alliance or related international groups in the future.

  18. Testing the Utility of Person-Environment Correspondence Theory with Instructional Technology Students in Turkey

    Science.gov (United States)

    Perkmen, Serkan

    2012-01-01

    The main objective of this study was to examine the validity and usefulness of the person-environment correspondence theory with instructional technology students in Turkey. The participants included 211 students and three teachers. Results revealed that instructional technology students value achievement most and that they believe that entering a…

  19. The New Technologies in Mathematics: A Personal History of 30 Years

    Science.gov (United States)

    de la Villa, Agustín; García, Alfonsa; García, Francisco; Rodríguez, Gerardo

    2017-01-01

    A personal overview about the use of new technologies for teaching and learning mathematics is given in this paper. We analyse the introduction of Computer Algebra Systems with learning purposes, reviewing different frameworks and didactical resources, some of them generated according the philosophy of the European Area of Higher Education.…

  20. Privacy Protection in Personal Health Information and Shared Care Records

    Directory of Open Access Journals (Sweden)

    Roderick L B Neame

    2014-03-01

    Full Text Available Background The protection of personal information privacy has become one of the most pressing security concerns for record keepers. Many institutions have yet to implement the essential infrastructure for data privacy protection and patient control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring has led to the imposition of increasingly significant monetary penalties for failures to protect privacy. Objective  There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information.  This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy.  This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing.Requirements for Privacy  There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers to keep patient information confidential and to share it only with the authorisation of the patient.  To achieve this information storage and retrieval, and communication systems must be appropriately configured. Patients may consult clinicians anywhere and at any time: therefore their data must be available for recipient-driven retrieval under patient control and kept private. 

  1. PERSONA : a personalized data protection framework

    NARCIS (Netherlands)

    Egea, M.; Paci, F.; Petrocchi, M.; Zannone, N.; Fernández-Gago, C.; Martinelli, F.; Pearson, S.; Agudo, I.

    2013-01-01

    The European Directive on Data Protection recognizes the right of data subjects to control the usage of their information. However, to date there are no data protection solutions that involve data subjects in the definition and enforcement of data protection policies. In this paper we present the

  2. TECHNICAL AND TECHNOLOGICAL ASPECTS IN PLANT PROTECTION IN THE PRECISION FARMING SYSTEM

    Directory of Open Access Journals (Sweden)

    Mladen Jurišić

    2015-06-01

    Full Text Available The basic premise of precision farming as a larger amount of information is its availability to the farmer in making decision. Direct comparison of perennial parameters obtained from the plot results in purposefully, argumentative and optimal use of resources for work (while keeping in mind the ecological impact. Today, the development of satellite navigation technology and monitoring of agricultural machinery, and reducing the cost of these devices again revived the question of the precision agriculture application. Advanced farmers in developed agricultural countries already regularly apply some of the technological possibilities of precision farming. Precision agriculture and plant protection allow the farmer realizing high incomes while keeping safe natural resources. Using modern GIS technology machines collect data directly from the plot using sensors and integrate themselves into the data processing system. Processed information is used by a farmer taking GreenStar system for the new planned operation and achieving significant time and money spare. Precision agriculture offers the possibility of optimal care of each plant, not just the average, or the entire field. Low risk investments are one of the main factors of choice precise plant protection. The use of pilotless aircrafts remote sensing allow fast and economical obtaining data and sufficient precision information. Using modern technology such as Variable Rate Application (applying a variable volume and GreenStar software package it is possible to regulate the amount of care and protection.

  3. Privacy protection for personal health information and shared care records.

    Science.gov (United States)

    Neame, Roderick L B

    2014-01-01

    The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.

  4. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  5. An Analysis of Personal Technology Use by Service Members and Military Behavioral Health Providers.

    Science.gov (United States)

    Edwards-Stewart, Amanda; Smolenski, Derek J; Reger, Greg M; Bush, Nigel; Workman, Don E

    2016-07-01

    Personal technology use is ubiquitous in the United States today and technology, in general, continues to change the face of health care. However, little is known about the personal technology use of military service members and the behavioral health care providers that treat them. This study reports the technology use of 1,101 active duty service members and 45 behavioral health care providers at a large military installation. Participants reported Internet usage; ownership of smartphones, tablets, and e-readers; usage of mobile applications (apps); and basic demographic information. Compared with providers, service members reported higher rates of smartphone ownership, were more likely to own Android smartphones than iPhones, and spent more time gaming. Both groups spent a comparable amount of time using social media. With the exception of gaming, however, differences between service members and providers were not statistically significant when demographics were matched and controlled. Among service members, younger respondents (18-34) were statistically more likely than older respondents (35-58) to own smartphones, spend time gaming, and engage in social media. Our findings can help inform provider's technology-based education and intervention of their patients and guide the development of new technologies to support the psychological health of service members. Reprint & Copyright © 2016 Association of Military Surgeons of the U.S.

  6. Protection of occupants from exhaled infectious agents and floor material emissions in rooms with personalized and underfloor ventilation

    DEFF Research Database (Denmark)

    Cermak, Radim; Melikov, Arsen Krikor

    2007-01-01

    the concentration of exhaled air pollution increased in the room. The two types of personalized ventilation performed differently. Subsequent analyses of airborne infection transmission risk indicated that personalized ventilation could become a supplement to traditional methods of infection control....... of pollutants associated with exhaled air and floor material emissions was evaluated at various combinations of personalized and underfloor airflow rates. Compared to underfloor ventilation alone, personalized and underfloor ventilation provided excellent protection Of seated occupants from any pollution, while......The performance of two personalized. ventilation systems supplying air at the breathing zone was tested in conjunction with underfloor ventilation generating two different airflow patterns in a full-scale test room. Two breathing thermal manikins were used to simulate occupants. The distribution...

  7. Potential applications of smart clothing solutions in health care and personal protection.

    Science.gov (United States)

    Meinander, Harriet; Honkala, Markku

    2004-01-01

    The rapid development in the fields of sensor and telecommunication technologies has created completely new possibilities also for the textile and clothing field. New smart textile and clothing systems can be developed by integrating sensors in the textile constructions. Application fields for these added-value products are e.g. protective clothing for extreme environments, garments for the health care sector, technical textiles, sport and leisure wear. Some products have already been introduced on the markets, but generally it can be stated that the development is only in its starting phase, and the expectations for the future are big. Many different aspects have to be considered in the development of the wearable technology products for the health care sector: medical problems and their diagnosis, sensor choice, data processing and telecommunication solutions, clothing requirements. A functional product can be achieved only if all aspects work together, and therefore experts from all fields should participate in the RTD projects. In the EC-funded project DE3002 Easytex clothing and textiles for disabled and elderly people were investigated. Some recommendations concerning durability, appearance, comfort, service and safety of products for different special user groups were defined, based on user questionnaires and seminars, general textile and clothing requirements and on laboratory test series."Clothing Area Network--Clan" is a research project aiming to develop a technical concept and technology needed in enabling both wired and wireless data and power transfer between different intelligent modules (user interfaces, sensors, CPU's, batteries etc.) integrated into a smart clothing system. Fire-fighters clothing system is chosen as the development platform, being a very challenging application from which the developed technology can be transferred to other protective clothing systems.

  8. Search and seizure law; practical advice and interpretation for nuclear protective force persons

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-07-06

    Recent Supreme Court decisions, which interpret the 200-year-old Fourth Amendment of the US Constitution, are used to provide a brief overview of some search and seizure subjects important to management and officers responsible for physical protection of nuclear facilities. The overview is framed in practical terms in order to make the comments applicable to the everyday activity of nuclear-protective-force persons. The Supreme Court has described several exceptions where searches and seizures (arrests) are permitted without a warrant, despite the Fourth Amendment which states that warrants are always required. The seven exceptions briefly discussed are search incidents to a lawful arrest, the automobile-search exception, the suitcase or container exception, the hot-pursuit or emergency exception, the stop-and-frisk exception, the plain-view exception, and consent to be searched.

  9. Search and seizure law; practical advice and interpretation for nuclear protective force persons

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    Recent Supreme Court decisions, which interpret the 200-year-old Fourth Amendment of the US Constitution, are used to provide a brief overview of some search and seizure subjects important to management and officers responsible for physical protection of nuclear facilities. The overview is framed in practical terms in order to make the comments applicable to the everyday activity of nuclear-protective-force persons. The Supreme Court has described several exceptions where searches and seizures (arrests) are permitted without a warrant, despite the Fourth Amendment which states that warrants are always required. The seven exceptions briefly discussed are search incidents to a lawful arrest, the automobile-search exception, the suitcase or container exception, the hot-pursuit or emergency exception, the stop-and-frisk exception, the plain-view exception, and consent to be searched

  10. The challenges of everyday technology in the workplace for persons with acquired brain injury.

    Science.gov (United States)

    Kassberg, Ann-Charlotte; Prellwitz, Maria; Larsson Lund, Maria

    2013-07-01

    To explore and describe how persons with an acquired brain injury (ABI) managed the everyday technology (ET) that they needed to use in their workplace and how this use influences their opportunities to work. Nine persons with an ABI were interviewed and observed when managing ET in their workplace. The data were analysed qualitatively with a constant comparative method. The main category, "The challenge of managing ET in the workplace", consisted of three categories, all of which reflected different kinds of discrepancies between the participants' ability to manage ET and the demands that ET imposes on them in work: "Struggling with ET to be able to continue to work; "Depending on strategies to cope with ET to continue in a particular profession", and "Managing ET at work but concerned about keeping up with the changes". The result revealed discrepancies between the abilities of the persons with ABI to manage ET in relation to the demands that technology imposed on them in their work setting. This indicated that professionals need to consider the role of ET when designing interventions supporting a person's return to work after an ABI.

  11. What is good radiation protection?; Was ist guter Strahlenschutz?

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, B. [Lorenz Consulting, Essen (Germany)

    2016-07-01

    Radiation protection is based on the ICRP-System with its pillars justification, limitation and optimization. From this radiation protection should be the same irrespective of the application of radiation. But radiation protection in the nuclear industry is much different from the use of radiation sources or X-ray units. This is by far not due to the different technologies. It originates from the different interpretation of the system. For one person good radiation protection would mean to have no radiation exposures, to avoid radiation at all as best option and to use it only if there are no alternatives. For another person the best radiation protection would be the one which does not produce much efforts and costs. So what is reasonable? In reality the first interpretation prevails, at least in Germany. A change is needed. If we continue to exercise radiation protection as we do it today the beneficial application of radiation will be restricted unduly and might become impossible at all. A stronger orientation towards the naturally occurring radiation would help instead to regulate natural radiation in the same way as it is done for artificial radiation. The system of ICRP has to be changed fundamentally.

  12. Border malaria in China: knowledge and use of personal protection by minority populations and implications for malaria control: a questionnaire-based survey

    Directory of Open Access Journals (Sweden)

    Hill Nigel

    2008-10-01

    Full Text Available Abstract Background Malaria control in remote, forested areas of the Mekong region relies on personal protection from mosquito bites. Uptake of these methods may be limited by knowledge of the link between mosquitoes and malaria as well as social and economic aspects. Understanding barriers to uptake will inform malaria control programmes on targets for improvement of delivery. Methods A total 748 key respondents: health providers and village heads, from 187 villages and 25 different ethnic groups, were interviewed using structured questionnaires. Differences in use of personal protection, and knowledge of malaria between groups were analysed using chi-square; and binary logistic regression used for multivariate analysis. Results Malaria knowledge was poor with 19.4% of women and 37.5% of men linking mosquitoes with malaria, although 95.6% knew one or more methods of mosquito control. Virtually all respondents used personal protection at some time during the year; and understanding of malaria transmission was strongly associated with bednet use. Those working in forest agriculture were significantly more likely to know that mosquitoes transmit malaria but this did not translate into a significantly greater likelihood of using bednets. Furthermore, use of personal protection while woing outdoors was rare, and less than 3% of respondents knew about the insecticide impregnation of bednets. The use of bednets, synthetic repellents and mosquito coils varied between ethnic groups, but was significantly more frequent among those with higher income, more years of education and permanent housing. The reported use of repellents and coils was also more common among women despite their low knowledge of malaria transmission, and low likelihood of having heard information on malaria within the last year. Conclusion The use of personal protection must be increased, particularly among outdoor workers that have higher malaria risk. However, personal protection

  13. Border malaria in China: knowledge and use of personal protection by minority populations and implications for malaria control: a questionnaire-based survey.

    Science.gov (United States)

    Moore, Sarah J; Min, Xia; Hill, Nigel; Jones, Caroline; Zaixing, Zhang; Cameron, Mary M

    2008-10-01

    Malaria control in remote, forested areas of the Mekong region relies on personal protection from mosquito bites. Uptake of these methods may be limited by knowledge of the link between mosquitoes and malaria as well as social and economic aspects. Understanding barriers to uptake will inform malaria control programmes on targets for improvement of delivery. A total 748 key respondents: health providers and village heads, from 187 villages and 25 different ethnic groups, were interviewed using structured questionnaires. Differences in use of personal protection, and knowledge of malaria between groups were analysed using chi-square; and binary logistic regression used for multivariate analysis. Malaria knowledge was poor with 19.4% of women and 37.5% of men linking mosquitoes with malaria, although 95.6% knew one or more methods of mosquito control. Virtually all respondents used personal protection at some time during the year; and understanding of malaria transmission was strongly associated with bednet use. Those working in forest agriculture were significantly more likely to know that mosquitoes transmit malaria but this did not translate into a significantly greater likelihood of using bednets. Furthermore, use of personal protection while woing outdoors was rare, and less than 3% of respondents knew about the insecticide impregnation of bednets. The use of bednets, synthetic repellents and mosquito coils varied between ethnic groups, but was significantly more frequent among those with higher income, more years of education and permanent housing. The reported use of repellents and coils was also more common among women despite their low knowledge of malaria transmission, and low likelihood of having heard information on malaria within the last year. The use of personal protection must be increased, particularly among outdoor workers that have higher malaria risk. However, personal protection is widely used and widely accepted to prevent nuisance biting

  14. [The invention of personalized medicine, between technological upheavals and utopia].

    Science.gov (United States)

    Billaud, Marc; Guchet, Xavier

    2015-01-01

    The idea of personalized medicine raises a series of questions. If one considers that the physician takes into account the uniqueness of his patient in the frame of the medical consultation, is the definition of medicine as "personalized" not a pleonasm? If not, why has this ambiguous denomination been adopted? In addition, is this form of medicine a novel discipline capable of revolutionizing therapeutic approaches as claimed in its accompanying discourses or is it in continuity with the molecular conception of biomedicine? Rather than attempting to directly answer these questions, we focused our attention on the organizing concepts, the technological breakthroughs and the transformations in medical practices that characterize this medicine. Following this brief analysis, it appears that the choice of a term as equivocal as personalized medicine and the emphasis on the antagonistic notions of revolution and continuity in medicine are the signs of reshuffling that is emerging between actors in the health care system, in academia and in pharmaceutical companies. © 2015 médecine/sciences – Inserm.

  15. Report About a New Standard for Radiation Protection Training of Intervention Persons. In the Case of Radiological emergency Situations

    International Nuclear Information System (INIS)

    Geringer, T.; Steurer, A.; Schmitzer, C.

    2004-01-01

    In autumn 2003 the Austrian standard OENORM S 5207 with the title R adiation protection training of intervention persons in the case of radiological emergency situations w ill be published. The standard is directed to persons who have to invent in case of a radiological emergency, security forces and as well training centres. The standard has to fulfil three objectives: 1. Regulation of the minimum requirements for the radiation protection training and education of intervention persons. 2. Harmonization of the radiation protection and training of different security forces, for instance Austrian army, Red Cross Austria, Fire Department, Police Department. 3. Mutual recognition of parts of the education between the different security forces. To fulfil these aims the standard is structured in different education modules. If , for instance, a person attended a special training module at the Austrian military, this part of the education is also valid for a career at the Fire Department. Further the modular structure of the education gives the possibility for persons of a special security force to attend one or more modules at another security force. This will lead to an improved cooperation between the different security forces in case of a radiological emergency situation. The education is structured in four levels. The topics of the standard are: 1. Requirements for training centres 2. Guidelines for the examinations of the candidates 3. Topics and goals of the basic education 4. Topics and goals of the advanced education level one 5. Topics and goals of the advanced education level two 6. Topics and examples of specialised education 7. Obligatory further education once every year. (Author)

  16. Investigation of Personality Traits between Infertile Women Submitted to Assisted Reproductive Technology or Surrogacy

    OpenAIRE

    Najmeh Asgarini; Fariba Yazdkhasti; Mohammad Hossein Nasr Esfahani

    2016-01-01

    Background: Personality traits affect human relationships, social interactions, treatment procedures, and essentially all human activities. The purpose of this study is to investigate the personality traits -including sensation seeking, flexibility, and happiness - among a variety of infertile women who were apt to choose assisted reproductive technology (ART) or surrogacy. Materials and Methods: This is a cross-sectional study that was performed on 251 infertile women who v...

  17. Additional Safeguards for Children Using Biometric Technologies in the European Union Multilevel System from the Perspective of Fundamental Rights Protection

    OpenAIRE

    Sarrión Esteve, Joaquín

    2015-01-01

    I. Motivation. II. Methodology III. The advances of biometric technologies. A particular focus on DNA technology. IV. DNA technology legal framework V. Fundamental rights protection in EU Multilevel System VI. Additional Safeguards for Children Conclusions? I. Motivation. II. Methodology III. The advances of biometric technologies. A particular focus on DNA technology. IV. DNA technology legal framework V. Fundamental rights protection in EU Multileve...

  18. 31 CFR 539.306 - Goods, technology, or services produced or provided by a designated foreign person.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Goods, technology, or services..., technology, or services produced or provided by a designated foreign person. With respect to the prohibitions in §§ 539.201 and 539.202, the term goods, technology, or services produced or provided by a...

  19. A fractionation of the physiological burden of the personal protective equipment worn by firefighters.

    Science.gov (United States)

    Taylor, Nigel A S; Lewis, Michael C; Notley, Sean R; Peoples, Gregory E

    2012-08-01

    Load carriage increases physiological strain, reduces work capacity and elevates the risk of work-related injury. In this project, the separate and combined physiological consequences of wearing the personal protective equipment used by firefighters were evaluated. The overall impact upon performance was first measured in 20 subjects during a maximal, job-related obstacle course trial and an incremental treadmill test to exhaustion (with and without protective equipment). The fractional contributions of the thermal protective clothing, helmet, breathing apparatus and boots were then separately determined during steady-state walking (4.8 km h(-1), 0% gradient) and bench stepping (20 cm at 40 steps min(-1)). The protective equipment reduced exercise tolerance by 56% on a treadmill, with the ambulatory oxygen consumption reserve (peak minus steady-state walking) being 31% lower. For the obstacle course, performance declined by 27%. Under steady-state conditions, the footwear exerted the greatest relative metabolic impact during walking and bench stepping, being 8.7 and 6.4 times greater per unit mass than the breathing apparatus. Indeed, the relative influence of the clothing on oxygen cost was at least three times that of the breathing apparatus. Therefore, the most efficient way to reduce the physiological burden of firefighters' protective equipment, and thereby increase safety, would be to reduce the mass of the boots and thermal protective clothing.

  20. Evaluating the effectiveness of personal response system technology on millennial student learning.

    Science.gov (United States)

    McCurry, Mary K; Hunter Revell, Susan M

    2011-08-01

    As nurse educators, we must explore new technologies that capitalize on the characteristics of millennial learners. One such technology, the personal response system (PRS), is an effective way to promote active learning and increase comprehension. Few nursing studies have examined the benefits of PRS technology on student outcomes. The purpose of this study was to evaluate the effectiveness of PRS technology on learning outcomes in two sections of an undergraduate nursing research course. A crossover design compared class quiz averages between and within groups. Findings related to between and within class quiz scores were mixed, whereas the effectiveness of in-class PRS questions on paper-and-pencil quiz scores and PRS-targeted quiz items was significant. Knowledge gained from this study can be used to enhance our ability to actively engage our technologically savvy undergraduate students. By threading technology into the undergraduate curriculum, learning outcomes may be improved. Copyright 2011, SLACK Incorporated.

  1. Genomic research and data-mining technology: implications for personal privacy and informed consent.

    Science.gov (United States)

    Tavani, Herman T

    2004-01-01

    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.

  2. Intra- and Inter-personal Consequences of Protective Buffering among Cancer Patients and Caregivers

    Science.gov (United States)

    Langer, Shelby L.; Brown, Jonathon D.; Syrjala, Karen L.

    2009-01-01

    BACKGROUND Protective buffering refers to hiding cancer-related thoughts and concerns from one’s spouse or partner. This study sought to examine the intra- and inter-personal consequences of protective buffering and motivations for such (desire to shield partner from distress, desire to shield self from distress). METHODS Eighty hematopoietic stem cell transplant patients and their spousal caregivers/ partners completed measures designed to assess protective buffering and relationship satisfaction at two time points: prior to the transplant (T1) and 50 days post-transplant (T2). Overall mental health was also assessed at T2. RESULTS There was moderate agreement between one dyad member’s reported buffering of his/ her partner, and the partner’s perception of the extent to which s/he felt buffered. Caregivers buffered patients more than patients buffered caregivers, especially at T2. The more participants buffered their partners at T2, and the more they felt buffered, the lower their concurrent relationship satisfaction and the poorer their mental health. The latter effect was particularly true for patients who buffered, and patients who felt buffered. With respect to motivations, patients who buffered primarily to protect their partner at T1 reported increases in relationship satisfaction over time, but when they did so at T2, their caregiver reported concurrent decreases in relationship satisfaction. CONCLUSIONS Protective buffering is costly, in that those who buffer and those who feel buffered report adverse psychosocial outcomes. In addition, buffering enacted by patients with an intention to help may prove counterproductive, ultimately hurting the object of such protection. PMID:19731352

  3. Risks of Stigmatisation Resulting from Assistive Technologies for Persons with Autism Spectrum Disorder

    OpenAIRE

    Fiachra O’Brolcháin; Bert Gordijn

    2018-01-01

    Assistive technologies (ATs) are currently being developed for cohorts of vulnerable people, including persons with autism spectrum disorder (ASD). This paper focuses on the risks that the development of ATs for persons with ASD might lead to increased risks of stigmatisation. Firstly, we assess the ways in which the use of ATs might result in the stigmatisation of users, alongside the corollary question of risks associated with a refusal to use ATs in the event of their being socially expect...

  4. Enabling Patient Control of Personal Electronic Health Records Through Distributed Ledger Technology.

    Science.gov (United States)

    Cunningham, James; Ainsworth, John

    2017-01-01

    The rise of distributed ledger technology, initiated and exemplified by the Bitcoin blockchain, is having an increasing impact on information technology environments in which there is an emphasis on trust and security. Management of electronic health records, where both conformation to legislative regulations and maintenance of public trust are paramount, is an area where the impact of these new technologies may be particularly beneficial. We present a system that enables fine-grained personalized control of third-party access to patients' electronic health records, allowing individuals to specify when and how their records are accessed for research purposes. The use of the smart contract based Ethereum blockchain technology to implement this system allows it to operate in a verifiably secure, trustless, and openly auditable environment, features crucial to health information systems moving forward.

  5. IR technology for enhanced force protection by AIM

    Science.gov (United States)

    Breiter, R.; Ihle, T.; Rode, W.; Wendler, J.; Rühlich, I.; Haiml, M.; Ziegler, J.

    2008-04-01

    In all recent missions our forces are faced with various types of asymmetric threads like snipers, IEDs, RPGs or MANPADS. 2 nd and 3 rd Gen IR technology is a backbone of modern force protection by providing situational awareness and accurate target engagement at day/night. 3 rd Gen sensors are developed for thread warning capabilities by use of spectral or spatial information. The progress on a dual-color IR module is discussed in a separate paper [1]. A 1024x256 SWIR array with flexure bearing compressor and pulse tube cold finger provides > 50,000h lifetime for space or airborne hyperspectral imaging in pushbroom geometry with 256 spectral channels for improved change detection and remote sensing of IEDs or chemical agents. Similar concepts are pursued in the LWIR with either spectroscopic imaging or a system of LWIR FPA combined with a cooled tunable Laser to do spectroscopy with stimulated absorption of specific wavelengths. AIM introduced the RangIR sight to match the requirements of sniper teams, AGLs and weapon stations, extending the outstanding optronic performance of the fielded HuntIR with position data of a target by a laser range finder (LRF), a 3 axis digital magnetic compass (DMC) and a ballistic computer for accurate engagement of remote targets. A version with flexure bearing cooler with >30,000h life time is being developed for continuous operation in e.g. gunfire detection systems. This paper gives an overview of AIM's technologies for enhanced force protection.

  6. Dictionary of terms and definitions used in radiation protection technology

    International Nuclear Information System (INIS)

    1975-01-01

    The dictionary contains terms and definitions used in radiation protection technology. This document is developed by the Section of CMEA Secretariat on peaceful atomic energy application on the basis of materials provided by member states. The dictionary contains versions of terms and definitions in the languages of member states. Total number of terms is 94. (I.T.)

  7. Fire protection research for energy technology projects; FY 79 year-end report

    International Nuclear Information System (INIS)

    Hasegawa, H.K.; Alvares, N.J.; Lipska, A.E.; Ford, H.; Beason, D.G.

    1981-01-01

    This report describes work performed in fiscal year 1979, on a DOE funded study entitled Fire Protection Research for Energy Technology Projects. The primary goal of this program is to ensure that fire protection measures for Fusion Energy Experiments (FEE) evolve concurrently with the complexity of FEE. Ultimately, it is planned that the detailed study of fusion experiments will provide an analytical methodology which can be applied to the full range of energy technology projects. We attempt to achieve this objective by coordinately advancing 3 (three) major task areas; (a) determine the fire hazards of current FEE facilities (b) assess the ability of accepted fire management strategies to meet and negate the hazard, (c) perform unique research into problem areas we have identified to provide input into analytical fire growth and damage assessment models

  8. Effectiveness of personal protective equipment: Relevance of dermal and inhalation exposure to chlorpyrifos among pest control operators

    NARCIS (Netherlands)

    Jagt, K. van der; Tielemans, E.; Links, I.; Brouwer, D.; Hemmen, J. van

    2004-01-01

    This study assessed the effectiveness of a custom fit personal protective equipment (PPE) program aimed at reducing occupational exposure to pesticides. The intervention study was carried out on 15 pest control operators (PCOs) during mixing/loading and application of chlorpyrifos. Each worker was

  9. Are organisations in South Africa ready to comply with personal data protection or privacy legislation and regulations?

    CSIR Research Space (South Africa)

    Baloyi, Ntsako

    2017-06-01

    Full Text Available people. Organisations require people’s trust and in turn, people are entitled to demand, as far as practicable and lawful, certain privileges from these organisations, such as the right to data protection or privacy. The power imbalance between... of restrictions on international data transfers, where there are no ‘adequate’ levels of personal data protection [5, 6]. This could have dire consequences for businesses. The European Union (EU) Directive [5] was a game changer. It resulted in the conclusion...

  10. Privacy by design in personal health monitoring.

    Science.gov (United States)

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  11. Sun protection practices among offspring of women with personal or family history of skin cancer.

    Science.gov (United States)

    Geller, Alan C; Brooks, Daniel R; Colditz, Graham A; Koh, Howard K; Frazier, A Lindsay

    2006-04-01

    Family history of skin cancer is an important determinant of skin cancer risk for offspring. No previous study of the effect of personal or family history of skin cancer on the sun protection behaviors of the offspring has been published. A retrospective study was conducted of the sun protection behaviors of the adolescent participants in the Growing Up Today Study (GUTS), who were offspring of mothers from the Nurses Health Study II. Adolescents' surveys were matched with their mothers' reports of a personal or family history of skin cancer and compared with adolescents whose mothers did not report a personal or family history of skin cancer. The outcome measures were (1) occurrence of frequent sunburns during the past summer, (2) use of a tanning bed during the past year, and (3) routine use of sunscreen. Frequent sunburns were defined as the report of > or = 3 sunburns during the past summer. We compared those who reported having used a tanning bed in the past year at least once with those who reported no tanning bed use in the past year. Routine use of sunscreen was defined as a respondent who replied that he or she "always" or "often" used sunscreen with sun protection factor of 15 or more when he or she was outside for > 15 minutes on a sunny day during the past summer. General estimating equations were used to calculate odds ratios and 95% confidence intervals adjusted for gender, age, color of untanned skin, and number of friends who were tanned. We also conducted an additional analysis restricted to children whose mothers had received a diagnosis of skin cancer in which we assessed sun protection behaviors according to the child's age and mother's age at the time of the mother's diagnosis and the number of years that had passed since the diagnosis of the mother's skin cancer. In 1999, 9943 children reported their sun protection behaviors; 8697 of their mothers had not received a diagnosis of skin cancer or reported a family history of melanoma, 463

  12. Collection, Use, Disclosure and Protection of Personal Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    whoskin

    addresses, personal and/or work email addresses, personal and/or work or cell telephone numbers); and. • language testing and language assessment results. How Do We Use Your Personal Information? We use the personal information you provide exclusively for the purposes of processing, screening, assessing ...

  13. Balancing personalized medicine and personalized care.

    Science.gov (United States)

    Cornetta, Kenneth; Brown, Candy Gunther

    2013-03-01

    The current description of personalized medicine by the National Institutes of Health is "the science of individualized prevention and therapy." Although physicians are beginning to see the promise of genetic medicine coming to fruition, the rapid pace of sequencing technology, informatics, and computer science predict a revolution in the ability to care for patients in the near future. The enthusiasm expressed by researchers is well founded, but the expectations voiced by the public do not center on advancing technology. Rather, patients are asking for personalized care: a holistic approach that considers physical, mental, and spiritual well-being. This perspective considers psychological, religious, and ethical challenges that may arise as the precision of preventive medicine improves. Psychological studies already highlight the barriers to single gene testing and suggest significant barriers to the predictive testing envisioned by personalized medicine. Certain religious groups will likely mount opposition if they believe personalized medicine encourages embryo selection. If the technology prompts cost-containment discussions, those concerned about the sanctity of life may raise ethical objections. Consequently, the availability of new scientific developments does not guarantee advances in treatment because patients may prove unwilling to receive and act on personalized genetic information. This perspective highlights current efforts to incorporate personalized medicine and personalized care into the medical curriculum, genetic counseling, and other aspects of clinical practice. Because these efforts are generally independent, the authors offer recommendations for physicians and educators so that personalized medicine can be implemented in a manner that meets patient expectations for personalized care.

  14. Personal Professional Development Efforts of Science and Technology Teachers in Their Fields

    Science.gov (United States)

    Bilgin, Aysegul; Balbag, Mustafa Zafer

    2018-01-01

    The aim of this study is to examine the personal professional development efforts of science and technology teachers in their fields with regard to some variables. These variables were determined as gender, year of seniority and sufficiency level of the laboratory equipment. Moreover, the relation between the actual efforts exerted by science and…

  15. Routes for breaching and protecting genetic privacy

    OpenAIRE

    Erlich, Yaniv; Narayanan, Arvind

    2013-01-01

    We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these datasets is vital for progress in biomedical research. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, point to the underlying assumptions, and assess its technological complexity and maturati...

  16. Maintenance of influenza virus infectivity on the surfaces of personal protective equipment and clothing used in healthcare settings.

    Science.gov (United States)

    Sakaguchi, Hiroko; Wada, Koji; Kajioka, Jitsuo; Watanabe, Mayumi; Nakano, Ryuichi; Hirose, Tatsuko; Ohta, Hiroshi; Aizawa, Yoshiharu

    2010-11-01

    The maintenance of infectivity of influenza viruses on the surfaces of personal protective equipment and clothing is an important factor in terms of controlling viral cross-infection in the environment and preventing contact infection. The aim of this study was to determine if laboratory-grown influenza A (H1N1) virus maintained infectivity on the surfaces of personal protective equipment and clothing used in healthcare settings. Influenza A virus (0.5 mL) was deposited on the surface of a rubber glove, an N95 particulate respirator, a surgical mask made of non-woven fabric, a gown made of Dupont Tyvek, a coated wooden desk, and stainless steel. Each sample was left for 1, 8, and 24 h, and hemagglutination (HA) and 50% tissue culture infective dose (TCID(50))/mL were measured. The HA titer of this influenza A virus did not decrease in any of the materials tested even after 24 h. The infectivity of influenza A virus measured by TCID(50) was maintained for 8 h on the surface of all materials, with the exception of the rubber glove for which virus infectivity was maintained for 24 h. Our results indicate that the replacement/renewal of personal protective equipment and clothing by healthcare professionals in cases of exposure to secretions and droplets containing viruses spread by patients is an appropriate procedure to prevent cross-infection.

  17. Predicting sun protection behaviors using protection motivation variables.

    Science.gov (United States)

    Ch'ng, Joanne W M; Glendon, A Ian

    2014-04-01

    Protection motivation theory components were used to predict sun protection behaviors (SPBs) using four outcome measures: typical reported behaviors, previous reported behaviors, current sunscreen use as determined by interview, and current observed behaviors (clothing worn) to control for common method bias. Sampled from two SE Queensland public beaches during summer, 199 participants aged 18-29 years completed a questionnaire measuring perceived severity, perceived vulnerability, response efficacy, response costs, and protection motivation (PM). Personal perceived risk (similar to threat appraisal) and response likelihood (similar to coping appraisal) were derived from their respective PM components. Protection motivation predicted all four SPB criterion variables. Personal perceived risk and response likelihood predicted protection motivation. Protection motivation completely mediated the effect of response likelihood on all four criterion variables. Alternative models are considered. Strengths and limitations of the study are outlined and suggestions made for future research.

  18. Counter-Terrorism, Technology and Transparency: Reconsidering State Accountability

    Directory of Open Access Journals (Sweden)

    Quirine Eijkman

    2012-02-01

    Full Text Available In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal information, biometrics, satellite technology and other forms of ICT technology used in the fight against terrorism. Although technology is a powerful tool to fight terrorism, it is also a means for increasing social control by the state. Henceforth, there is a risk that panoptic surveillance – where the few view the many – could develop. Therefore accountability in relation to use of technological counter-terrorism measures such as smart surveillance cameras, biometric devices or the tracking of personal data is discussed in this article. The extra powers that both public authorities and private companies gain through new (surveillance technologies should be counterbalanced. In this context the role of the state, because of its monopoly to use force and its duty to protect the rule of law, is crucial. By reconsidering how to enforce accountability by the state, the effects of technological counter-terrorism measures could be checked and balanced.

  19. Qualifications of persons working in radiation user's organization and radiation protection training required for competence

    International Nuclear Information System (INIS)

    2004-04-01

    The Guide sets out the requirements governing the qualifications of persons working in userAes organizations and the radiation protection training required for such competence. It also sets out the requirements for training organizations arranging radiation safety officer training and exams. The Guide applies only to uses of radiation requiring a afety licence. The requirements for userAes organizations are set out in Guide ST 1.4

  20. Personal protective equipment and improving compliance among healthcare workers in high-risk settings.

    Science.gov (United States)

    Honda, Hitoshi; Iwata, Kentaro

    2016-08-01

    Personal protective equipment (PPE) protects healthcare workers (HCWs) from infection by highly virulent pathogens via exposure to body fluids and respiratory droplets. Given the recent outbreaks of contagious infectious diseases worldwide, including Ebola virus and Middle Eastern respiratory syndrome, there is urgent need for further research to determine optimal PPE use in high-risk settings. This review intends to provide a general understanding of PPE and to provide guidelines for appropriate use based on current evidence. Although previous studies have focused on the efficacy of PPE in preventing transmission of pathogens, recent studies have examined the dangers to HCWs during removal of PPE when risk of contamination is highest. Access to adequate PPE supplies is crucial to preventing transmission of pathogens, especially in resource-limited settings. Adherence to appropriate PPE use is a challenge due to inadequate education on its usage, technical difficulties, and tolerability of PPE in the workplace. Future projects aim at ameliorating this situation, including redesigning PPE which is crucial to improving the safety of HCWs. PPE remains the most important strategy for protecting HCW from potentially fatal pathogens. Further research into optimal PPE design and use to improve the safety of HCWs is urgently needed.

  1. Modelling vital success factors in adopting personalized medicine system in healthcare technology and management

    Directory of Open Access Journals (Sweden)

    Subhas C. Misra

    2018-06-01

    Full Text Available Biomedical engineering has grown as a vast field of research that includes many areas of engineering and technology also. Personalized Medicine is an emerging approach in today’s medicare system. It bears a very strong potential to consolidate modern e-health systems fundamentally. Scientists have already discovered some of the personalized drugs that can shift the whole medicare system into a new dimension. However, bringing the change in the whole medicare system is not an easy task. There are several factors that can affect the successful adoption of Personalized Medicine systems in the healthcare management sector. This paper aims at identifying the critical factors with the help of an empirical study. A questionnaire was distributed amongst some clinicians, clinical researchers, practitioners in pharmaceutical industries, regulatory board members, and a larger section of patients. The response data collected thereby were analyzed by using appropriate statistical methods. Based on the statistical analysis, an attempt is made to prepare a list of critical success factors in the adoption of personalized medicine in healthcare management. The study indicates that eight of the thirteen hypothesized factors have statistical relationship with “Success”. The important success factors detected are: data management, team work and composition, privacy and confidentiality, mind-set, return on investment, sufficient time, R&D and alignment. To the best of our knowledge, this is the first academic paper in which an attempt has been made to model the vital critical factors for the successful implementation of Personalized Medicine in healthcare management. The study bears the promise of important applications in healthcare engineering and technology. Keywords: Healthcare management, Personalized medicine, E-health, Success factors, Medicare systems, Regression analysis

  2. Variability in and agreement between modeled and personal continuously measured black carbon levels using novel smartphone and sensor technologies

    NARCIS (Netherlands)

    Nieuwenhuijsen, Mark J; Donaire-Gonzalez, David; Rivas, Ioar; de Castro, Montserrat; Cirach, Marta; Hoek, Gerard|info:eu-repo/dai/nl/069553475; Seto, Edmund; Jerrett, Michael; Sunyer, Jordi

    2015-01-01

    Novel technologies, such as smartphones and small personal continuous air pollution sensors, can now facilitate better personal estimates of air pollution in relation to location. Such information can provide us with a better understanding about whether and how personal exposures relate to

  3. Building competence in radiation protection and the safe use of radiation sources. Safety guide

    International Nuclear Information System (INIS)

    2005-01-01

    An essential element of a national infrastructure for radiation protection and safety is the maintenance of an adequate number of competent personnel. This Safety Guide makes recommendations concerning the building of competence in protection and safety, which relate to the training and assessment of qualification of new personnel and retraining of existing personnel in order to develop and maintain appropriate levels of competence. This Safety Guide addresses training in protection and safety aspects in relation to all practices and intervention situations in nuclear and radiation related technologies. This document covers the following aspects: the categories of persons to be trained. The requirements for education, training and experience for each category. The processes of qualification and authorization of persons. A national strategy for building competence

  4. Between the Profiles Pay Per View and the Protection of Personal Data: the Product is You

    Directory of Open Access Journals (Sweden)

    Ana Karin CHÁVEZ VALDIVIA

    2017-03-01

    Full Text Available Perhaps in the past was difficult to imagine that the moment in which someone could register each purchase that has been made, each book that has been read or each thing that has been said would come. That there would be companies storing data about our physical activity, behaviors, preferences and choices all the time. Most of the personal data comes from acts as daily as installing an application, completing a form, purchasing a product or requesting a service. This information provided sometimes consciously, voluntarily and with relative knowledge of the destination that will have, contrasts with situations in which data are inferred, deduced, extracted and manipulated.  In this sense, within a context in which the only access to the database has been left behind to give way to the creation of these by third parties, we wonder about the possible denaturation of the personal data and sensitive information that when get transformed in raw material through the analysis of existent connections and extraction of new data implicit in the multitude of information compiled in public or private databases, would convert  people into an essential product for the market; while the development of citizen profiles pay per view would allow predicting behaviors, selections and multiple deployments in different aspects of our lives. It is probable that in the defenselessness condition where we are now for having passed from personal space to social one and from there to the market many times without our knowledge and consent makes necessary to reconsider the current forms of protection and mechanisms of  legal protection around our personal data.

  5. Preferences for technology versus human assistance and control over technology in the performance of kitchen and personal care tasks in baby boomers and older adults.

    Science.gov (United States)

    Beach, Scott R; Schulz, Richard; Matthews, Judith T; Courtney, Karen; Dabbs, Annette DeVito

    2014-11-01

    Quality of Life technology (QoLT) stresses humans and technology as mutually dependent and aware, working together to improve task performance and quality of life. This study examines preferences for technology versus human assistance and control in the context of QoLT. Data are from a nationally representative, cross-sectional web-based sample of 416 US baby boomers (45-64) and 114 older adults (65+) on preferences for technology versus human assistance and control in the performance of kitchen and personal care tasks. Multinomial logistic regression and ordinary least squares regression were used to determine predictors of these preferences. Respondents were generally accepting of technology assistance but wanted to maintain control over its' operation. Baby boomers were more likely to prefer technology than older adults, and those with fewer QoLT privacy concerns and who thought they were more likely to need future help were more likely to prefer technology over human assistance and more willing to relinquish control to technology. Results suggest the need for design of person- and context-aware QoLT systems that are responsive to user desires for level of control over operation of the technology. The predictors of these preferences suggest potentially receptive markets for the targeting of QoLT systems.

  6. Arranging for personal assistance services and assistive technology at work. A report of the rehabilitation research and training center on personal assistance services.

    Science.gov (United States)

    Stoddard, Susan; Kraus, Lewis

    2006-01-01

    For an employee with a disability, reasonable accommodation can make the difference in finding work, maintaining employment, and succeeding on the job. Today, employers and employees alike are more aware that appropriate accommodation, including workplace personal assistance services (PAS) as well as assistive technology, improves an employee's ability to succeed. While assistive technology is in widespread use as an accommodation, workplace personal assistance is less understood. The goal of the study was to learn more about how workplace PAS and AT are arranged for in the workplace, and the issues that arise. Structured phone interviews were conducted with 20 workplace PAS users, 21 employers familiar with workplace PAS, and 19 employment organizations. Interview transcripts are the basis for the qualitative analysis of findings. Requirements for personal assistance accommodations focus on task-related needs. Personal care needs at work are not included in the Americans with Disabilities act but may be needed by the employee. Employers and PAS users have developed many creative ways to address PAS need. Organizations can construct an approach that fits the needs, abilities, and constraints of each organization. The interview respondents have identified a number of practices that are succeeding, including establishment of policies for arranging for PAS; centralization of accommodation budgets to remove work unit disincentives; and providing a shared personal assistant for interpreting or for task-related and personal care tasks. A number of important research questions remain. What is the extent of the need for PAS in the workplace? Will an expanded PAS supply increase the employment opportunities for people with disabilities? Will better models of workplace PAS be adopted by employers?

  7. Radiation protection

    International Nuclear Information System (INIS)

    1989-01-01

    A NRPB leaflet in the 'At-a-Glance' series explains in a simple but scientifically accurate way what radiation is, the biological effects and the relative sensitivity of different parts of the human body. The leaflet then discusses radiation protection principles, radiation protection in the UK and finally the effectiveness of this radiation protection as judged by a breakdown of the total dose received by an average person in the UK, a heavy consumer of Cumbrian seafood, an average nuclear industry worker and an average person in Cornwall. (UK)

  8. Data protection for the digital age: comprehensive effects of the evolving law of accountability

    Directory of Open Access Journals (Sweden)

    Nina GUMZEJ

    2012-12-01

    Full Text Available The law of personal data protection has for years been lagging behind technology, which is evolving propulsively and with high speed. A number of new challenges arising from the post-modern digital age have been identified for rights and freedoms of individuals with respect to processing of their personal data and thus a need for adapting the relevant legal-regulatory regime and ensuring a workable and systematic data protection system for the third millennium. After examination of the current legal framework and supporting systems at the level of European Union law, this paper focuses on recently proposed reforms. Proposed new EU legal-regulatory regime towards a potent data protection ecosystem is strongly supported by stricter accountability of those who are responsible for personal data. As one of the core legal principles supporting the new regime, accountability denotes, in a nutshell, a number of legally enforceable duties to implement and verify measures and procedures that can ensure operative and demonstrable data protection compliance. Selected highlights of the proposed accountability measures are therefore examined in this paper and arguments provided for a shift towards organizational data protection management and governance already today.

  9. Using technology to assess and intervene with illicit drug-using persons at risk for HIV.

    Science.gov (United States)

    Horvath, Keith J; Lammert, Sara; LeGrand, Sara; Muessig, Kathryn E; Bauermeister, José A

    2017-09-01

    This review describes recent literature on novel ways technology is used for assessment of illicit drug use and HIV risk behaviours, suggestions for optimizing intervention acceptability, and recently completed and ongoing technology-based interventions for drug-using persons at risk for HIV and others with high rates of drug use and HIV risk behaviour. Among studies (n = 5) comparing technology-based to traditional assessment methods, those using Ecological Momentary Assessment (EMA) had high rates of reported drug use and high concordance with traditional assessment methods. The two recent studies assessing the acceptability of mHealth approaches overall demonstrate high interest in these approaches. Current or in-progress technology-based interventions (n = 8) are delivered using mobile apps (n = 5), text messaging (n = 2) and computers (n = 1). Most intervention studies are in progress or do not report intervention outcomes; the results from one efficacy trial showed significantly higher HIV testing rates among persons in need of drug treatment. Studies are needed to continually assess technology adoption and intervention preferences among drug-using populations to ensure that interventions are appropriately matched to users. Large-scale technology-based intervention trials to assess the efficacy of these approaches, as well as the impact of individual intervention components, on drug use and other high-risk behaviours are recommended.

  10. Selection criteria for wastewater treatment technologies to protect drinking water.

    Science.gov (United States)

    von Sperling, M

    2000-01-01

    The protection of water bodies used as sources for drinking water is intimately linked to the adoption of adequate technologies for the treatment of the wastewater generated in the catchment area. The paper presents a general overview of the main technologies used for the treatment of domestic sewage, with a special emphasis on developing countries, and focussing on the main parameters of interest, such as BOD, coliforms and nutrients. A series of tables, figures and charts that can be used for the preliminary selection of treatment technologies is presented. The systems analysed are: stabilisation ponds, activated sludge, trickling filters, anaerobic systems and land disposal. Within each system, the main process variants are covered. Two summary tables are presented, one for quantitative analysis, including easily usable information based on per capita values (US$/cap, Watts/cap, m2 area/cap, m3 sludge/cap), and another for a qualitative comparison among the technologies, based on a one-to-five-star scoring system. The recent trend in tropical countries in the use of UASB (Upflow Anaerobic Sludge Blanket) reactors is also discussed.

  11. Impact of Different Personal Protective Clothing on Wildland Firefighters' Physiological Strain.

    Science.gov (United States)

    Carballo-Leyenda, Belén; Villa, José G; López-Satué, Jorge; Rodríguez-Marroyo, Jose A

    2017-01-01

    Wildfire firefighting is an extremely demanding occupation performed under hot environment. The use of personal protective clothing (PPC) is needed to protect subjects from the thermal exposure. However, the additional use of PPC may increase the wildland firefighters' physiological strain, and consequently limit their performance. The aim of this study was to analyze the effect of four different PPC on the physiological strain of wildland firefighters under moderate conditions (30°C and 30% RH). Eight active and healthy wildland firefighters performed a submaximal walking test wearing a traditional short sports gear and 4 different PPC. The materials combination (viscose, Nomex, Kevlar, P-140 and fire resistant cotton) used during the PPC manufacturing process was different. During all tests, to simulate a real scenario subjects wore a backpack pump (20 kg). Heart rate, respiratory gas exchange, gastrointestinal temperature, blood lactate concentration, perceived exertion and temperature and humidity underneath the PPC were recorded throughout tests. Additionally, parameters of heat balance were estimated. Wearing a PPC did not cause a significant increase in the subjects' physiological response. The gastrointestinal temperature increment, the relative humidity of the microclimate underneath the PPC, the sweat residue in PPC, the sweat efficiency, the dry heat exchange and the total clothing insulation were significantly affected according to the PPC fabric composition. These results suggest that the PPC composition affect the moisture management. This might be taken into account to increase the wildland firefighters' protection in real situations, when they have to work close to the flames.

  12. Impact of Different Personal Protective Clothing on Wildland Firefighters' Physiological Strain

    Directory of Open Access Journals (Sweden)

    Belén Carballo-Leyenda

    2017-08-01

    Full Text Available Wildfire firefighting is an extremely demanding occupation performed under hot environment. The use of personal protective clothing (PPC is needed to protect subjects from the thermal exposure. However, the additional use of PPC may increase the wildland firefighters' physiological strain, and consequently limit their performance. The aim of this study was to analyze the effect of four different PPC on the physiological strain of wildland firefighters under moderate conditions (30°C and 30% RH. Eight active and healthy wildland firefighters performed a submaximal walking test wearing a traditional short sports gear and 4 different PPC. The materials combination (viscose, Nomex, Kevlar, P-140 and fire resistant cotton used during the PPC manufacturing process was different. During all tests, to simulate a real scenario subjects wore a backpack pump (20 kg. Heart rate, respiratory gas exchange, gastrointestinal temperature, blood lactate concentration, perceived exertion and temperature and humidity underneath the PPC were recorded throughout tests. Additionally, parameters of heat balance were estimated. Wearing a PPC did not cause a significant increase in the subjects' physiological response. The gastrointestinal temperature increment, the relative humidity of the microclimate underneath the PPC, the sweat residue in PPC, the sweat efficiency, the dry heat exchange and the total clothing insulation were significantly affected according to the PPC fabric composition. These results suggest that the PPC composition affect the moisture management. This might be taken into account to increase the wildland firefighters' protection in real situations, when they have to work close to the flames.

  13. Perspectives of radiological protection facing the development of new medical technologies with ionizing radiations

    International Nuclear Information System (INIS)

    Arranz, L.

    1993-01-01

    The development of medical technologies with ionizing radiations is always showing a parallel effort on risks control. These technologies are a safe tool for accurate diagnosis and the elaboration of effective treatments. However it is not foreseen to achieve a decrease of the equivalent effective annual dose person due to medical irradiation (1.06 m Sv for OECD countries), because of the population growing and aging

  14. Code of Practice for the Protection of Persons against Ionizing Radiations arising from Medical and Dental Use

    Energy Technology Data Exchange (ETDEWEB)

    1972-01-01

    This Code is a revision of the 1964 Code of Practice for the protection of persons against ionizing radiations arising from medical and dental use. This revised Code (which does not have the force of law) applies to the use of ionizing radiations arising from all forms of medical and dental practice and from allied research involving human subjects. It covers both workers, patients and members of the public. Although the arrangements recommended relate primarily to institutions they should be applied, as far as possible, by all medical and dental practitioners. The Code has been drawn up in the light of the recommendations of the International Commission on Radiological Protection (ICRP) and of the views of the Medical Research Council's Committee on Protection against Ionizing Radiations.

  15. Report of the work-group derived from the permanent radioprotection expert Group on the desirable evolutions for the functions and training of persons with expertise in radiation protection

    International Nuclear Information System (INIS)

    2010-01-01

    This report first discusses the issues of training in radiation protection within the French national context by distinguishing training in relationship with workers' radiation protection (internal training in radiation protection as foreseen in the French Work Code, training in the industrial field, training in the field of radioactive material transportation, training of the person with expertise in radiation protection or PCR), and training in relationship with patient radiation protection (training of the person specialised in medical radio-physics, training in patient radiation protection). It describes the situation and evolution perspectives at the European level by addressing the situation in different countries (Great-Britain, Belgium, Switzerland), the content of the 96/29/Euratom directive, the current evolutions in Europe (European platform EUTERP, European programs ENETRAP, transposition of the 2006-123-CE directive, the 2005-36-CE directive and its revision), and some international aspects. The authors discuss strengths and weaknesses of the person with expertise in radiation protection (PCR), and state reflections and recommendations regarding the evolution of the present PCR arrangement

  16. Fungicide application practices and personal protective equipment use among orchard farmers in the agricultural health study.

    Science.gov (United States)

    Hines, C J; Deddens, J A; Coble, J; Alavanja, M C R

    2007-04-01

    Fungicides are routinely applied to deciduous tree fruits for disease management. Seventy-four private orchard applicators enrolled in the Agricultural Health Study participated in the Orchard Fungicide Exposure Study in 2002-2003. During 144 days of observation, information was obtained on chemicals applied and applicator mixing, application, personal protective, and hygiene practices. At least half of the applicators had orchards with orchard applicators.

  17. The Ethics of Virtual Reality Technology: Social Hazards and Public Policy Recommendations.

    Science.gov (United States)

    Spiegel, James S

    2017-09-23

    This article explores four major areas of moral concern regarding virtual reality (VR) technologies. First, VR poses potential mental health risks, including Depersonalization/Derealization Disorder. Second, VR technology raises serious concerns related to personal neglect of users' own actual bodies and real physical environments. Third, VR technologies may be used to record personal data which could be deployed in ways that threaten personal privacy and present a danger related to manipulation of users' beliefs, emotions, and behaviors. Finally, there are other moral and social risks associated with the way VR blurs the distinction between the real and illusory. These concerns regarding VR naturally raise questions about public policy. The article makes several recommendations for legal regulations of VR that together address each of the above concerns. It is argued that these regulations would not seriously threaten personal liberty but rather would protect and enhance the autonomy of VR consumers.

  18. Privacy and technology challenges for ubiquitous social networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Seet, Boon-Chong

    2015-01-01

    towards important challenges such as social sensing, enabling social networking and privacy protection. In this paper we firstly investigate the methods and technologies for acquisition of the relevant context for promotion of sociability among inhabitants of USN environments. Afterwards, we review...... architectures and techniques for enabling social interactions between participants. Finally, we identify privacy as the major challenge for networking in USN environments. Consequently, we depict design guidelines and review privacy protection models for facilitating personal information disclosure....

  19. Personal protective clothing against accidental immersion

    Energy Technology Data Exchange (ETDEWEB)

    Elliott, David; Tipton, Michael [Surrey Univ., Robens Inst. of Health and Safety, Guildford (United Kingdom)

    1997-12-31

    The requirements for protective clothing against accidental immersion are discussed and the advantages and limitations of the main types of immersion protection available are analysed. The variety of designs available reflects the various circumstances under which they may be used. In broad terms in the offshore industry these include the following activities: normal work without risk of immersion but with a possible need to abandon the rig or ship; work in areas where there is risk of accidentally falling into the sea; flying over the sea in a helicopter. The first response to sudden immersion in sea water, which must usually be considered to be cold, is a sudden gasp often followed by an immediate phase of uncontrolled breathing. Since control of ones breathing between and under the breaking waves is essential to staying alive, this is a critical time. After surviving this initial ``cold shock`` phase, the effects of body heat loss become hazardous. Protection against hypothermia has been the priority for those providing survival suits and protective clothing while the hazard of the immediate response to cold immersion has been unrecognised to a large extent. (UK)

  20. Designing Data Protection Safeguards Ethically

    Directory of Open Access Journals (Sweden)

    Ugo Pagallo

    2011-03-01

    Full Text Available Since the mid 1990s, lawmakers and scholars have worked on the idea of embedding data protection safeguards in information and communication technology (ICT with the aim to access and control personal data in compliance with current regulatory frameworks. This effort has been strengthened by the capacities of computers to draw upon the tools of artificial intelligence (AI and operations research. However, work on AI and the law entails crucial ethical issues concerning both values and modalities of design. On one hand, design choices might result in conflicts of values and, vice versa, values may affect design features. On the other hand, the modalities of design cannot only limit the impact of harm-generating behavior but also prevent such behavior from occurring via self-enforcement technologies. In order to address some of the most relevant issues of data protection today, the paper suggests we adopt a stricter, yet more effective version of “privacy by design.” The goal should be to reinforce people’s pre-existing autonomy, rather than having to build it from scratch.

  1. Ethically sound technology? Guidelines for interactive ethical assessment of personal health monitoring.

    Science.gov (United States)

    Palm, Elin; Nordgren, Anders; Verweij, Marcel; Collste, Göran

    2013-01-01

    Novel care-technologies possess a transformational potential. Future care and support may be provided via monitoring technologies such as smart devices, sensors, actors (robots) and Information and Communication Technologies. Such technologies enable care provision outside traditional care institutions, for instance in the homes of patients. Health monitoring may become "personalized" i.e. tailored to the needs of individual care recipients' but may also alter relations between care providers and care recipents, shape and form the care environment and influence values central to health-care. Starting out from a social constructivist theory of technology, an interactive ethical assessment-model is offered. The suggested model supplements a traditional analysis based on normative ethical theory (top-down approach) with interviews including relevant stakeholders (a bottom-up approach). This method has been piloted by small-scale interviews encircling stakeholder perspectives on three emerging technologies: (1) Careousel, a smart medicine-management device, (2) Robot Giraff, an interactive and mobile communication-device and (3) I-Care, a care-software that combines alarm and register system. By incorporating stakeholder perspectives into the analysis, the interactive ethical assessment model provides a richer understanding of the impact of PHM-technologies on ethical values than a traditional top-down model. If the assessment is conducted before the technology has reached the market - preferably in close interaction with developers and users - ethically sound technologies may be obtained.

  2. Personal Protective Equipment Supply Chain: Lessons Learned from Recent Public Health Emergency Responses.

    Science.gov (United States)

    Patel, Anita; D'Alessandro, Maryann M; Ireland, Karen J; Burel, W Greg; Wencil, Elaine B; Rasmussen, Sonja A

    Personal protective equipment (PPE) that protects healthcare workers from infection is a critical component of infection control strategies in healthcare settings. During a public health emergency response, protecting healthcare workers from infectious disease is essential, given that they provide clinical care to those who fall ill, have a high risk of exposure, and need to be assured of occupational safety. Like most goods in the United States, the PPE market supply is based on demand. The US PPE supply chain has minimal ability to rapidly surge production, resulting in challenges to meeting large unexpected increases in demand that might occur during a public health emergency. Additionally, a significant proportion of the supply chain is produced off-shore and might not be available to the US market during an emergency because of export restrictions or nationalization of manufacturing facilities. Efforts to increase supplies during previous public health emergencies have been challenging. During the 2009 H1N1 influenza pandemic and the 2014 Ebola virus epidemic, the commercial supply chain of pharmaceutical and healthcare products quickly became critical response components. This article reviews lessons learned from these responses from a PPE supply chain and systems perspective and examines ways to improve PPE readiness for future responses.

  3. Radiation protection of population under normal operation conditions of nuclear power plants

    International Nuclear Information System (INIS)

    Kunz, Eh.; Shvets, I.

    1976-01-01

    Evolution of shielding is defined in short; approaches suggested for applying in radiation protection or being used are evaluated and classified. Modern views analysis of a risk of biological irradiation consequences in public approaches to health protection in connection with the technical progress side by side with provision of separate persons protection requires attentin to the nuclear power plants protection optimization. Protection optimization suggests the analysis of separate components of technology and protection systems, used materials and constructive solutions, maintenance rules and operating load with respect to environmental discharge of radioactive products. It is expedient to carry out similtaneously the similar analysis with respect to the nuclear power plant personnel irradiation, as separate measures can affect both personnel and population irradiation [ru

  4. Personal, Familial, and Social Risk and Protective Factors of Tendency towards Substance Use among Students

    Directory of Open Access Journals (Sweden)

    Morteza Jahanshahloo

    2016-07-01

    Full Text Available Background and Objective: University students are among vulnerable groups to tendency towards substance use. Accordingly, this study aimed to investigate the role of personal, familial, and social risk and protective factors in the prediction of tendency to this behavior among students.Materials and Methods: This descriptive correlational study was carried out on 431 students of Shahid Beheshti University of Medical Sciences who were selected by convenience sampling. Data were collected by Risk and Protective Factors Inventory (RPFI and Youth Risk Taking Scale (YRTS and then, were analyzed by Pearson correlation method and stepwise multivariate regression.Results: Data analysis using Pearson Correlation Coefficient showed significant relationships between personal (e.g. attitude towards substance use and tendency to drug use; r=0.6, P<0.01, familial (e.g. parent attitude towards substance and tendency towards smoking cigarettes; r=0.2, P<0.05, and social (e.g. perceived accessibility and tendency towards alcohol; r=0.4, P<0.01 factors with tendency to substance use. Moreover, the results of stepwise multivariate regression analysis indicated that personal factors (i.e. attitude towards substance use, sensation seeking, and impulsivity, social factors (i.e. friends’ substance use and perceived accessibility, and familial factors (i.e. family monitoring and parents’ attitude towards substance use were the best predictors of tendency towards substance use in students, respectively.Conclusion: In conclusion, current results indicated that a series of individual, familial, and social factors affect tendency towards substance use among students. Accordingly, identifying vulnerable students using suitable screening tests and providing them with primary prevention programs is of the utmost importance.

  5. Material Protection, Accounting, and Control Technologies (MPACT) Advanced Integration Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Durkee, Joe W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Cipiti, Ben [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Fallgren, Andrew James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Jarman, Ken [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Li, Shelly [Argonne National Lab. (ANL), Argonne, IL (United States); Meier, Dave [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Miller, Mike [Argonne National Lab. (ANL), Argonne, IL (United States); Osburn, Laura Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pereira, Candido [Argonne National Lab. (ANL), Argonne, IL (United States); Dasari, Venkateswara Rao [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Ticknor, Lawrence O. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Yoo, Tae-Sic [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-09-30

    The development of sustainable advanced nuclear fuel cycles is a long-term goal of the Office of Nuclear Energy’s (DOE-NE) Fuel Cycle Technologies program. The Material Protection, Accounting, and Control Technologies (MPACT) campaign is supporting research and development (R&D) of advanced instrumentation, analysis tools, and integration methodologies to meet this goal (Miller, 2015). This advanced R&D is intended to facilitate safeguards and security by design of fuel cycle facilities. The lab-scale demonstration of a virtual facility, distributed test bed, that connects the individual tools being developed at National Laboratories and university research establishments, is a key program milestone for 2020. These tools will consist of instrumentation and devices as well as computer software for modeling, simulation and integration.

  6. Material Protection, Accounting, and Control Technologies (MPACT) Advanced Integration Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Mike [Idaho National Lab. (INL), Idaho Falls, ID (United States); Cipiti, Ben [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Durkee, Jr., Joe W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Fallgren, Andrew James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Jarman, Ken [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Li, Shelly [Idaho National Lab. (INL), Idaho Falls, ID (United States); Meier, Dave [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Osburn, Laura Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pereira, Candido [Argonne National Lab. (ANL), Argonne, IL (United States); Dasari, Venkateswara Rao [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Ticknor, Lawrence O. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Yoo, Tae-Sic [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-01-30

    The development of sustainable advanced nuclear fuel cycles is a long-term goal of the Office of Nuclear Energy’s (DOE-NE) Fuel Cycle Technologies program. The Material Protection, Accounting, and Control Technologies (MPACT) campaign is supporting research and development (R&D) of advanced instrumentation, analysis tools, and integration methodologies to meet this goal (Miller, 2015). This advanced R&D is intended to facilitate safeguards and security by design of fuel cycle facilities. The lab-scale demonstration of a virtual facility, distributed test bed, that connects the individual tools being developed at National Laboratories and university research establishments, is a key program milestone for 2020. These tools will consist of instrumentation and devices as well as computer software for modeling, simulation and integration.

  7. About Personal Protective Equipment (PPE)

    Science.gov (United States)

    ... some types of elastomeric respirator masks and protective eyewear such as goggles may be reused if the ... State & Local Officials Consumers Health Professionals Science & Research Industry Scroll back to top Popular Content Home Latest ...

  8. Code of Practice for the Protection of Persons against Ionizing Radiations arising from Medical and Dental Use

    International Nuclear Information System (INIS)

    1972-01-01

    This Code is a revision of the 1964 Code of Practice for the protection of persons against ionizing radiations arising from medical and dental use. This revised Code (which does not have the force of law) applies to the use of ionizing radiations arising from all forms of medical and dental practice and from allied research involving human subjects. It covers both workers, patients and members of the public. Although the arrangements recommended relate primarily to institutions they should be applied, as far as possible, by all medical and dental practitioners. The Code has been drawn up in the light of the recommendations of the International Commission on Radiological Protection (ICRP) and of the views of the Medical Research Council's Committee on Protection against Ionizing Radiations. (NEA) [fr

  9. A performance study of radio-opaque personal protective fabrics for the reduction of transmittance of gamma-rays and neutrons

    International Nuclear Information System (INIS)

    Corcoran, E.C.; William Forest; Robert Horton; Kelly, D.G.; Kristine Mattson; Curtis McDonald; Nielsen, K.S.; Kristin Topping; Weir, R.D.; Andre Yonkeu

    2012-01-01

    Commercial radio-opaque combat (CRC) fabrics, for incorporation into personal protective equipment used by first responders and armed forces, are marketed as having the ability to provide a level of protection against specific types of radiation. For a CRC material, a standard combat uniform and a multi-layered chemical, biological, radiological, nuclear (CBRN) protective material, the present work examines chemical composition and radiation protection against gamma-rays and neutron fluxes. Significant reduction in gamma-ray transmittance occurs only for the CRC fabric (46-514 keV) with gamma-ray attenuation coefficients of 3.10 to 2 g -1 . Reduction in neutron transmittance, for all three fabrics, could not be assessed with certainty as the measured transmittance was obscured by large statistical uncertainties. (author)

  10. Novel enabling technologies of gene isolation and plant transformation for improved crop protection

    Energy Technology Data Exchange (ETDEWEB)

    Torok, Tamas

    2013-02-04

    Meeting the needs of agricultural producers requires the continued development of improved transgenic crop protection products. The completed project focused on developing novel enabling technologies of gene discovery and plant transformation to facilitate the generation of such products.

  11. Perspectives of health and self-care among older persons-To be implemented in an interactive information and communication technology-platform.

    Science.gov (United States)

    Göransson, Carina; Wengström, Yvonne; Ziegert, Kristina; Langius-Eklöf, Ann; Eriksson, Irene; Kihlgren, Annica; Blomberg, Karin

    2017-12-01

    To acquire knowledge regarding the contents to be implemented in an interactive information and communication technology-platform perceived to be relevant to health and self-care among older persons based on the literature, healthcare professionals and the older persons themselves. The growing ageing population places demands on the healthcare system to promote healthy ageing and to strengthen the older person's self-care ability. This requires innovative approaches to facilitate communication between the older person and healthcare professionals, and to increase the older person's participation in their care. An information and communication technology-platform could be used for this purpose, but the content needs to be relevant to both the older persons and the healthcare professionals. Descriptive qualitative design. This study was based on three samplings: a scoping review of the literature (n = 20 articles), interviews with healthcare professionals (n = 5) and a secondary analysis of interviews with older persons (n = 8) and nursing assistants (n = 7). The data were analysed using qualitative content analysis. Four areas were identified to be of relevance to older persons' perceived health: frame of mind, having relationships and social activities, physical ability and concerns, and maintaining self-care. Self-care was described in the literature and by the healthcare professionals more than by the older persons. The results show a concordance in the data samplings that give a clear indication of the areas relevant to older persons' health and self-care that can be integrated in an interactive information and communication technology-platform for use in regular daily care assessments. Descriptions of self-care were limited indicating a possible gap in knowledge that requires further research. Areas relevant to older persons' health and self-care could be used for regular assessment to support and promote healthy ageing. © 2017 John Wiley & Sons Ltd.

  12. Assessing Doses to Interventional Radiologists Using a Personal Dosimeter Worn Over a Protective Apron

    Energy Technology Data Exchange (ETDEWEB)

    Stranden, E.; Widmark, A.; Sekse, T. (Buskerud Univ. College, Drammen (Norway))

    2008-05-15

    Background: Interventional radiologists receive significant radiation doses, and it is important to have simple methods for routine monitoring of their exposure. Purpose: To evaluate the usefulness of a dosimeter worn outside the protective apron for assessments of dose to interventional radiologists. Material and Methods: Assessments of effective dose versus dose to dosimeters worn outside the protective apron were achieved by phantom measurements. Doses outside and under the apron were assessed by phantom measurements and measurements on eight radiologists wearing two routine dosimeters for a 2-month period during ordinary working conditions. Finger doses for the same radiologists were recorded using thermoluminescent dosimeters (TLD; DXT-RAD Extremity dosimeters). Results: Typical values for the ratio between effective dose and dosimeter dose were found to be about 0.02 when the radiologist used a thyroid shield and about 0.03 without. The ratio between the dose to the dosimeter under and outside a protective apron was found to be less than 0.04. There was very good correlation between finger dose and dosimeter dose. Conclusion: A personal dosimeter worn outside a protective apron is a good screening device for dose to the eyes and fingers as well as for effective dose, even though the effective dose is grossly overestimated. Relatively high dose to the fingers and eyes remains undetected by a dosimeter worn under the apron

  13. Assessing Doses to Interventional Radiologists Using a Personal Dosimeter Worn Over a Protective Apron

    International Nuclear Information System (INIS)

    Stranden, E.; Widmark, A.; Sekse, T.

    2008-01-01

    Background: Interventional radiologists receive significant radiation doses, and it is important to have simple methods for routine monitoring of their exposure. Purpose: To evaluate the usefulness of a dosimeter worn outside the protective apron for assessments of dose to interventional radiologists. Material and Methods: Assessments of effective dose versus dose to dosimeters worn outside the protective apron were achieved by phantom measurements. Doses outside and under the apron were assessed by phantom measurements and measurements on eight radiologists wearing two routine dosimeters for a 2-month period during ordinary working conditions. Finger doses for the same radiologists were recorded using thermoluminescent dosimeters (TLD; DXT-RAD Extremity dosimeters). Results: Typical values for the ratio between effective dose and dosimeter dose were found to be about 0.02 when the radiologist used a thyroid shield and about 0.03 without. The ratio between the dose to the dosimeter under and outside a protective apron was found to be less than 0.04. There was very good correlation between finger dose and dosimeter dose. Conclusion: A personal dosimeter worn outside a protective apron is a good screening device for dose to the eyes and fingers as well as for effective dose, even though the effective dose is grossly overestimated. Relatively high dose to the fingers and eyes remains undetected by a dosimeter worn under the apron

  14. Technological problems connected with execution of the protection sheets for nuclear power sets WWER-1000

    International Nuclear Information System (INIS)

    Hajutin, J.G.; Kriczewskij, A.Z.

    1977-01-01

    The choice of the structure and the prestressing system of the R.C. protection sheet for nuclear power sets WWER-1000 is motivated. The technological problems arised during the execution stage, as well as the technological line producing the tendons to prestress the structure by up winding are presented. (author)

  15. Protecting genomic sequence anonymity with generalization lattices.

    Science.gov (United States)

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  16. Radiation protection training programmes Spanish approach

    International Nuclear Information System (INIS)

    Arboli, M. Marco; Suarez, M. Rodriguez; Cabrera, S. Falcon

    2002-01-01

    Radiation Protection Programmes are being considered the best way to promote safety culture and to spread and propagate European basic safety standards. It is widely accepted that training is an important tool to upgrade competence for radiation exposed workers. The Spanish Radiation Protection Education and Training Programmes provide a solid and integrated educational model, which takes into account the variety of applied fields, the different levels of responsibilities, the technological and methodological advances, as well as the international tendencies. The needs for a specialised training on Radiation Protection (RP) for exposed workers appears into the Spanish regulation in 1964. National initial training programmes are well established since 1972. Individual certifications, based on personal licences are required for exposed workers. The Spanish regulation also includes continuous and on the job RP training. The educational programmes are being continuously updating and improving. CIEMAT plays an important role in RP Spanish training, improving and modifying the previous RP courses and developing new programmes in order to complete the RP training levels. To achieve Radiation Protection objectives, new technological media for educational methods and material are taking into account. Nevertheless, Spanish RP education and training model has to be improved in some aspects. The purpose of this paper is to analyse the situation and the future needs to be considered in order to complete the RP training processes

  17. Determinants of personal protective equipment (PPE) use in UK motorcyclists: exploratory research applying an extended theory of planned behaviour.

    Science.gov (United States)

    Norris, Emma; Myers, Lynn

    2013-11-01

    Despite evident protective value of motorcycle personal protective equipment (PPE), no research has assessed considerations behind its uptake in UK riders. A cross-sectional online questionnaire design was employed, with riders (n=268) recruited from online motorcycle forums. Principal component analysis found four PPE behavioural outcomes. Theoretical factors of intentions, attitudes, injunctive and descriptive subjective norms, risk perceptions, anticipated regret, benefits and habit were also identified for further analysis. High motorcycle jacket, trousers and boots wear, middling high-visibility wear and low non-Personal Protective Equipment wear were found. Greater intentions, anticipated regret and perceived benefits were significantly associated with increased motorcycle jacket, trousers and boots wear, with habit presence and scooter use significantly associated with increased high-visibility wear. Lower intentions, anticipated regret and risk perceptions, being female, not holding a car licence and urban riding were significantly associated with increased non-PPE wear. A need for freedom of choice and mixed attitudes towards PPE use were evident in additional comments. PPE determinants in this sample provide a preliminary basis for future uptake interventions. Larger scale and qualitative research is needed to further investigate relevant constructs. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. An assistive technology for hearing-impaired persons: analysis, requirements and architecture.

    Science.gov (United States)

    Mielke, Matthias; Grunewald, Armin; Bruck, Rainer

    2013-01-01

    In this contribution, a concept of an assistive technology for hearing-impaired and deaf persons is presented. The concept applies pattern recognition algorithms and makes use of modern communication technology to analyze the acoustic environment around a user, identify critical acoustic signatures and give an alert to the user when an event of interest happened. A detailed analysis of the needs of deaf and hearing-impaired people has been performed. Requirements for an adequate assisting device have been derived from the results of the analysis, and have been turned into an architecture for its implementation that will be presented in this article. The presented concept is the basis for an assistive system which is now under development at the Institute of Microsystem Engineering at the University of Siegen.

  19. VIP protection from CBRN hazards

    International Nuclear Information System (INIS)

    Kaszeta, D.

    2009-01-01

    Protection of heads of state/government from CBRN threats requires flexibility and advanced planning. The best approach to CBRN countermeasures in a close protection context combine traditional close protection techniques, sound security practices, and a good understanding of the technical nature of the threat. Poor general security practices make for poor CBRN protection. This paper addresses a methodology for assessing the viability of threats to protected persons/VIPs and provides an overview of close protection in the CBRN environment. It is important to define the scope of CBRN response in the close protection context. Some threat agents are more applicable to a military environment than to the type of attack consistent with assassination. By focussing the scope of CBRN close protection more specifically on the more technically viable threats, appropriate concepts of operation can be developed. Concepts of operation, developed with an understanding of the threat, determine the requirement for advanced preparation and the training and equipping of protective details. Most of the responses required in CBRN incidents are well served by tactically sound close protection procedures. The fundamental principles are: rapid identification of hazard, speed, use of protective technology, and medical interventions, including rapid decontamination and basic and advanced life support measures. This paper does not contain confidential or classified information and represents only the opinion of its author. It does not represent any official policy or opinion of the authors present or previous employers.(author)

  20. Measuring relais as an alternative to digital protective systems; Messende Relais als Alternative zu digitalen Schutzsystemen

    Energy Technology Data Exchange (ETDEWEB)

    Wolf, Rainer [Ingenieurgemeinschaft Energieversorgung GbR, Meiningen (Germany)

    2011-07-15

    In order to keep the occasionally severe consequences of electrical faults in switchgear, cables and transformers as low as possible, to reduce the risk to persons and to continue the operation of the not disturbed grid, measuring relays provide for fast and selective fault detection and fault shutdown. In general, it is thought at digital protection systems which are designed for example as a differential protection, distance protection and overcurrent protection. Some applications, however, get along with a lower level of equipment technology, and can be realized more cost-effectively.

  1. Does Personality Matter? Applying Holland's Typology to Analyze Students' Self-Selection into Science, Technology, Engineering, and Mathematics Majors

    Science.gov (United States)

    Chen, P. Daniel; Simpson, Patricia A.

    2015-01-01

    This study utilized John Holland's personality typology and the Social Cognitive Career Theory (SCCT) to examine the factors that may affect students' self-selection into science, technology, engineering, and mathematics (STEM) majors. Results indicated that gender, race/ethnicity, high school achievement, and personality type were statistically…

  2. Co-regulation in EU personal data protection : The case of technical standards and the privacy by design standardisation ‘mandate’

    NARCIS (Netherlands)

    Kamara, Irene

    The recently adopted General Data Protection Regulation (GDPR), a technology-neutral law, endorses self-regulatory instruments, such as certification and technical standards. Even before the adoption of the General Data Protection Regulation, standardisation activity in the field of privacy

  3. Personal Protection: The Way Forward (invited paper)

    International Nuclear Information System (INIS)

    Diffey, B.

    2000-01-01

    The perceived need for sunscreens with ever-increasing sun protection factors is unnecessary and leads to more confusion than clarity. Year-round sun protection achieved by the inclusion of ultraviolet (UV) filters in skin care products intended for daily use is not indicated for people living in northern Europe and may, in fact, be potentially harmful. Future needs for sun protection are likely to be influenced more by global warming than ozone depletion, and by the rising trend for overseas holidays to sunny destinations. (author)

  4. Radiation protection and safety guide no. GRPB-G-4: inspection

    International Nuclear Information System (INIS)

    Schandorf, C.; Darko, O.; Yeboah, J.; Osei, E.K.; Asiamah, S.D.

    1995-01-01

    The use of ionizing radiation and radiation sources in Ghana is on the increase due to national developmental efforts in Health Care, Food and Agriculture, Industry, Science and Technology. This regulatory Guide has been developed to assist both the Regulatory Body (Radiation Protection Board) and operating organizations to perform systematic inspections commensurate with the level of hazard associated with the application of radiation sources and radioactive materials. The present Guide applies to the Radiation Protection and Safety inspection and/or audit conducted by the Radiation Protection Board or Radiation Safety Officer. The present Guide is applicable in Ghana and to foreign suppliers of radiation sources. The present Guide applies to notifying person, licensee, or registrant and unauthorized practice

  5. Toward Privacy-Preserving Personalized Recommendation Services

    Directory of Open Access Journals (Sweden)

    Cong Wang

    2018-02-01

    Full Text Available Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, books, ads, restaurants, and more. In addition, personalized recommendation services have become extremely effective revenue drivers for online business. Despite the great benefits, deploying personalized recommendation services typically requires the collection of users’ personal data for processing and analytics, which undesirably makes users susceptible to serious privacy violation issues. Therefore, it is of paramount importance to develop practical privacy-preserving techniques to maintain the intelligence of personalized recommendation services while respecting user privacy. In this paper, we provide a comprehensive survey of the literature related to personalized recommendation services with privacy protection. We present the general architecture of personalized recommendation systems, the privacy issues therein, and existing works that focus on privacy-preserving personalized recommendation services. We classify the existing works according to their underlying techniques for personalized recommendation and privacy protection, and thoroughly discuss and compare their merits and demerits, especially in terms of privacy and recommendation accuracy. We also identity some future research directions. Keywords: Privacy protection, Personalized recommendation services, Targeted delivery, Collaborative filtering, Machine learning

  6. A reflection about the social and technological aspects in flood risk management - the case of the Italian Civil Protection

    Science.gov (United States)

    Llasat, M. Del Carmen; Siccardi, F.

    2010-01-01

    The right of a person to be protected from natural hazards is a characteristic of the social and economical development of the society. This paper is a contribution to the reflection about the role of Civil Protection organizations in a modern society. The paper is based in the inaugural conference made by the authors on the 9th Plinius Conference on Mediterranean Storms. Two major issues are considered. The first one is sociological; the Civil Protection organizations and the responsible administration of the land use planning should be perceived as reliable as possible, in order to get consensus on the restrictions they pose, temporary or definitely, on the individual free use of the territory as well as in the entire warning system. The second one is technological: in order to be reliable they have to issue timely alert and warning to the population at large, but such alarms should be as "true" as possible. With this aim, the paper summarizes the historical evolution of the risk assessment, starting from the original concept of "hazard", introducing the concepts of "scenario of event" and "scenario of risk" and ending with a discussion about the uncertainties and limits of the most advanced and efficient tools to predict, to forecast and to observe the ground effects affecting people and their properties. The discussion is centred in the case of heavy rains and flood events in the North-West of Mediterranean Region.

  7. Innovative uses of communication technology for HIV programming for men who have sex with men and transgender persons.

    Science.gov (United States)

    Allison, Susannah M; Adams, Darrin; Klindera, Kent C; Poteat, Tonia; Wolf, R Cameron

    2014-01-01

    Globally, overall rates of HIV are on the decline; however, rates among gay men and other men who have sex with men (MSM) and transgender persons are increasing. Meanwhile, there has been exponential growth in access to communication technology over the last decade. More innovative prevention and care technology-based programmes are needed to help address the growing numbers of MSM and transgender persons living with HIV and those at risk for infection. To address this need, a meeting was hosted by the U.S. Agency for International Development (USAID) through the President's Emergency Plan for AIDS Relief (PEPFAR) and co-sponsored by amfAR, The Foundation for AIDS Research and the National Institute of Mental Health (NIMH). The meeting brought together researchers, community implementers, advocates and federal partners to discuss the current landscape of technology-based interventions for MSM and transgender persons and to discuss key considerations. Presentations and discussions focused on the research gaps, facilitators and barriers to programme implementation and public-private partnerships. This article summarizes the meeting proceedings and outlines key considerations for future work in this area.

  8. Technologies to Support Community-Dwelling Persons With Dementia: A Position Paper on Issues Regarding Development, Usability, Effectiveness and Cost-Effectiveness, Deployment, and Ethics

    Science.gov (United States)

    Innes, Anthea; Mountain, Gail; Robinson, Louise; van der Roest, Henriëtte; García-Casal, J Antonio; Gove, Dianne; Thyrian, Jochen René; Evans, Shirley; Dröes, Rose-Marie; Kelly, Fiona; Kurz, Alexander; Casey, Dympna; Szcześniak, Dorota; Dening, Tom; Craven, Michael P; Span, Marijke; Felzmann, Heike; Tsolaki, Magda; Franco-Martin, Manuel

    2017-01-01

    Background With the expected increase in the numbers of persons with dementia, providing timely, adequate, and affordable care and support is challenging. Assistive and health technologies may be a valuable contribution in dementia care, but new challenges may emerge. Objective The aim of our study was to review the state of the art of technologies for persons with dementia regarding issues on development, usability, effectiveness and cost-effectiveness, deployment, and ethics in 3 fields of application of technologies: (1) support with managing everyday life, (2) support with participating in pleasurable and meaningful activities, and (3) support with dementia health and social care provision. The study also aimed to identify gaps in the evidence and challenges for future research. Methods Reviews of literature and expert opinions were used in our study. Literature searches were conducted on usability, effectiveness and cost-effectiveness, and ethics using PubMed, Embase, CINAHL, and PsycINFO databases with no time limit. Selection criteria in our selected technology fields were reviews in English for community-dwelling persons with dementia. Regarding deployment issues, searches were done in Health Technology Assessment databases. Results According to our results, persons with dementia want to be included in the development of technologies; there is little research on the usability of assistive technologies; various benefits are reported but are mainly based on low-quality studies; barriers to deployment of technologies in dementia care were identified, and ethical issues were raised by researchers but often not studied. Many challenges remain such as including the target group more often in development, performing more high-quality studies on usability and effectiveness and cost-effectiveness, creating and having access to high-quality datasets on existing technologies to enable adequate deployment of technologies in dementia care, and ensuring that ethical

  9. The correlation between the use of personal protective equipment and level wild-type p53 of dental technicians in Surabaya

    Directory of Open Access Journals (Sweden)

    Puspa Dila Rohmaniar

    2017-03-01

    Full Text Available Background: Exposure of metals among dental technicians that come from the working environment can lead to the formation reactive oxygen species (ROS. ROS can cause mutations in the p53 gene (p53. The mutation is transversion mutation GuanineThymine. p53 mutations can lead to low expression of the wild-type p53 protein (p53. Wild-type p53 involved in many biological processes such as regulation of genes involved in cell cycle, cell growth after DNA damage, and apoptosis. However, exposure to metals among dental technicians can be prevented through the use of personal protective equipment (PPE during work. Purpose: The purpose of this study was to analyze the correlation between the use of personal protective equipment to wild-type p53 protein levels among dental technicians in Surabaya. Method: This study was observational analytic with cross sectional approach. 40 samples were taken by random sampling. Data were retrieved through interviews and observations. Wild-type p53 was analyzed from saliva with indirect ELISA method. Analysis of data used Kolmogorov Smirnov normality test and a Pearson correlation test. Value significance was p<0.05 (95% confidence level. Result: There was a significant association between the use of personal protective equipment with wild-type p53 levels with p=0.002 Conclusion: The use PPE properly is positively correlated with the wild-type p53 protein levels of dental technicians in Surabaya.

  10. Personalism for public health ethics

    Directory of Open Access Journals (Sweden)

    Carlo Petrini

    2010-06-01

    Full Text Available In public health ethics, as in bioethics, utilitarian approaches usually prevail, followed by Kantian and communitarian foundations. If one considers the nature and core functions of public health, which are focused on a population perspective, utilitarianism seems still more applicable to public health ethics. Nevertheless, faulting additional protections towards the human person, utilitarianism doesn't offer appropriate solutions when conflicts among values do arise. Further criteria must be applied to protect the fundamental principles of respect for human life. Personalism offers similar advantages to utilitarianism but warrants more protection to the human person. We suggest a possible adaptation of personalism in the specific field of public health by means of four principles: absolute respect for life or principle of inviolability; subsidiarity and the "minimum" mandatory principle; solidarity; justice and non discrimination.

  11. Personalism for public health ethics.

    Science.gov (United States)

    Petrini, Carlo; Gainotti, Sabina; Requena, Pablo

    2010-01-01

    In public health ethics, as in bioethics, utilitarian approaches usually prevail, followed by Kantian and communitarian foundations. If one considers the nature and core functions of public health, which are focused on a population perspective, utilitarianism seems still more applicable to public health ethics. Nevertheless, faulting additional protections towards the human person, utilitarianism doesn't offer appropriate solutions when conflicts among values do arise. Further criteria must be applied to protect the fundamental principles of respect for human life. Personalism offers similar advantages to utilitarianism but warrants more protection to the human person. We suggest a possible adaptation of personalism in the specific field of public health by means of four principles: absolute respect for life or principle of inviolability; subsidiarity and the "minimum" mandatory principle; solidarity; justice and non discrimination.

  12. Guidance notes for the protection of persons against ionising radiations arising from medical and dental use

    International Nuclear Information System (INIS)

    1988-01-01

    Guidance notes have been prepared by the NRPB, the Health Departments and the Health and Safety Executive for the protection of all persons against ionising radiations arising from medical and dental use. The guidance notes are a guide to good radiation protection practice consistent with regulatory requirements. The areas covered include medical and dental radiology, diagnostic X-ray equipment for medical and dental radiography, beam therapy and remotely controlled after-loading, brachytherapy, diagnostic and therapeutic uses of unsealed radioactive substances, diagnostic uses of sealed or other solid radioactive sources, patients leaving hospital after administration of radioactive substances, precautions after death of a patient whom radioactive substances have been administered, storage and movement of radioactive substances, disposal of radioactive waste and contingency planning and emergency procedures. (U.K.)

  13. The Mediator Effect of Career Development between Personality Traits and Organizational Commitment: The Example of Sport Communication Technology Talents

    Science.gov (United States)

    Lo, Hung-Jen; Lin, Chun-Hung; Tung-Hsing, Lin; Tu, Peng-Fei

    2014-01-01

    This paper explored the relationships among career development, personality trait, and organizational commitment and examines whether career development mediates the relationship between personality trait and organizational commitment. The sample was 275 sport communication technology talents in Taiwan. The instrument included the Personality…

  14. Balancing autonomy and protection: A qualitative analysis of court hearings dealing with protective measures.

    Science.gov (United States)

    Fallon-Kund, Marie; Coenen, Michaela; Bickenbach, Jerome E

    Respect for individual autonomy is at the core of the Convention on the Rights of Persons with Disabilities (CRPD). However, the need to protect persons with disabilities, especially those with cognitive impairments and psychosocial conditions, from outright exploitation, violence and abuse is explicitly provided for in article 16. Legal authorities still decide on a daily basis upon the institution of measures, which aim to protect vulnerable persons and unavoidably impact on the autonomy of persons concerned, known as guardianship, curatorship or administration. Observations of court hearings, interviews with judges and analysis of written materials from the cantons of Geneva and Vaud in Switzerland as well as from Belgium - which all have differently composed authorities - were carried out in order to identify what influences authorities in decision-making processes regarding protective measures, and to explore how autonomy and protection can be balanced. We suggest pragmatic considerations that should not be ignored when trying to reach a balance between autonomy and protection from abuse, in line with the CRPD. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Privacy protection on the internet: The European model

    Directory of Open Access Journals (Sweden)

    Baltezarević Vesna

    2017-01-01

    Full Text Available The Internet has a huge impact on all areas of social activity. Everyday life, social interaction and economics are directed to new information and communication technologies. A positive aspect of the new technology is reflected in the fact that it has created a virtual space that has led to the elimination of the various barriers, which has enabled interaction and information exchange across the world. Inclusion in the virtual social network provides connectivity for communicators who are looking for space that allows them freedom of expression and connect them with new ' friends'. Because of the feeling of complete freedom and the absence of censorship on the network communicators leave many personal details and photos, without thinking about the possible abuses of privacy. Recording of the different incidents on the network has resulted in the need to take precaution measures, in order to protect the users and the rule of law, given that freedom on the network is only possible with the existence of an adequate system of safety and security. In this paper we deal with the problem of the protection of personal data of users of virtual social networks against malicious activity and abuse, with special reference to the activities of the European Union in an effort to regulate this area. The European Commission has concentrated on finding the best solutions to protect the user's virtual space for more than two decades, starting from 1995 until a directive on security of networks and information systems, which was adopted in the first half of 2016.

  16. Use of personal radiation protection tools and individual dosimetric monitoring in a sample of interventional cardiologists in France, 2005-2009

    International Nuclear Information System (INIS)

    Jacob, S.; Bertrand, A.; Laurier, D.; Bernier, M.O.; Scanff, P.

    2014-01-01

    Interventional cardiologists (ICs) are repeatedly exposed to scattered ionising radiation during the cardiac procedures they perform, and radiation protection is an important issue for these medical professionals. The use of radiation protection tools is particularly relevant to this population. SISERI (Systeme d'Information de la Surveillance de l'Exposition aux Rayonnement Ionisants, that is, an information system for monitoring exposure to ionising radiation) is a register that stores personal dosimeter readings for dosimetric monitoring. This paper, based on data for a sample of French ICs from the O'CLOC epidemiological study, aims to provide an overview of the use of radiation protection equipment and dosimetric devices reported by ICs in a specific questionnaire as well as the dosimetric information found in the SISERI database for this population. Material and Methods - Annual information on interventional cardiology activity for the period from 01/01/2005 to 31/12/2009 was collected in an occupational questionnaire. ICs were asked to report the frequency in which they used individual dosimeter and radiation protection tools (lead apron, thyroid shield, eye-wear or face shield, ceiling-suspended shield) as follows: never (0% of the time), occasionally ( 50%), always (100%). We retrieved their medical radiation exposure information (monitored status and monthly effective doses) from the SISERI database for the period 2005-2009. Results - Information for 132 ICs (mean age in 2005 = 46 ± 7 years) was available. All ICs reported routine use of lead aprons, in contrast to their occasional use of lead eye-wear or face shields. During the study period, 49% reported systematic use of personal dosimeters, and 21% more regular use. On the other hand, 18% never used a dosimeter during this period. The SISTERI database included 92% of our population, 73% of whom had complete annual dose monitoring in SISERI (corresponding to at least 11 months per year of recorded

  17. The revolution of personalized psychiatry: will technology make it happen sooner?

    Science.gov (United States)

    Perna, G; Grassi, M; Caldirola, D; Nemeroff, C B

    2018-04-01

    Personalized medicine (PM) aims to establish a new approach in clinical decision-making, based upon a patient's individual profile in order to tailor treatment to each patient's characteristics. Although this has become a focus of the discussion also in the psychiatric field, with evidence of its high potential coming from several proof-of-concept studies, nearly no tools have been developed by now that are ready to be applied in clinical practice. In this paper, we discuss recent technological advances that can make a shift toward a clinical application of the PM paradigm. We focus specifically on those technologies that allow both the collection of massive as much as real-time data, i.e., electronic medical records and smart wearable devices, and to achieve relevant predictions using these data, i.e. the application of machine learning techniques.

  18. Persons with Multiple Disabilities Use Orientation Technology to Find Room Entrances during Indoor Traveling

    Science.gov (United States)

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Scigliuzzo, Francesca; Signorino, Mario; Oliva, Doretta; Smaldone, Angela; La Martire, Maria L.

    2010-01-01

    These two studies assessed adapted orientation technology for promoting correct direction and room identification during indoor traveling by persons with multiple (e.g., sensory, motor and intellectual/adaptive) disabilities. In Study I, two adults were included who had severe visual impairment or total blindness and deafness and used a wheelchair…

  19. Protecting personal data in camera surveillance practices

    NARCIS (Netherlands)

    Dubbeld, L.

    2005-01-01

    This paper explores in which ways privacy (in particular, data protection principles) comes to the fore in the day-to-day operation of a public video surveillance system. Starting from current European legal perspectives on data protection, and building on an empirical case study, the meanings and

  20. ANIMAL WASTE IMPACT ON SOURCE WATERSAIDED BY EPA/NSF ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) SOURCE WATER PROTECTION PILOT

    Science.gov (United States)

    The Environmental Technology Verification Program (ETV) was established in 1995 by the U.S. Environmental Protection Agency to encourage the development and commercialization of new environmental technologies through third part testing and reporting of performance data. By ensur...

  1. Prospects of cloud technology development: information safety and personal data protection in cloud media

    International Nuclear Information System (INIS)

    Malyuk, A.A.; Ozhered, I.V.

    2013-01-01

    Proper definitions are given and an architecture is proposed for the model of cloud computing. Approaches that can ensure the safety on each level of the architecture are considered. Special attention is given to issues related to the confidence of providers, authentic user identification, and data encoding, juridical issues that are encountered in the use of this technology, prospects of its implementation, and further development of cloud computing [ru

  2. 30 CFR 57.15004 - Eye protection.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Eye protection. 57.15004 Section 57.15004... SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-UNDERGROUND METAL AND NONMETAL MINES Personal Protection Surface and Underground § 57.15004 Eye protection. All persons shall wear safety glasses, goggles, or face...

  3. Standardising antisocial personality disorder: the social shaping of a psychiatric technology.

    Science.gov (United States)

    Pickersgill, Martyn

    2012-05-01

    The Diagnostic and Statistical Manual of Mental Disorders (DSM) is one of the most influential and controversial terminological standards ever produced. As such, it continues to provide a valuable case study for sociologists of health and illness. In this article I take as my focus one particular DSM category: antisocial personality disorder (ASPD). The analysis charts the shifting understandings of personality disorders associated with antisocial behaviour in the DSM and in US psychiatry more broadly from 1950 to the present day. Memos, letters and minutes produced by the DSM-III committee and held in the American Psychiatric Association (APA) archives ground the discussion. Finally, the article explores more recent constructions of antisocial personality disorder and examines the anticipatory discourse pertaining to the rewriting of this category expected in the forthcoming DSM-5. In presenting an in-depth socio-historical narrative of the development - and potential future - of standards for pathological antisociality, this analysis casts new light on the ASPD construct. In particular, by considering it as a technology, I elaborate how processes of path dependency constrain innovation and how imaginaries of users and publics are implicated in the APA debates constitutive of this. © 2011 The Authors. Sociology of Health & Illness © 2011 Foundation for the Sociology of Health & Illness/Blackwell Publishing Ltd.

  4. Mechanism of personal privacy protection based on blockchain%基于区块链的个人隐私保护机制

    Institute of Scientific and Technical Information of China (English)

    章宁; 钟珊

    2017-01-01

    Aiming at the problem of personal privacy protection in Interact car rental scenario,a personal privacy protection mechanism based on blockchain was proposed.Firstly,a framework for personal privacy protection based on blockchain was proposed for solving personal privacy issues exposed in the Internet car rental.Secondly,the design and definition of the model were given by participant profile,database design and performance analysis,and the framework and implementation of the model were expounded from the aspects of granting authority,writing data,reading data and revoking authority.Finally,the realizability of the mechanism was proved by the system development based on blockchain.%针对互联网租车场景中个人隐私保护问题,提出一种基于区块链的个人隐私保护机制.首先,针对互联网租车中暴露的个人隐私问题提出一个基于区块链的个人隐私保护解决方案框架;然后,通过参与者简介、数据库设计以及性能分析给出模型的设计和定义,并从授予权限、写入数据、读取数据和撤销权限等方面阐述该模型的框架和实现;最后,通过基于区块链的系统开发表明了该机制的可实现性.

  5. Meeting United States re-licensing requirements related to environmental protection using innovative technologies

    International Nuclear Information System (INIS)

    Taft, E.P.; Winchell, F.C.; Cook, T.C.

    1998-01-01

    Procedure for meeting re-licensing requirements related to environmental protection and an overview of several new and emerging technologies regarding the development of ways to prevent fish passage through hydraulic turbines at hydroelectric power dams is described. Fish mortality and injury has long been a concern in the hydroelectric industry and research and development efforts have been ongoing since the 1970s to prevent fish passage through turbines. Several new and emerging technologies are examined that have the potential for wide-spread cost-effective applications

  6. A person having ability in radiation protection: an original measure in comparison with the common rights for work safety

    International Nuclear Information System (INIS)

    Pasquier, J.L.; Vidal, J.P.

    1998-01-01

    In accordance with the regulations, any factory using ionising radiations is obliged to designate a person having having ability in radiation protection and entrusted with specific missions regarding safety for professional risks. This represents an original measure in comparison with the common rights for work safety. The decree whose became operative on 2 october 1986, about ten years ago and just before the reform of radiation protection standards, it seems important to store in memory the genesis and the goals of this prescription and to present the results. (authors)

  7. Physical Protection of Nuclear Safeguards Technology

    International Nuclear Information System (INIS)

    Hoskins, Richard

    2004-01-01

    IAEA's Nuclear Security Plan is established to assist Member States in implementing effective measures against nuclear terrorism. Four potential threats were identified: theft of nuclear weapon, nuclear explosive device, radiological dispersal device and an attack on radiation facility. In order to achieve effective protection of nuclear materials and facilities, the IAEA sponsored the Convention of the Physical Protection of Nuclear Materials which focuses on the protection of nuclear materials 'in international transport. The IAEA also promoted INFCIRC/255 entitled the Physical Protection of Nuclear Materials and Nuclear Facilities and published TECDOC/967 for the protection of nuclear materials and facilities against theft and sabotage and during transport. Assistance is available for the Member States through the International Physical Protection Advisory Service (IPPAS) and the International Nuclear Security Advisory Service (INSServ). (author)

  8. 30 CFR 56.15004 - Eye protection.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Eye protection. 56.15004 Section 56.15004... SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES Personal Protection § 56.15004 Eye protection. All persons shall wear safety glasses, goggles, or face shields or other suitable...

  9. 14 CFR 139.335 - Public protection.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Public protection. 139.335 Section 139.335... Operations § 139.335 Public protection. (a) In a manner authorized by the Administrator, each certificate... persons or vehicles; and (2) Reasonable protection of persons and property from aircraft blast. (b...

  10. Diplomatic Protection

    OpenAIRE

    Režná, Jana

    2006-01-01

    Final thesis Topic: Diplomatic protection Thesis supervisor: JUDr. Vladimír Balaš, CSc. Student: Marek Čermák Thesis on the topic of diplomatic protection deals with the granting of exercise of diplomatic protection by the states and is divided into seven chapters which follow each other. The first chapter describes the diplomatic protection and its historical foundations. The second chapter focuses on the possibility of exercise of diplomatic protection in respect of natural persons and the ...

  11. Development of radiation protection technology for application of the retired steam generator, Kori Unit no. 1

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. H.; Jang, D. C.; Song, K. S.; Lee, S. J.; Ahn, C. S.; Kim, D. H.; Im, Y. K.; Kim, H. D. [Hanil Nuclear Co., Ltd., Anyang (Korea, Republic of)

    2005-04-15

    It is a field study to develop and verify maintenance technologies such as verification and technology development of ECT (Eddy current test) using failure, heat tube excavation and field pressure test regarding the utilization of retired steam generator using 2 units of Retired Steam Generator in Kori 1 that was replaced for the first time in Korea in 1998. Since May, 2003, our team has investigated Retired Steam Generator which was stored in Radioactive waste warehouse in Korea Hydro and Nuclear Power Kori unit no.1 Branch, in order to study natural fault ECT signal acquisition, maintenance technology verification, small tubes/samples abstraction. A temporal task zone was made focusing on 'Man Way at the bottom of Chamber 'A'.' The purpose of the study is to establish Radiological Protection and Radioactive Waste Treatment Plan by setting ALARA (As Low As Reasonably Achievable) goal systematically, which is the basic concept of Radiological Protection and reduction in exposure of radiological workers to radioactive materials with proper Radiological Protection countermeasures according to the changes in radioactivity, to prevent expansion from contamination and to manage 'Radioactive Waste Reduction Activities' effectively.

  12. Extending technology-aided leisure and communication programs to persons with spinal cord injury and post-coma multiple disabilities.

    Science.gov (United States)

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Ricciuti, Riccardo A; Trignani, Roberto; Oliva, Doretta; Signorino, Mario; D'Amico, Fiora; Sasanelli, Giovanni

    2015-01-01

    These two studies extended technology-aided programs to promote leisure and communication opportunities to a man with cervical spinal cord injury and a post-coma man with multiple disabilities. The studies involved the use of ABAB designs, in which A and B represented baseline and intervention phases, respectively. The programs focused on enabling the participants to activate songs, videos, requests, text messages, and telephone calls. These options were presented on a computer screen and activated through a small pressure microswitch by the man with spinal cord injury and a special touch screen by the post-coma man. To help the latter participant, who had no verbal skills, with requests and telephone calls, series of words and phrases were made available that he could activate in those situations. Data showed that both participants were successful in managing the programs arranged for them. The man with spinal cord injury activated mean frequencies of above five options per 10-min session. The post-coma man activated mean frequencies of about 12 options per 20-min session. Technology-aided programs for promoting leisure and communication opportunities might be successfully tailored to persons with spinal cord injury and persons with post-coma multiple disabilities. Implications for Rehabilitation Technology-aided programs may be critical to enable persons with pervasive motor impairment to engage in leisure activities and communication events independently. Persons with spinal cord injury, post-coma extended brain damage, and forms of neurodegenerative disease, such as amyotrophic lateral sclerosis, may benefit from those programs. The programs could be adapted to the participants' characteristics, both in terms of technology and contents, so as to improve their overall impact on the participants' functioning and general mood.

  13. The right to the protection of personal data between law and constitution

    Directory of Open Access Journals (Sweden)

    Maria Carmen Aguilar Del Castillo

    2016-06-01

    Full Text Available The aim of the article is, on the one hand, to analyze the content and scope of fundamental right to the protection of personal data, provided by art. 18.4 of the Spanish Constitution; on the other, to decline this right in the context of the employment relationship starting from the interpretation given by the Spanish Constitutional Court in judgment no. 39/2016. The contrast between this right and the freedom of enterprise, which is realized in the power of organization, control and supervision of work performance, is resolved by the Constitutional Court in the light of the principles of proportionality, suitability and necessity. The outcome of the balancing leads the Constitutional Court to establish the prevalence of the entrepreneurial freedom on the right to privacy of the employee.

  14. Training in radiological protection for nuclear programmes

    International Nuclear Information System (INIS)

    1975-01-01

    Many Member States are developing or already have developed their own national training programmes. The IAEA is actively involved in promoting training in radiological protection for nuclear programmes. The various types of training are fully discussed, with suggested curricula. An earlier report was published as Technical Reports Series No.31 in 1964. In 1973, new and additional information was received from Member States which is reflected in the present report. Training programmes are classified, according to those requiring training: specialists; persons whose work is closely related to radiological protection (administrators, public health officers and industrial health personnel, safety inspectors and engineers in nuclear installations, public service personnel); persons working with radiation; and the general public. Forms, scope and duration of training are discussed. Different types of training programmes are currently required for training of medical doctors (those providing medical surveillance for radiation workers and others dealing with public health aspects of radiation hazards), for technical supervisors, radiologists, and qualified workers in nuclear medicine, technological staff, administrators, persons working with radiation, and public service personnel. Standard curricula and desirable experiments and exercises are discussed. The organization of training together with the facilities, equipment and teaching staff required are considered, as is follow-up training. Annexes 1 to 4 give examples of training curricula and training courses available in various countries, a suggested syllabus for training of technical supervisors, and a bibliography consisting of 210 references dealing with general topics, nuclear radiation physics, radiochemistry and radiation chemistry, radiation biology and biophysics, dosimetry and health physics and radiation protection, medical aspects and toxicology, and environmental aspects

  15. Isotope production technologies from a regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Murthy, K. [Canadian Nuclear Safety Committee, Ottawa, Ontario (Canada)

    2012-07-01

    This paper discusses isotope production technologies from a regulatory perspective. The regulator is the CNSC which has the mandate to protect the health, safety and security of persons and the environment and to implement Canada's international commitments on the peaceful use of nuclear energy. Nuclear facilities regulated by CNSC include linear accelerator (medical), pool irradiator (industrial) and Pelletron (research) as well as cyclotrons.

  16. Research and development in radiological protection

    International Nuclear Information System (INIS)

    Butragueno, J. L.; Villota, C.; Gutierrez, C.; Rodriguez, A.

    2004-01-01

    The objective of Radiological Protection is to guarantee that neither people, be they workers or members of the public, or the environment are exposed to radiological risks considered by society to be unacceptable. Among the various resources available to meet this objective is Research and Development (R and D), which is carried out in three areas: I. Radiological protection of persons: (a) knowledge of the biological effects of radiations, in order to determine the relationship that exists between radiation exposure dose and its effects on health; (b) the development of new personal dosimetry techniques in order to adapt to new situations, instrumental techniques and information management technologies allowing for better assessment of exposure dose; and (c) development of the principle of radiological protection optimisation (ALARA), which has been set up internationally as the fundamental principle on which radiological protection interventions are based. II. Assessment of environmental radiological impact, the objective of which is to assess the nature and magnitude of situations of exposure to ionising radiations as a result of the controlled or uncontrolled release of radioactive material to the environment, and III.Reduction of the radiological impact of radioactive wastes, the objective of which is to develop radioactive material and waste management techniques suitable for each situation, in order to reduce the risks associated with their definitive management or their release to the environment. Briefly described below are the strategic lines of R and D of the CSN, the Electricity Industry, Ciemat and Enresa in the aforementioned areas. (Author)

  17. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  18. The general law on persons with disabilities and the right to self-determination of people with mental disabilities.

    OpenAIRE

    Espinoza Espinoza, Juan; Universidad de San Martín de Porres

    2015-01-01

    This law is extremely important, since repealed and modified quite a few articles of the Civil Code related to exercise capacity. Indeed, aims to establish the legal framework for the promotion, protection and realization, equal, rights of persons with disabilities, promoting their development and full and effective inclusion in the political, economic, social, cultural and technological (art. 1.°), the defines a disabled person. Esta ley es sumamente importancia por cuanto ha derogado y m...

  19. How conservative is routine personal dosimetry monitoring in diagnostic radiology?

    International Nuclear Information System (INIS)

    Boetticher, H. von; Lachmund, J.; Hoffmann, W.

    2007-01-01

    Purpose: Dose values obtained by official personal radiation exposure monitoring are often considered equivalent to the effective dose of a person. This paper provides estimates of the extent of deviation between the two dose concepts under various conditions. Materials and Methods: Doses for patients and personnel were measured using thermoluminescence dosimeters for five different geometries at three work settings in a radiology department. Patients and personnel were simulated with anthropomorphic phantoms. Different types of protective clothing as well as permanent protection shields were considered in the calculations. Results: Dose values obtained by official personal dose monitoring are conservative only for specific radiation protection situations. With state-of-the-art personal protective equipment (wrap-around style lead apron with thyroid shield), the ratio between effective dose and personal dose varies between 0.6 and 1.25. Without thyroid protection the official personal dose systematically underestimates the effective dose: for protective clothing with 0.5 mm lead equivalent without thyroid shielding, the effective dose exceeds the personal dose by factors between 1.7 and 3.1. If protective clothing with lead equivalent 0.35 mm is used, this factor varies between 1.1 and 1.82. (orig.)

  20. Protective coatings for high temperature alloys state of technology

    International Nuclear Information System (INIS)

    Goward, G.W.

    1976-01-01

    Coatings used on nickel- and cobalt-base superalloy blades and vanes in gas turbine engines typify the state of coating technology for high temperature alloys. Coatings formed by interdiffusion of aluminum with the alloys to form layers consisting mainly of intermetallic compounds, such as NiAl and CoAl, were the first systems used for protection of gas turbine airfoils. The protectivity of these systems is derived from the formation of protective alumina scales. In a general way, coating degradation occurs by cyclic oxidation, molten salt hot corrosion and, at higher temperatures, interdiffusion with the substrate. Thermal fatigue properties are governed by the brittle-ductile transition behavior of the intermetallic compounds NiAl and CoAl. Both positive and negative effects occur, depending on the shapes of thermal strain-temperature curves for particular applications. Significant increases in hot corrosion and oxidation resistance have been obtained by the incorporation of noble metals, such as platinum, in aluminide coatings. The so-called MCrAlY overlay coatings, based on nickel, cobalt, iron and combinations thereof with chromium, aluminum and yttrium can be formulated over a wide range of compositions nominally independent of those of substrate alloys. Improved oxidation resistance and, in part, hot corrosion resistance is derived from yttrium which enhances protective oxide adherence. Mechanical properties, principally ductility, and therefore thermal fatigue resistance, can be adjusted to the requirements of specific applications. Incremental improvements in performance of the MCrAlY coatings are expected as research programs define degradation mechanisms in greater detail and more complex compositions are devised. More basic evaluations of mixed metal-ceramic insulative coatings have been initiated to determine if these systems are capable of effecting further increases in airfoil durability

  1. The right to life and criminal-law protection of the human person in the Western Balkans

    Directory of Open Access Journals (Sweden)

    Etlon Peppo

    2015-07-01

    Full Text Available The basic principle for which a democratic governance stands, are expressed in the “Declaration of Independence of the United States of America with the words of Thomas Jefferson: “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights that among these are Life, Liberty and the Pursuit of Happiness. That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed” The government of a democratic state does not exist to recognize the basic human rights, but to respect and guarantee the protection of these rights that any person possesses and benefits due to his existence starting from the most important right: The right to life, which is faced against the duty of the state for the protection of the human person’s life! In this sense this article analyzes the criminal-law protection of life in the Western Balkans.

  2. Harnessing sensor and information/communication technologies to revolutionize how environmental data are collected and integrated to protect public health

    International Nuclear Information System (INIS)

    MacDonell, Margaret M.; Raymond, Michelle; Chang, Young-Soo; Armbruster, Walter J.

    2013-01-01

    Monitoring the levels of pollutants in ambient air has long been the responsibility of environmental agencies, and traditional programs have relied on a relatively small number of fixed stations that are expensive to install and operate. The spatial coverage of pollutant data ranges from limited in many urban areas to very sparse in smaller suburban and rural areas. Increasingly, the latter are being affected by new pollutant sources such as backyard drilling systems for energy development, and concentrated animal feeding operations and biodiesel production facilities on former agricultural lands. Regional measurement stations are not able to inform local communities about the types and concentrations of pollutants in their ambient and indoor air. Meanwhile, epidemiology studies and clinical data continue to indicate a link between air pollutants and adverse health effects, including respiratory and cardiovascular disease. With asthma on the rise and heart disease among the leading killers, the public has become increasingly concerned about knowing what their personal exposure levels are so they can determine appropriate measures to protect their health. To address this long-standing need, the U.S. Environmental Protection Agency (EPA) has embarked upon an innovative program to improve the understanding of air pollution at the community and neighborhood scales. This program harnesses striking advances in sensor technology, mobile applications, and environmental informatics, with citizens playing a key role. The goal is to facilitate the development and widespread use of inexpensive mobile sensors, for widespread collection and integration of air quality data by citizens across the nation (and world), to help guide environmental health protection programs. (orig.)

  3. Harnessing sensor and information/communication technologies to revolutionize how environmental data are collected and integrated to protect public health

    Energy Technology Data Exchange (ETDEWEB)

    MacDonell, Margaret M.; Raymond, Michelle; Chang, Young-Soo [Argonne National Laboratory, Lemont, IL (United States); Armbruster, Walter J. [Farm Foundation, Darien, IL (United States)

    2013-07-01

    Monitoring the levels of pollutants in ambient air has long been the responsibility of environmental agencies, and traditional programs have relied on a relatively small number of fixed stations that are expensive to install and operate. The spatial coverage of pollutant data ranges from limited in many urban areas to very sparse in smaller suburban and rural areas. Increasingly, the latter are being affected by new pollutant sources such as backyard drilling systems for energy development, and concentrated animal feeding operations and biodiesel production facilities on former agricultural lands. Regional measurement stations are not able to inform local communities about the types and concentrations of pollutants in their ambient and indoor air. Meanwhile, epidemiology studies and clinical data continue to indicate a link between air pollutants and adverse health effects, including respiratory and cardiovascular disease. With asthma on the rise and heart disease among the leading killers, the public has become increasingly concerned about knowing what their personal exposure levels are so they can determine appropriate measures to protect their health. To address this long-standing need, the U.S. Environmental Protection Agency (EPA) has embarked upon an innovative program to improve the understanding of air pollution at the community and neighborhood scales. This program harnesses striking advances in sensor technology, mobile applications, and environmental informatics, with citizens playing a key role. The goal is to facilitate the development and widespread use of inexpensive mobile sensors, for widespread collection and integration of air quality data by citizens across the nation (and world), to help guide environmental health protection programs. (orig.)

  4. Personal Privacy Protection in Big Data Era%大数据时代个人隐私的保护

    Institute of Scientific and Technical Information of China (English)

    张永兵

    2016-01-01

    近年来,以云计算为基础平台的大数据时代正式到来,大数据因蕴藏有巨大的商业价值而使不法分子想方设法盗取个人隐私数据,从而影响用户的正常生活。本文通过分析大数据时代个人隐私安全面临的严峻挑战,对个人隐私保护所采用的技术措施进行总结,并提出了个人或企业应遵守的法律和行业规范,最后探索了个人隐私保护的进一步研究方向。%In recent years, the era of big data based on cloud computing platform officially arrived, and big data contains a huge commercial value and makes the criminals try to steal personal privacy data, thus affecting the normal life of the user. By analyzing the challenges faced by the privacy security in the era of big data, summarize the technical measures adopted in the protection of personal privacy, put forward the laws and industry standards the individual or enterprise should abide by, and finally explore the direction of further research on the protection of personal privacy.

  5. Effect of health education based on BASNEF pattern on use of personal protective respiratory equipment in Ahvaz carbon block factory workers, 2009

    Directory of Open Access Journals (Sweden)

    M Solhi

    2012-11-01

    Full Text Available   Background and aims: Respiratory diseases due to work with 50 million annually incidence included one third of all occupational diseases and it is one of the main causes of absenteeism from work in workers. Some occupational diseases can be prevented with personal protective equipment. BASNEF model is one of the effective health education and safety training models for workers. The aim of this study was to determine the effect of educational intervention based on BASNEF pattern on increasing the use of personal protective respiratory equipment among carbon black factory workers , where many air pollutants such as carbon block exists. Methods: In this study the intervention curriculum based on BASNEF pattern administrated on 100 (experimental and control Ahvaz carbon block factory workers. Data were collected by questionnaires. The data were analyzed by Independent T, χ square and Pearson correlation co- efficient using SPSS version16.   Results : After the intervention, the mean scores of knowledge, attitude, intention, and enabling factors showed significant increase in experimental group in comparison of control group (p<0.00001. In addition, the mean score of subjective norms in experimental and control groups showed no significant differences. Conclusion: The educational program based on BASNEF pattern was effective in improving the use of respiratory personal protective equipment in Ahvaz carbon block factory workers 

  6. Accident with radioactive substances in laboratory. An exercise during the education of persons in radiation protection, who are working with open radioactive sources

    International Nuclear Information System (INIS)

    Stolze, B.

    2003-01-01

    In spite of carefulness it is possible,that contamination occur by handling unscaled radioactive sources or in case of an accident. It is demonstrated in an exercise managing an accident with unscaled radioactive sources. The persons, who are educated in radiation protection for handling unsealed radioactive sources, must have knowledge of theoretical regulations of the radiation protection law and of the limits in radiation protection. Also they have to know the handling to reduce possible contamination. They have to be able to calculate the dose of skin contamination. In my lecture I give some information on regulations of accidents with radioactive sources in Germany and a scenario of an accident and I explain, what is to do to manage this event. A person opened an ampoule. The activity splashed and contaminated the person's hand, arm and face. Also in the room there was a contamination. The desk and the floor were contaminated. There were 50 MBq P-32 as NaH 2 P''32O 3 in water solution, I give a report on practices in our courses, which the participants have to do. The radiological experts have to decontaminate the skin and they have to calculate the skin-dose and to give the information to the authorities. (Author) 4 refs

  7. Technologies to Support Community-Dwelling Persons With Dementia: A Position Paper on Issues Regarding Development, Usability, Effectiveness and Cost-Effectiveness, Deployment, and Ethics.

    Science.gov (United States)

    Meiland, Franka; Innes, Anthea; Mountain, Gail; Robinson, Louise; van der Roest, Henriëtte; García-Casal, J Antonio; Gove, Dianne; Thyrian, Jochen René; Evans, Shirley; Dröes, Rose-Marie; Kelly, Fiona; Kurz, Alexander; Casey, Dympna; Szcześniak, Dorota; Dening, Tom; Craven, Michael P; Span, Marijke; Felzmann, Heike; Tsolaki, Magda; Franco-Martin, Manuel

    2017-01-16

    With the expected increase in the numbers of persons with dementia, providing timely, adequate, and affordable care and support is challenging. Assistive and health technologies may be a valuable contribution in dementia care, but new challenges may emerge. The aim of our study was to review the state of the art of technologies for persons with dementia regarding issues on development, usability, effectiveness and cost-effectiveness, deployment, and ethics in 3 fields of application of technologies: (1) support with managing everyday life, (2) support with participating in pleasurable and meaningful activities, and (3) support with dementia health and social care provision. The study also aimed to identify gaps in the evidence and challenges for future research. Reviews of literature and expert opinions were used in our study. Literature searches were conducted on usability, effectiveness and cost-effectiveness, and ethics using PubMed, Embase, CINAHL, and PsycINFO databases with no time limit. Selection criteria in our selected technology fields were reviews in English for community-dwelling persons with dementia. Regarding deployment issues, searches were done in Health Technology Assessment databases. According to our results, persons with dementia want to be included in the development of technologies; there is little research on the usability of assistive technologies; various benefits are reported but are mainly based on low-quality studies; barriers to deployment of technologies in dementia care were identified, and ethical issues were raised by researchers but often not studied. Many challenges remain such as including the target group more often in development, performing more high-quality studies on usability and effectiveness and cost-effectiveness, creating and having access to high-quality datasets on existing technologies to enable adequate deployment of technologies in dementia care, and ensuring that ethical issues are considered an important topic

  8. Order of the 6 December 2013 related to modalities of training of the Competent Radiological Protection Person, and of certification of training organization

    International Nuclear Information System (INIS)

    Combrexelle, J.D.; Gandil, P.; Ligeard, C.

    2013-01-01

    This order issued by the French Ministry of labour, employment, professional training and social dialogue aims at defining the modalities and contents of training of competent radiological protection persons, as well as the modalities of certification of certificating organizations and of certification of training organizations. As far as the training of the competent radiological protection person, the order defines the scope, training levels, activity sectors, the basic training, the knowledge control and validation process, the certification of the person, the extension of the level or scope of this certification, the certification renewal. As far as the certificating body and the certification of the training organization are concerned, the order addresses the certification instruction modalities, additional requirements for certificating bodies, requirements related to training organizations. Other arrangements and issues are indicated related to equivalencies, implementation, abrogation and transitory arrangements. Additional information regarding the content of training courses and certification processes is provided in appendix

  9. Economical motor protection using microcomputer technology

    Energy Technology Data Exchange (ETDEWEB)

    Woodruff, N.

    1983-09-01

    A trend to design new motors closer to their design limits and the high cost of plant shutdown has increased the need for better protection of smaller three phase motors. A single chip microcomputer relay can be applied to replace thermal overloads which are of limited effectiveness on low and medium voltage machines with comprehensive, economical motor protection. The requirement for different protection features and how they are achieved is presented. All the protection features discussed are commercially available in a compact unit that uses a single chip microcomputer.

  10. Suitable for human beings. Working world - genetic engineering - new technologies - ways of life - public authority. Documentation. Menschengerecht. Arbeitswelt - Genforschung - Neue Technik - Lebensformen - Staatsgewalt. Dokumentation

    Energy Technology Data Exchange (ETDEWEB)

    Daeubler-Gmelin, H.; Adlerstein, W. (eds.)

    1986-01-01

    If a society decides to make use of the advantages of technologies that at the same time bear extensive potentials of harm, society has to prevent abuse of these potentials. Physical protection and other security measures inevitably entail a curtailment of personal liberty. The civil rights will not provide sufficient protection against such creeping loss of personal freedom. The high priority of the objects of legal protection in question will make it necessary to specify the civil rights according to conditions if the security measures are to become effective in practice. Weighing the legal merits and the principle of reasonableness will be the main instruments that will pave the way for a camouflaged change of legal concepts and, finally, a factual restriction of civil rights. Any policy of law intended to protect the civil rights therefore will have to clain responsible participation in research activities, technological development, and energy policy. The policy of law has to take care that the criterion of compatibility with the constitution, the weakening or strengthening effect of a technological system on the civil rights, will duly be taken into account in the process of democratic technology steering, and as early as possible. (orig./HSCH).

  11. Routes for breaching and protecting genetic privacy.

    Science.gov (United States)

    Erlich, Yaniv; Narayanan, Arvind

    2014-06-01

    We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical research. However, a growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, indicate the underlying assumptions, and assess their technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications.

  12. Law enforcement access to personal data originally collected by private parties : Missing data subjects’ safeguards in Directive 2016/680?

    NARCIS (Netherlands)

    Jasserand, Catherine

    Access by law enforcement authorities to personal data initially collected by private parties for commercial or operational purposes is very common, as shown by the transparency reports of new technology companies on law enforcement requests. From a data protection perspective, the scenario of law

  13. Protecting the Accounting Information in the Conditions of Outsourcing with Use of the Information-Computer Technologies

    Directory of Open Access Journals (Sweden)

    Liakhovych Halyna І.

    2017-12-01

    Full Text Available The article is aimed at disclosing measures of protection of accounting information in the conditions of outsourcing, using modern information-computer technologies. On the basis of processing of scientific works, the approaches to development of system of protection of the accounting information were generalized, measures of protection were grouped by users of data with definition of subjects of provision in the conditions of outsourcing. Special attention is paid to the characterization and content of internal organizational measures of protection of accounting information (normative, personnel, structural. The complex of measures on protection of the information of accountance for large and small-size enterprises has been defined. The prospect of further research is the issue of information risk management in accounting outsourcing.

  14. Fifth meeting of persons competent in radiation protection; Cinquiemes rencontres des personnes competentes en radioprotection

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    During this meeting will successively be approached: the statutory frame, the practical guide for the realization of the dosimetry studies of work stations presenting a risk of exposure to ionizing radiations, a study of post in conventional and interventional radiology, study of post in interventional cardiology, the roles and the missions of the P.C.R. (person competent in radiation protection) in a subcontractor company in I.N.B. (base nuclear installation), the application of the zoning order for the activities of industrial radiography, the evolution of the statutory measures in protection of the workers against the dangers of ionizing radiations, all which concerns the P.C.R. (training, missions, certification, educational role), the controls of radioprotection, the external controls of radioprotection, the surveillance of working zones, surveillance of effluents,management of the radioactive waste and effluents, classification of the personnel and the surveillance of the exposure, dosimetry by radio photo luminescence, the systeme S.I.S.E.R.I.. (N.C.)

  15. Towards a Personality Understanding of Information Technology Students and Their IT Learning in UAE University

    Science.gov (United States)

    Al-Qirim, Nabeel; Rouibah, Kamel; Tarhini, Ali; Serhani, Mohamed Adel; Yammahi, Aishah Rashid; Yammahi, Maraim Ahmed

    2018-01-01

    This research investigates the personality characteristics of Information Technology students (CIT) in UAE University (UAEU) and how such features impact their IT learning. To achieve this objective, this research attempts to explain the impact of the Big-5 factors on learning using survey research. Results from 179 respondents suggested that…

  16. Seeing the first-person perspective in dementia : a qualitative personal evaluation game to evaluate assistive technology for people affected by dementia in the home context

    NARCIS (Netherlands)

    Suijkerbuijk, S.; Brankaert, R.G.A.; Kort, de Y.A.W.; Snaphaan, L.J.A.E.; Ouden, den P.H.

    2015-01-01

    The number of people with dementia is increasing rapidly. As a result, care has to be extended towards the home context. This increases the burden on both informal caregivers and persons affected by dementia. To support these people more effectively, technology could play an important role. However,

  17. A Design and Research on Protection of Architectural Heritage Based on Digital Technology

    Directory of Open Access Journals (Sweden)

    Hou Shuang Qing

    2016-01-01

    Full Text Available In the era of digital information, how to reasonably use new-tech and idea for the architectural heritage protection remains urgent. In terms of digital protection, 3D laser scanning technology can perfectly remedy the manual measurement limitation thus correctly obtaining the relevant data. Via analysis, we find that the architectural heritage bears in itself the parameterized characteristic. As Building Information Modeling (BIM can help realize the parametric design, we proposed a feasible Architectural Heritage Information Model with the BIM “family” connecting architectural heritage and BIM. Finally, the parameter-induced graphic driving is achieved based on the relation between the two.

  18. Adapting cognitive radio technology for low-power wireless personal area network devices

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg; Rohde, John

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  19. Seventh meeting of radiation protection skilled persons; Septiemes rencontres des personnes competentes en radioprotection

    Energy Technology Data Exchange (ETDEWEB)

    Juhel, Th.; Briandchamplong, J.; Gambini, D.J.; Ammerich, M.; Aubert, B.; Barbey, P.; Biau, A.; Bruchet, H.; Capelle, M.H.; Flon, E.; Gauron, Ch.; Gravelotte, D.; Guerin, Ch.; Le Denmat, D.; Lemoine, Th.; Lombard, J.; Lucas, St.; Menechal, Ph.; Mignien, S.; Million, M.; Mozziconacci, J.G.; Prevot, S.; Radecki, J.J.; Rigaud, S.; Taillandier, P.; Timbert, M.; Vidal, J.P.; Bardelay, Ch.; Lahaye, Th.; Balduyck, S.; Chasson, E.; Rehel, J.L.; Chatellier, Ch.; Barret, Ch.; Guersen, J.; Degrange, J.P.; Sevestre, B.; Lahaye, Th.; Rodde, S.; Marchal, C.; Lefaure, Ch.; Bouk' il, H.; Gneiting, M.; Auboiroux, B.; Riedel, A.; Feuardent, J.; Scanff, P.; Bof, M.; Lochard, J.; Godet, J.L.

    2011-07-01

    This document gathers the slides of the available presentations given during these conference days. Twenty-three presentations out of 25 are assembled in the document and deal with: 1 - the evolution of workers' international protection rules against ionizing radiation risks (C. Bardelay); 2 - presentation of the report of the working group on radiation protection (P. Barbey); 3 - position of the French nuclear safety authority and of the labor general direction about the position of permanent expert groups in radiation protection concerning the expected evolutions in the occupation and training of radioprotection skilled persons (RSP), (T. Lahaye); 4 - experience feedback: RSP in surgery operating theater - a sometimes delicate intervention (S. Balduyck); 5 - workplace analysis in dental surgery: constraints and specificities (D. Le Denmat); 6 - workplace analysis: tritium atmospheric contamination (S. Rigaud); 7 - revision of the NFC 15-160 standard relative to radiology facilities (J.L. Rehel); 8 - example of area tele-dosimetry usage - the Pitie Salpetriere hospital experiment (C. Chatellier and C. Barret); 9 - contribution of radio-attenuation lead gloves in interventional radiology (J. Guersen); 10 - zoning in the medical domain: encountered problems typology and evaluation of possible solutions (Degrange, J.P.); 11 - management of used sealed sources distributed by the CEA and CISBIO (B. Sevestre); 12 - how to perform a measurement in radiation protection - how about measurement uncertainty (M. Ammerich); 13 - national campaign of control about the application of workers radiation protection rules (T. Lahaye); 14 - transparency and inspection approach in local nuclear applications: gamma-graphy, research, nuclear medicine, interventional radiography and radiotherapy (S. Rodde and C. Marchal); 15 - local/regional networks of RSPs and radiation protection actors: 2008 audit results and recent evolutions (C. Lefaure); 16 - role and missions of the external

  20. Management of risk factors in the selection and use of PPE [personal protective equipment] on hazardous waste sites

    International Nuclear Information System (INIS)

    Kemplin, M.G.

    1988-01-01

    Industrial hygiene managers working in the hazardous waste area face daily decisions concerning appropriate levels of personal protective equipment (PPE) for hazards expected on various waste site projects. Typical hazards include exposures to toxic dust, chemical vapors, toxic gases, splashes of corrosive or toxic substances, radioactive materials and high noise levels. Managers who are experienced in this area recognize that each item of PPE can represent potential hazards in its own right. For example, full-face respirators typically restrict peripheral vision and can impede proper communications. In high ambient temperature conditions, coated protective suits can represent significant heat stress concerns, etc. Accordingly, this paper reviews health and safety management decision-making in this regard

  1. Innovative uses of communication technology for HIV programming for men who have sex with men and transgender persons1

    Science.gov (United States)

    Allison, Susannah M; Adams, Darrin; Klindera, Kent C; Poteat, Tonia; Wolf, R Cameron

    2014-01-01

    Globally, overall rates of HIV are on the decline; however, rates among gay men and other men who have sex with men (MSM) and transgender persons are increasing. Meanwhile, there has been exponential growth in access to communication technology over the last decade. More innovative prevention and care technology-based programmes are needed to help address the growing numbers of MSM and transgender persons living with HIV and those at risk for infection. To address this need, a meeting was hosted by the U.S. Agency for International Development (USAID) through the President's Emergency Plan for AIDS Relief (PEPFAR) and co-sponsored by amfAR, The Foundation for AIDS Research and the National Institute of Mental Health (NIMH). The meeting brought together researchers, community implementers, advocates and federal partners to discuss the current landscape of technology-based interventions for MSM and transgender persons and to discuss key considerations. Presentations and discussions focused on the research gaps, facilitators and barriers to programme implementation and public–private partnerships. This article summarizes the meeting proceedings and outlines key considerations for future work in this area. PMID:25280864

  2. Protection of staff in interventional radiology

    International Nuclear Information System (INIS)

    Melkamu, M. A.

    2013-04-01

    This project focuses on the interventional radiology. The main objective of this project work was to provide a guidance and advice for occupational exposure and hospital management to optimize radiation protection safety and endorse safety culture. It provides practical information on how to minimize occupational exposure in interventional radiology. In the literature review all considerable parameters to reduce dose to the occupationally exposed are well discussed. These parameters include dose limit, risk estimation, use of dosimeter, personal dose record keeping, analysis of surveillance of occupational dose, investigation levels, and proper use of radiation protection tools and finally about scatter radiation dose rate. In addition the project discusses the ways to reduce occupational exposure in interventional radiology. The methods for dose reduction are minimizing fluoroscopic time, minimizing the number of fluoroscopic image, use of patient dose reduction technologies, use of collimation, planning interventional procedures, positioning in low scattered areas, use of protective shielding, use of appropriate fluoroscopic imaging equipment, giving training for the staff, wearing the dosimeters and know their own dose regularly, and management commitment to quality assurance and quality control system and optimization of radiation protection of safety. (author)

  3. Research on the technology of constructing a protection with joint use of no-fines concrete and bitumen

    Directory of Open Access Journals (Sweden)

    Mikhasek Andrey

    2017-01-01

    Full Text Available To build a bank slope protection of a hydraulic structure, a technology is proposed that involves building a framework of no-fines concrete and pouring it with hot bituminous materials. Implementation of this technology requires conducting a research on bitumen penetration into the protection plate body. The research involved developing models of non-stationary filtration under varied bitumen viscosity. The research involved experimental observation in laboratory environment. Models of movement of a variable viscosity liquid in a porous medium were proposed, and their study in laboratory environment allowed for identifying the depth of penetration, which is an important result to solve engineering objectives.

  4. Oncotyrol--Center for Personalized Cancer Medicine: Methods and Applications of Health Technology Assessment and Outcomes Research.

    Science.gov (United States)

    Siebert, Uwe; Jahn, Beate; Rochau, Ursula; Schnell-Inderst, Petra; Kisser, Agnes; Hunger, Theresa; Sroczynski, Gaby; Mühlberger, Nikolai; Willenbacher, Wolfgang; Schnaiter, Simon; Endel, Gottfried; Huber, Lukas; Gastl, Guenther

    2015-01-01

    The Oncotyrol - Center for Personalized Cancer Medicine is an international and interdisciplinary alliance combining research and commercial competencies to accelerate the development, evaluation and translation of personalized healthcare strategies in cancer. The philosophy of Oncotyrol is to collaborate with relevant stakeholders and advance knowledge "from bench to bedside to population and back". Oncotyrol is funded through the COMET Excellence Program by the Austrian government via the national Austrian Research Promotion Agency (FFG). This article focuses on the role of health technology assessment (HTA) and outcomes research in personalized cancer medicine in the context of Oncotyrol. Oncotyrol, which currently comprises approximately 20 individual projects, has four research areas: Area 1: Biomarker and Drug Target Identification; Area 2: Assay Development and Drug Screening; Area 3: Innovative Therapies; Area 4: Health Technology Assessment and Bioinformatics. Area 4 translates the results from Areas 1 to 3 to populations and society and reports them back to Area 3 to inform clinical studies and guidelines, and to Areas 1 and 2 to guide further research and development. In a series of international expert workshops, the Oncotyrol International Expert Task Force for Personalized Cancer Medicine developed the Methodological Framework for Early Health Technology Assessment and Decision Modeling in Cancer and practical guidelines in this field. Further projects included applications in the fields of sequential treatment of patients with chronic myeloid leukemia (CML), benefit-harm and cost-effectiveness evaluation of prostate cancer screening, effectiveness and cost-effectiveness of multiple cervical cancer screening strategies, and benefits and cost-effectiveness of genomic test-based treatment strategies in breast cancer. An interdisciplinary setting as generated in Oncotyrol provides unique opportunities such as systematically coordinating lab and bench

  5. HEALTH INFORMATION TECHNOLOGY IN EXCHANGE OF HEALTH INFORMATION

    Directory of Open Access Journals (Sweden)

    Jordan Deliversky

    2016-06-01

    Full Text Available Health information technology involves the exchange of health information in an electronic environment. Data protection is comprised of many elements, including where the data resides, how it is used, and who has access to it. Individually identifiable health information should be protected with reasonable administrative, technical, and physical safeguards to ensure its confidentiality, integrity, and availability and to prevent unauthorized access, use, or disclosure. Health records are among the most sensitive records available containing information concerning an individual. The unauthorized disclosure of a medical condition or diagnosis could negatively impact an individual’s personal and professional life.

  6. Implications of scientific and technological developments for radiation protection in the next decade

    International Nuclear Information System (INIS)

    Johnson, J.R.; Stansbury, P.S.; Paretzke, H.

    1993-01-01

    There are scientific and technological developments taking place that will affect the understanding of the interaction of ionizing radiation with matter, the ability to measure the important parameters of ionizing radiation, and the ability to model radioactivity transport, both in the human body and in the environment. This paper focuses on emerging scientific and technological developments that will impact radiation protection in the next decade. Emerging scientific developments included in this paper are new methods and better analytic capabilities in epidemiology, a better understanding of the interactions between ionizing radiation and the various cellular components and more realistic models to describe the uptake, distribution, retention and excretion of radionuclides in humans. Technological developments include instruments to measure radioactivity in the humans and the environment, and better software to calculate doses from these previously measured quantities

  7. Courts, privacy and data protection in Belgium : Fundamental rights that might as well be struck from the constitution

    NARCIS (Netherlands)

    de Hert, Paul; Brkan, Maja; Psychogiopoulou, Evangelia

    2017-01-01

    Through critical analysis of case law in Belgium courts, this chapter reveals the significant role courts play in the protection of privacy and personal data within the new technological environment. It addresses the pressing question from a public who are increasingly aware of their privacy rights

  8. The modular technology of development of the CAD expansions: protection of the buildings from the lightning

    OpenAIRE

    Migunov, Vladimir V.; Kafiyatullov, Rustem R.; Safin, Ilsur T.

    2004-01-01

    The modular technology of development of the problem-oriented CAD expansions is applied to a task of designing of protection of the buildings from the lightning with realization in program system TechnoCAD GlassX. The system model of the drawings of lightning protection is developed including the structured parametric representation (properties of objects and their interdependence, general settings and default settings) and operations with it, which efficiently automate designing

  9. Fall Protection Introduction, #33462

    Energy Technology Data Exchange (ETDEWEB)

    Chochoms, Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-23

    The proper use of fall prevention and fall protection controls can reduce the risk of deaths and injuries caused by falls. This course, Fall Protection Introduction (#33462), is designed as an introduction to various types of recognized fall prevention and fall protection systems at Los Alamos National Laboratory (LANL), including guardrail systems, safety net systems, fall restraint systems, and fall arrest systems. Special emphasis is given to the components, inspection, care, and storage of personal fall arrest systems (PFASs). This course also presents controls for falling object hazards and emergency planning considerations for persons who have fallen.

  10. Advances in the simulation of personal protective equipment for the mitigation of exposure to radioactive particulates

    International Nuclear Information System (INIS)

    Roeterink, M.J.; Kelly, D.G.; Dickson, E.F.G; Corcoran, E.C.

    2014-01-01

    Airborne radioactive particulates represent a significant potential hazard to first responders in nuclear related incidents. Personal protective equipment (PPE), in particular radio-opaque fabrics, can be used to reduce wearer exposure to the emitted radiation, but do not offer complete protection. The objective of this project is to create a realistic dosimetric model of the human arm, protected by a sleeve, which can eventually be developed into a tool to assess the full-body dose imparted to the wearer in the event of radiological particulate exposure. A two-fold approach will be employed whereby: (1) a particulate transport model will be used to determine the regional radioactive particulate concentrations; and (2) these concentration data will then be incorporated into a dosimetric model that will use the Monte Carlo N-Particle (MCNP) transport code to determine the dose imparted to the tissue. Benchmarking experiments will be carried out to validate the results generated by the computer models. Such experimentation will be conducted for both the particulate transport and dosimetric models. Model advancement aims to consider whole body dose and will be invaluable in the development of future radiation exposure policies and procedures. (author)

  11. Priorities in radiation protection. Propositions for a better protection of persons against the danger of ionizing radiations. Report of the Vrousos commission; Priorites en radioprotection. Propositions pour une meilleure protection des personnes contre les dangers des rayonnements ionisants. Rapport de la commission Vrousos

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-03-15

    this report presents priorities for actions and recommendations on subjects such communication, information, education, and also research, monitoring of technological development, expertise or giving users more responsibility. these recommendations are given with actions propositions on field of workers radiation protection or patients protection or radioactive sources management. (N.C.)

  12. Two-Person Control: A Brief History and Modern Industry Practices

    Energy Technology Data Exchange (ETDEWEB)

    Pedersen, Robert Douglas [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2017-07-01

    Physical asset protection is the principal objective of many security and safeguard measures. One well-known means of asset protection is two-person control. This paper reviews literature regarding two-person control to gain insight into its origin, first demonstrated uses, and its presence in several modern industries. This literature review of two-person control is intended to benefit people and organizations with a desire to understand its origins and how the practice has evolved over time, as well as give some insight into the flexibility of this safeguarding technique. The literature review is focused in four main sections: (1) defining two-person control, (2) early history, (3) two-person control in modern industry, and (4) a theory on how two- person control entered modern industry. ACKNOWLEDGEMENTS The author would like to thank Jarret Lafleur and Scott Paap of Sandia National Laboratories, California's Systems Analysis & Engineering organization for the opportunity to work on this project. Jarret Lafleur provided very constructive and helpful feedback through all stages of the work. Amanda Thompson of the Sandia California Technical Library maintained a great spirit and always had a quick document turnaround that very much helped out this project's completion. Additionally, yet perhaps most importantly, the author would like to thank his wife and daughter, along with the rest of his family, for continued support over the years. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA0003525.

  13. Virtual pilot course in radiological protection

    International Nuclear Information System (INIS)

    Gonzalez Romero, Angela Maria; Plazas, Maria Cristina

    2008-01-01

    Full text: The radiological protection performs vital importance in the fields medically, industrially and environmental. The X-rays and the radioactive materials used in medicine have allowed to realize important progresses and to develop new technologies skills for the diagnosis, the therapy and the prevention of diseases. Having in it counts tells the risks associated with the ionizing radiations, it is required legally that the personnel that intervenes in the different procedures has the necessary knowledge of radiological protection to assure that the use of radiations in the medical practice should carry out of ideal form, at the right moment and adopting all the necessary measures to guarantee the best protection, so much of the occupationally exposed personnel, since as, like of the patients and the public in general. The virtual environments for the construction of the knowledge like it is the virtual university, allows presenting an effective alternative in the learning of different areas and in this particular case of the radiological protection. With the aim lens to give response to these needs there is implemented this pilot virtual course year based on the current course of radiological protection that is dictated in the Mastery in Medical Physics of the National University of Colombia, sedate Bogota. The purpose of this virtual course is to use as academic and bibliographical support on radiological protection, as well as to answer to the needs of initial formation that the professionals have, to acquire a solid base in the mentioned matter. It has been conceived so that it provides theoretical formation, so much scientific as technology and that contemplates the recommendations and international and national procedure on radiological protection and some applications. Given the incorporation of the technologies of information and communication that in the academic area it has brought with it not only to give support to the curricular activities but

  14. The use of biometrics in the Personal Health Record (PHR).

    Science.gov (United States)

    Bonney, Wilfred

    2011-01-01

    The emergence of the Personal Health Record (PHR) has made individual health information more readily accessible to a wide range of users including patients, consumers, practitioners, and healthcare providers. However, increased accessibility of PHR threatens the confidentiality, privacy, and security of personalized health information. Therefore, a need for robust and reliable forms of authentication is of prime concern. The concept of biometric authentication is now highly visible to healthcare providers as a technology to prevent unauthorized access to individual health information. Implementing biometric authentication mechanisms to protect PHR facilitates access control and secure exchange of health information. In this paper, a literature review is used to explore the key benefits, technical barriers, challenges, and ethical implications for using biometric authentication in PHR.

  15. Ethical and regulatory challenges of research using pervasive sensing and other emerging technologies: IRB perspectives.

    Science.gov (United States)

    Nebeker, Camille; Harlow, John; Espinoza Giacinto, Rebeca; Orozco-Linares, Rubi; Bloss, Cinnamon S; Weibel, Nadir

    2017-01-01

    Vast quantities of personal health information and private identifiable information are being created through mobile apps, wearable sensors, and social networks. While new strategies and tools for obtaining health data have expanded researchers' abilities to design and test personalized and adaptive health interventions, the deployment of pervasive sensing and computational techniques to gather research data is raising ethical challenges for Institutional Review Boards (IRBs) charged with protecting research participants. To explore experiences with, and perceptions about, technology-enabled research, and identify solutions for promoting responsible conduct of this research we conducted focus groups with human research protection program and IRB affiliates. Our findings outline the need for increased collaboration across stakeholders in terms of: (1) shared and dynamic resources that improve awareness of technologies and decrease potential threats to participant privacy and data confidentiality, and (2) development of appropriate and dynamic standards through collaboration with stakeholders in the research ethics community.

  16. Child protection workers dealing with child abuse: The contribution of personal, social and organizational resources to secondary traumatization.

    Science.gov (United States)

    Dagan, Shlomit Weiss; Ben-Porat, Anat; Itzhaky, Haya

    2016-01-01

    The present study compared secondary traumatization among child protection social workers versus social workers employed at social service departments. In addition, based on Conservation of Resources (COR) theory, the study examined the contribution of working in the field of child protection as well as the contribution of background variables, personal resources (mastery), and resources in the workers' social and organizational environment (social support, effectiveness of supervision, and role stress) to secondary traumatization. The findings indicate that levels of mastery and years of work experience contributed negatively to secondary traumatization, whereas exposure to child maltreatment, trauma history, and role stress contributed positively to secondary traumatization. However, no significant contribution was found for social support and effectiveness of supervision. The study identifies factors that can prevent distress among professionals such as child protection workers, who are exposed to the trauma of child abuse victims. Recommendations are provided accordingly. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Promises of protection? Article 16 of the Convention on the Rights of Persons with Disabilities and gender-based violence in South Africa.

    Science.gov (United States)

    Combrinck, Helene

    Article 16 of the Convention on the Rights of Persons with Disabilities (CRPD) guarantees persons with disabilities freedom from exploitation, violence and abuse. This article explores the current status of implementation of article 16 in South Africa, with specific reference to the legislative framework underpinning protection from exploitation, violence and abuse. This investigation is done specifically in the context of gender-based violence, which remains a cause of great concern in this country. Copyright © 2017. Published by Elsevier Ltd.

  18. The Strategic Technologies for Automation and Robotics (STEAR) program: Protection of materials in the space environment subprogram

    Science.gov (United States)

    Schmidt, Lorne R.; Francoeur, J.; Aguero, Alina; Wertheimer, Michael R.; Klemberg-Sapieha, J. E.; Martinu, L.; Blezius, J. W.; Oliver, M.; Singh, A.

    1995-01-01

    Three projects are currently underway for the development of new coatings for the protection of materials in the space environment. These coatings are based on vacuum deposition technologies. The projects will go as far as the proof-of-concept stage when the commercial potential for the technology will be demonstrated on pilot-scale fabrication facilities in 1996. These projects are part of a subprogram to develop supporting technologies for automation and robotics technologies being developed under the Canadian Space Agency's STEAR Program, part of the Canadian Space Station Program.

  19. Üniversite Kütüphanelerinde Kişisel Verilerin Korunması=Protection of Personal Data in University Libraries

    Directory of Open Access Journals (Sweden)

    Türkay Henkoğlu

    2015-05-01

    Full Text Available Güvenilir bilgiye erişim ve büyük ölçüde elektronik ortamda saklanan mevcut bilginin korunmasına yönelik ihtiyaçların arttığı günümüzde, korunacak bilgi varlıkları içinde kişisel veriler önemli bir yer tutmaktadır. Bu bilgi varlıklarının korunması hukuksal, teknik ve idari boyutların dikkate alındığı bilgi güvenliği politikalarının gücü ile mümkün olabilmektedir. Bu çalışmada, kişisel verilerin korunmasına ilişkin temel ilkeler ve hukuksal düzenlemeler çerçevesinde üniversite kütüphanelerindeki mevcut durum değerlendirilerek, eksikliklerin giderilmesine yönelik önerilerde bulunulmuş ve bilgi güvenliği kültürünün oluşmasına katkı sağlanması hedeflenmiştir. Bu amaçla Ankara’da bulunan 15 üniversite kütüphanesini kapsayacak şekilde görüşme yoluyla anket uygulanmış ve alınan bilgi güvenliği önlemleri mevcut hukuksal düzenlemeler çerçevesinde değerlendirilmiştir. Çalışma sonucunda; yasal düzenlemelerin yeterli ve önleyici nitelikte olmadığı, üniversitelerde kişisel verilerin korunmasına ve verilerin güvenli olarak imha edilmesine ilişkin politikaların bulunmadığı, risk yönetiminin yapılmadığı, üniversite birimleri arasında sorumlulukların paylaşılmadığı, kişisel verileri işleyen personele veri korumaya ilişkin bilinçlendirme eğitimi verilmediği ve kişisel verileri işleyen birimlerin hangi verilerin kişisel veri olduğu konusunda dahi tereddütlerinin bulunduğu görülmektedir./Today, with the significant increase in the need for the access to reliable information andfor the protection of available information stored electronically; personal data has becomeone of the most important information assets that must be protected. The protection of theseinformation assets is only possible with the power of information security policies including legal,technical, and administrative dimensions. In this study, current situation of

  20. Two Persons with Multiple Disabilities Use Orientation Technology with Auditory Cues to Manage Simple Indoor Traveling

    Science.gov (United States)

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Campodonico, Francesca; Oliva, Doretta

    2010-01-01

    This study was an effort to extend the evaluation of orientation technology for promoting independent indoor traveling in persons with multiple disabilities. Two participants (adults) were included, who were to travel to activity destinations within occupational settings. The orientation system involved (a) cueing sources only at the destinations…

  1. A state of the art on coastal environmental protection using radioisotope tracer technology

    International Nuclear Information System (INIS)

    Jung, Sung Hee; Jin, Joon Ha; Kim, Jong Bum; Choi, Byung Jong

    2002-04-01

    Construction of artificial structures has caused a sediment process change due to the variation of hydraulic condition in Korea. Subsequently we have a serious problem of shoaling for shoreline deformation, siltation of the harbor and shipping channel. To protect those abnormal environmental changes, a large estimate has been spent for additional construction such as outer wall facilities, littoral nourishment and dredging. Systematic long-term studies should be carried out to understand the causes of environmental change. In addition, comprehensive plan is required for its monitoring and prevention. The radioisotope application studies for coastal environmental protection have not been actively performed only in the developed countries like France, Canada, and Australia etc., but also in many developing countries like Poland, India. Since KAERI has performed two experiments in costal area of Korea in 1960s, no more study has been reported. Recently the studies of radiotracer application technology is getting more interested in terms of on-line data acquisition and analysis for the validation of the numerical simulation models. The experiment using radiotracer becomes an important part of the method to solve the problems happening in coastal environment, as it supplies data with high confidence in the field. On the basis of the experience obtained from the researches for industrial application of radiotracer technology, KAERI is going to make its first step to the development of the radiotracer technology for costal environmental studies

  2. IMPLEMENTATION OF MODERN EDUCATIONAL TECHNOLOGIES IN DEVELOPING THE PERSONALITY OF FUTURE ENGINEERS FASHION DESIGNERS

    Directory of Open Access Journals (Sweden)

    DANILA Victoria

    2015-05-01

    Full Text Available Applying the model of implementation process of modern educational technologies in higher education involved in technical implementation of educational technology in the educational activity based on critical thinking development strategies, future engineers’ personality development of students. Through educational technologies correlation occurs between educators and educated, which places them in a position promoter of educational paradigms. At present, the efficiency of the educational process depends largely on the use of modern technologies. To determine the student's level of development through the integration of modern educational technologies is necessary to reveal aspects of operating in the thinking of students, which is their way of analysis of reality, to compare, to generalize certain concepts or processes. Methodological peculiarities of modern educational technology based on application of interactive engagement between the two actors in the process of training / preparation and which involved the use of interactive teaching methods adapted to technical higher education. These groups have benefited greatly from the introduction in teaching and learning of modern educational strategies. The intervention was the catalyst that accelerated skills training. Qualitative aspects allow us to generalize the results of experiments performed. A student lays views representing a structure, a generalization, reasoning that arises from their previous experience.

  3. ETHIOPIAN WITNESS PROTECTION SYSTEM: COMPARATIVE ...

    African Journals Online (AJOL)

    witness protection involves social cohesion of the protected person. Scholars ..... interests' need to balance an accused right to know and confront prosecution ..... was reduced to 2.5 years through the fast tracking of witness protection cases.

  4. Embassies and Personal Data

    DEFF Research Database (Denmark)

    Blume, Peter Erik

    2011-01-01

    The article considers how data protection rules in Directive 95/46 EC and in national law apply to data processing carried out by an embassy. Three situations are discussed: processing inside and from the embassy, processing in the recieving country on behalf of an embassy, and transference...... of personal data from the embassy to the home country. Although an embassy may represent an unsafe area for the personal integrity of citizens, this topic has not been considered in data protection law and for this reason there are no references ind the article....

  5. The current status of radiological protection infraestructures in Tanzania

    International Nuclear Information System (INIS)

    Ngalie, J.E.; Mompome, W.K.; Meza, L.H.

    2008-01-01

    Without adequate and sustainable radiation protection infrastructure, the benefits associated with safe use of nuclear technology and atomic energy might be jeopardized. In the United Republic of Tanzania, the Atomic Energy Act No. 7 of 2003 established the Tanzania Atomic Energy Commission as sole regulatory body responsible for regulating and controlling the safe and peaceful utilization of nuclear technology in the country. The Atomic Energy (Protection from ionizing radiation) Regulations, 2004 further specifies practices designed to ensure that unnecessary exposure of persons to ionizing radiation is avoided, that all exposures are kept as low as reasonably achievable and that all the dose limits specified in the radiation protection standards are not exceeded. This is achieved through the systems of notification, authorizations through registration and licensing, safety and security of radiation sources as well as regulatory inspections and enforcements. These activities are performed by the Commission with operational funds allocated by the Government of Tanzania. The Commission further provides other services namely individual monitoring; calibration services; education and training to radiation workers, public as well as law enforcers; and safe management of radioactive waste. Despite such achievement, still there are a lot to be done in order to strengthen the radiation protection infrastructure in Tanzania. These include issues such as gaps in our legislations, regulations and guidance, security of sources, enforcement of laws, etc. This paper describes and discusses the current status of the regulatory control activities and radiation protection services provided by the Commission and suggestions for further improvement of radiological protection infrastructure in Tanzania. (author)

  6. Fiftieth Anniversary of the Foundation of Postgraduate Study on Corrosion and Protection of Materials at the Faculty of Technology, University of Zagreb

    Directory of Open Access Journals (Sweden)

    Martinez, S.

    2011-07-01

    Full Text Available The first postgraduate study at the Department for Chemical Technology of the Faculty of Technology (nowadays: Faculty of Chemical Engineering and Technology of the University of Zagreb concerning the field "Corrosion and Protection of Materials" was founded in the academic year of 1960/61 on the initiative of academician Miroslav Karšulin. The study comprised three semesters and finished by defending a master's thesis. During two decades, 19 generations of attendants were registered and 108 of them reached the scientific degree of MSc. In this period, several new postgraduate studies were introduced that were indispensable, but provoked organizational difficulties. Therefore, in 1980 reorganization took place by merging all postgraduate studies into "Engineering Chemistry" with 11 sections. Thus, the postgraduate study "Corrosion and Protection of Materials" transformed into the section "Structural Materials and Corrosion Control". After the establishment of the "Faculty of Chemical Engineering and Technology" from the Department for Chemical Technology of the Faculty of Technology in 1992, the "Chemical Engineering" section of former postgraduate study "Engineering Chemistry" separated as an autonomous study that also enabled receiving the Master's degree in the field of "Corrosion and Protection of Materials" by choice of adequate optional courses. At the beginning of the new millennium, changes of curricula in accordance with the Bologna process of reforms took place at the Faculty of Chemical Engineering and Technology as well as in the entire system of high educationin Croatia. All postgraduate studies leading to MSc degree were eliminated in 2003. Simultaneously, doctoral and specialists postgraduate studies were introduced. Doctoral studies lasting three years lead to PhD degree. Today, the knowledge from the field of corrosion and material protection is mainly included into programs of actual doctoral studies "Engineering Chemistry

  7. 23081 - Royal Decree No. 1132 of 14 September 1990 laying down basic measures for radiation protection of persons undergoing medical examination or treatment

    International Nuclear Information System (INIS)

    1990-01-01

    This Royal Decree incorporates into Spanish regulations Directive 84/466 Euratom which lays down basic measures for the radiation protection of persons undergoing medical examination or treatment. Any exposure to radiation for medical purposes must be medically justified and be conducted under the responsibility of a medical or dental practitioner adequately trained in the radiation protection field. All relevant facilities must be recorded in the national inventories to avoid unnecessary proliferation of such equipment [fr

  8. Protection using telecommunications

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    Deregulation in both the telecommunication and electric power industry, together with new telecommunication network technologies and advances in numerical protection, has resulted in the need to reconsider traditional methods of delivering tele-protection schemes and their associated bearer services. Fibre-optic technology is commonly deployed in new telecommunication networks for inter-station communication and utility-owned and public telecommunication networks from third parties are available for protection purposes. (author)

  9. Proceedings of the Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications

    Science.gov (United States)

    Paul, Lori (Editor)

    1991-01-01

    The Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications was held at NASA's JPL Laboratory on 30-31 May 1991. It provided a forum for reviewing the development of advanced network and technology concepts for turn-of-the-century telecommunications. The workshop was organized into three main categories: (1) Satellite-Based Networks (L-band, C-band, Ku-band, and Ka-band); (2) Terrestrial-Based Networks (cellular, CT2, PCN, GSM, and other networks); and (3) Hybrid Satellite/Terrestrial Networks. The proceedings contain presentation papers from each of the above categories.

  10. Protection for Children Born Through Assisted Reproductive Technologies Act, B.E. 2558: The Changing Profile of Surrogacy in Thailand.

    Science.gov (United States)

    Stasi, Alessandro

    2017-01-01

    The National Legislative Assembly of Thailand has enacted on February 19, 2015 the Protection for Children Born through Assisted Reproductive Technologies Act (ART Act). Its primary objective aims at protecting children born through assisted reproductive technologies and providing the legal procedures that the intended parents must follow. The focus of this article is to discuss the ongoing issues involving assisted reproduction in Thailand. After reviewing the past legal framework surrounding surrogate motherhood and the downsides of the assisted reproductive technology market in Thailand, the article will discuss the new ART Act and its regulatory framework. It will conclude that although the new law contains some flaws and limitations, it has so far been successful in tackling surrogacy trafficking and preventing reproductive scandals from occurring again.

  11. Mallow Fiber-Reinforced Epoxy Composites in Multilayered Armor for Personal Ballistic Protection

    Science.gov (United States)

    Nascimento, Lucio Fábio Cassiano; Louro, Luis Henrique Leme; Monteiro, Sergio Neves; Lima, Édio Pereira; da Luz, Fernanda Santos

    2017-10-01

    Lighter and less expensive polymer composites reinforced with natural fibers have been investigated as possible components of a multilayered armor system (MAS) for personal protection against high-velocity ammunition. Their ballistic performance was consistently found comparable with that of conventional Kevlar® synthetic aramid fiber. Among the numerous existing natural fibers with the potential for reinforcing polymer composites to replace Kevlar® in MAS, mallow fiber has not been fully investigated. Thus, the objective of this work is to evaluate the ballistic performance of epoxy composites reinforced with 30 vol.% of aligned mallow fibers as a second MAS layer backing a front ceramic plate. The results using high-velocity 7.62 ammunition show a similar indentation to a Kevlar® layer with the same thickness. An impedance matching calculation supports the similar ballistic performance of mallow fiber composite and Kevlar®. Reduced MAS costs associated with the mallow fiber composite are practical advantages over Kevlar®.

  12. Privacy as Personality Right: Why the ECtHR’s Focus on Ulterior Interests Might Prove Indispensable in the Age of “Big Data”

    Directory of Open Access Journals (Sweden)

    Bart van der Sloot

    2015-02-01

    Full Text Available Article 8 ECHR was adopted as a classic negative right, which provides the citizen protection from unlawful and arbitrary interference by the state with his private and family life, home and communication. The ECtHR, however, has gradually broadened its scope so that the right to privacy encroaches upon other provisions embodied in the Convention, includes rights and freedoms explicitly left out of the ECHR by the drafters of the Convention and functions as the main pillar on which the Court has built its practice of opening up the Convention for new rights and freedoms. Consequently, Article 8 ECHR has been transformed from a classic privacy right to a personality right, providing protection to the personal development of individuals. Apart from its theoretical significance, this shift might prove indispensable in the age of Big Data, as personality rights protect a different type of interest, which is far more easy to substantiate in the new technological paradigm than those associated with the right to privacy.

  13. Personal protection accessories (PPA) as a primary health safety measures in pesticide use

    International Nuclear Information System (INIS)

    Aslam, M.; Akhtar, A.; Kanwal, S.; Ali, T.; Zafar, M.I.

    2008-01-01

    Fruit growers from three districts of the Punjab took part in this study whereas their knowledge, attitude, skill and practices were evaluated regarding the use of pesticides. The hygiene and sanitation practices of the respondents were also related with proper use of PPA during pesticide spray which needs attitudinal changes along with the provision of better facilities and infrastructure. Demographic features of the fruit growers were evaluated regarding their age, qualification, marital status, source of income, smoking habits, farming size, fruit production and pesticide spraying experience. The ordinal regression model determined the significant relation among the qualification, spraying experience and land holding size with their level of knowledge and skill of using personal protection accessories (PPA). It is recommended that pesticide safety education and better skill be given to pesticide sprayers for the appropriate use of PPA. (author)

  14. Based on Civil Law Perspective of Study on the Legal Problems of the Protection of Personal Information%民法角度下个人信息保护的相关问题探讨

    Institute of Scientific and Technical Information of China (English)

    李宁; 贾茜

    2017-01-01

    With the rapid development of society,in recent years,people's personal information has been illegally collected for illegal channels,personal information is no longer used to steal the use of more and more.However,there is no definite legal provision in the existing legal provisions of personal information,and the existence of its legal system is almost blank,leading to more and more information theft cases.For China's current personal information protection issues,a variety of civil law scholars say that the reason,or because of the current law of China's lack of civil law and the relevant departments of the supervision of dereliction of duty.Leading to the protection of the current personal information in China is facing a grim situation.To clarify the current legal provisions of the protection of personal information,it is necessary to personal information on the rule of law attributes of the analysis of personal information that the privacy rights and other issues.But the personal information is still in a framework of the concept of rights,it must be explained for the concept,it is more conducive to the legal positioning of personal information protection,to achieve the protection of personal information rights and interests,so as to effectively achieve the personal information of the property theory to protect the continuation The Through the elaboration of the theoretical development and the present situation of the personal information right,this article analyzes the dilemma faced by the current personal information protection in our country,so as to explore the way to effectively protect the personal information.%随着社会的飞速发展,近年来,人们的个人信息被非法采集用于非法途径,个人信息无端被盗窃使用的行为越来越多.但是我国目前对于个人信息没有确切的法律规定,其法律制度的存在作用

  15. Technology-Aided Verbal Instructions to Help Persons with Mild or Moderate Alzheimer's Disease Perform Daily Activities

    Science.gov (United States)

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Tatulli, Emanuela; Rigante, Valeria; Zonno, Nadia; Perilli, Viviana; Pinto, Katia; Minervini, Mauro G.

    2010-01-01

    These two studies extended previous research on the use of verbal instructions and support technology for helping persons with mild or moderate Alzheimer's disease perform daily activities. Study I included seven participants who were to carry out one of two previously targeted activities (i.e., either coffee preparation or table setting). Study…

  16. Protection of persons undergoing radiological examinations ...

    African Journals Online (AJOL)

    Protection was in the form of gonad shields, lead apron to shield the unwanted parts during examinations and coning the X-ray field before exposure. The staff had Thermoluminscent Dosimeters (TLD) to monitor dose levels received by such staff every three months. They wore hand gloves, lead aprons and stayed behind ...

  17. Improving eye safety in citrus harvest crews through the acceptance of personal protective equipment, community-based participatory research, social marketing, and community health workers.

    Science.gov (United States)

    Tovar-Aguilar, J Antonio; Monaghan, Paul F; Bryant, Carol A; Esposito, Andrew; Wade, Mark; Ruiz, Omar; McDermott, Robert J

    2014-01-01

    For the last 10 years, the Partnership for Citrus Workers Health (PCWH) has been an evidence-based intervention program that promotes the adoption of protective eye safety equipment among Spanish-speaking farmworkers of Florida. At the root of this program is the systematic use of community-based preventive marketing (CBPM) and the training of community health workers (CHWs) among citrus harvester using popular education. CBPM is a model that combines the organizational system of community-based participatory research (CBPR) and the strategies of social marketing. This particular program relied on formative research data using a mixed-methods approach and a multilevel stakeholder analysis that allowed for rapid dissemination, effective increase of personal protective equipment (PPE) usage, and a subsequent impact on adoptive workers and companies. Focus groups, face-to-face interviews, surveys, participant observation, Greco-Latin square, and quasi-experimental tests were implemented. A 20-hour popular education training produced CHWs that translated results of the formative research to potential adopters and also provided first aid skills for eye injuries. Reduction of injuries is not limited to the use of safety glasses, but also to the adoption of timely intervention and regular eye hygiene. Limitations include adoption in only large companies, rapid decline of eye safety glasses without consistent intervention, technological limitations of glasses, and thorough cost-benefit analysis.

  18. Radiologic protection in intensive therapy units

    International Nuclear Information System (INIS)

    Andrea, H.; Juliana, C.; Gerusa, R.; Laurete, M.B.; Suelen, S.; Derech, Rodrigo D.A.

    2013-01-01

    The discovery of X-ray was a great achievement for humanity, especially for the medical community. In Intensive Care Units (ICUs), the RX tests, performed with mobile devices, add immense value to the diagnosis of inpatients who do not have the option to carry them out of bed. Following the technology and its improvements, fatalities arose from misuse of ionizing radiation, which mostly gave up for lack of knowledge of the biological effects caused by them, which leads to fear among professionals and often prevents a quick job and effectively by professionals of radiological techniques. The research it is a systematic review of the literature and justified by the scarcity of materials that reflect on the radiological protection in ICUs. For this study we found the Virtual Health Library (VHL) and Pubmed were indexed terms radiological protection and intensive care units, the search in Portuguese and English terms were used radiological protection and intensive care unit. The study aims to inform professionals of ICUs on the main aspects that refer to X-rays in hospital beds, the standards of radiological protection and personal protective equipment, thus avoiding possible damage to the biological health of workers, addressing subjects in rules and laws about the X radiation, emphasizing the protection of professionals in intensive care. It is clear, finally, that little research is conducted in the context of radiological protection of workers ICU's and this is a place that receives daily RX equipment, deserving more attention to protect the worker. (author)

  19. Correlations between self-handicapping and self-defeating personality.

    Science.gov (United States)

    Schill, T; Morales, J; Beyler, J; Tatter, T; Swigert, L

    1991-10-01

    In this study scores on Strube's self-handicapping scale were correlated with scores on Schill's self-defeating personality scale. Berglas believes there are subtypes of self-defeating personality and that his concept of self-handicapping should be correlated with the three criteria which represent a self-protective component of self-defeating personality. Some support for Berglas' proposition was found, particularly for men. However, correlations with other components of self-defeating personality suggest the criteria thought to be self-protective may need to be reconsidered.

  20. Film piracy in the era of digital technology

    Directory of Open Access Journals (Sweden)

    Petrović Vukašin

    2015-01-01

    Full Text Available Reproduction of films in the era of analog technology has been connected with a number of difficulties, involving, inter alia, technically complex process of reproduction, as well as high cash expenditures. In that sense, the very analog technology presented a barrier to reproduction of films by unauthorized persons. By switching to digital technology, the reproduction of mentioned copyright works became much easier, in terms of enabling individuals to, with easily available and relatively cheap technical means, in a fast and high quality way, make a large number of film copies. Since the digital era reflects progress of technology in the field of reproduction and distribution of films, as well as copyright works in general, the introduction of new exclusive rights in copyright law is very significant, as well as narrowing the existing limitations of copyright law rights and extension of duration of the protection. Effective enforcement of copyright protection in the new conditions opened a range of numerous issues, out of which the question of piracy in the field of film production is one of the most important, which presented the motivation for the author to cover this issue.

  1. Ability to manage everyday technology : a comparison of persons with dementia or mild cognitive impairment and older adults without cognitive impairment.

    OpenAIRE

    Malinowsky, Camilla; Almkvist, Ove; Kottorp, Anders; Nygård, Louise

    2010-01-01

    Purpose: The ability to manage technology is important for performance and participation in everyday activities. This study compares the management of technology in everyday activities among people with mild-stage dementia or MCI with older adults without known cognitive impairment (OA). Method: Persons with mild-stage dementia (n=38), MCI (n=34) and OA (n=45) were observed and interviewed when managing their everyday technology at home by using the Management of Everyday Technology Ass...

  2. Implications of science and technology on the radiological protection system

    International Nuclear Information System (INIS)

    Metivier, H.; LAZO, T.

    2006-01-01

    Full text of publication follows: The mission of the Nuclear Energy Agency (Nea) Committee on Radiation Protection and Public Health (C.R.P.P.H.) includes providing member -country governments with insight into evolving or emerging issues that could affect radiation protection policy, regulation or application. Although it can not be currently said that the scientific understanding of radiological risks has significantly changed recently, ongoing radio-biological and epidemiological research could challenge the conventional paradigm in the mid -term future. The C.R.P.P.H. finalized in March 2006 finalize a study of possible challenges and their implications. This study includes two principle areas: challenges arising from scientific developments; and, challenges to the implementation of radiation protection. This report updates the earlier C.R.P.P.H. report, 'Developments in Radiation Health Sciences and their Impact on Radiation Protection' (Nea 1998). Broadly speaking, ongoing radiation biology studies present the possibility that our current practice of summing various type s of exposures into a single value of effective dose is not scientifically supported because of significantly differing dose/response relationships (chronic vs. acute, internal vs. external, high Let versus low Let, etc.). In addition, non-targeted effects, and the possibility of individual hyper-sensitivity to radiation further challenge our current notion of the relationship between detriment and dose. Although there is no conclusive evidence for this at this time, the possible implications of such changes will be investigated to better prepare governments and the radiation protection community should sound scientific evidence emerge. In addition to these possible scientific challenges, the applications and events that would require radiological protection input are also evolving. In particular, the use of radiation in medicine, with new techniques and the spread of existing technologies

  3. Protection for Children Born Through Assisted Reproductive Technologies Act, B.E. 2558: The Changing Profile of Surrogacy in Thailand

    Directory of Open Access Journals (Sweden)

    Alessandro Stasi

    2017-12-01

    Full Text Available The National Legislative Assembly of Thailand has enacted on February 19, 2015 the Protection for Children Born through Assisted Reproductive Technologies Act (ART Act. Its primary objective aims at protecting children born through assisted reproductive technologies and providing the legal procedures that the intended parents must follow. The focus of this article is to discuss the ongoing issues involving assisted reproduction in Thailand. After reviewing the past legal framework surrounding surrogate motherhood and the downsides of the assisted reproductive technology market in Thailand, the article will discuss the new ART Act and its regulatory framework. It will conclude that although the new law contains some flaws and limitations, it has so far been successful in tackling surrogacy trafficking and preventing reproductive scandals from occurring again.

  4. Using Network Oriented Research Assistant (NORA) Technology to Compare Digital Photographic With In-Person Assessment of Acne Vulgaris.

    Science.gov (United States)

    Singer, Hannah M; Almazan, Timothy; Craft, Noah; David, Consuelo V; Eells, Samantha; Erfe, Crisel; Lazzaro, Cynthia; Nguyen, Kathy; Preciado, Katy; Tan, Belinda; Patel, Vishal A

    2018-02-01

    Teledermatology has undergone exponential growth in the past 2 decades. Many technological innovations are becoming available without necessarily undergoing validation studies for specific dermatologic applications. To determine whether patient-taken photographs of acne using Network Oriented Research Assistant (NORA) result in similar lesion counts and Investigator's Global Assessment (IGA) findings compared with in-person examination findings. This pilot reliability study enrolled consecutive patients with acne vulgaris from a single general dermatology practice in Los Angeles, California, who were able to use NORA on an iPhone 6 to take self-photographs. Patients were enrolled from January 1 through March 31, 2016. Each individual underwent in-person and digital evaluation of his or her acne by the same dermatologist. A period of at least 1 week separated the in-person and digital assessments of acne. All participants were trained on how to use NORA on the iPhone 6 and take photographs of their face with the rear-facing camera. Reliability of patient-taken photographs with NORA for acne evaluation compared with in-person examination findings. Acne assessment measures included lesion count (total, inflammatory, noninflammatory, and cystic) and IGA for acne severity. A total of 69 patients (37 male [54%] and 32 female [46%]; mean [SD] age, 22.7 [7.7] years) enrolled in the study. The intraclass correlation coefficients of in-person and photograph-based acne evaluations indicated strong agreement. The intraclass correlation coefficient for total lesion count was 0.81; for the IGA, 0.75. Inflammatory lesion count, noninflammatory lesion count, and cyst count had intraclass correlation coefficients of 0.72, 0.72, and 0.82, respectively. This study found agreement between acne evaluations performed in person and from self-photographs with NORA. As a reliable telehealth technology for acne, NORA can be used as a teledermatology platform for dermatology research and can

  5. Control technology for integrated circuit fabrication at Micro-Circuit Engineering, Incorporated, West Palm Beach, Florida

    Science.gov (United States)

    Mihlan, G. I.; Mitchell, R. I.; Smith, R. K.

    1984-07-01

    A survey to assess control technology for integrated circuit fabrication was conducted. Engineering controls included local and general exhaust ventilation, shielding, and personal protective equipment. Devices or work stations that contained toxic materials that were potentially dangerous were controlled by local exhaust ventilation. Less hazardous areas were controlled by general exhaust ventilation. Process isolation was used in the plasma etching, low pressure chemical vapor deposition, and metallization operations. Shielding was used in ion implantation units to control X-ray emissions, in contact mask alignes to limit ultraviolet (UV) emissions, and in plasma etching units to control radiofrequency and UV emissions. Most operations were automated. Use of personal protective equipment varied by job function.

  6. The role of personal protective factors in anchoring psychological ...

    African Journals Online (AJOL)

    In this article I report on a study that focused on the concept of resilience, in order to determine the nature of personal attributes in adolescents with learning difficulties, who were able to rebound from life's onslaughts, and to continue determinedly along the path of self-actualisation. The personal attributes impacting on the ...

  7. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  8. Plasma-aided surface technology for modification of materials referred to fire protection

    International Nuclear Information System (INIS)

    Dineff, P.; Gospodinova, D.; Kostova, L.; Vladkova, T.; Chen, E.

    2008-01-01

    There has been considerable interest in dielectric barrier air discharge at atmospheric pressure and room temperature over the past decade due to the increased number of industrial applications. New plasma-aided capillary impregnation technology for flame spreading stop and fire protection of porous materials was developed. Research, based on thermogravimetric analysis (TGA), differential thermal analysis (DTA), and differential scanning calorimetry (DSC), proves that plasma-chemical surface pre-treatment exert material change on chemical interaction between phosphorus containing flame retardant and wood matrix (Pinus sylvestris, Bulgaria; Pseudotsuga, Canada)

  9. Criminal law repercussions on the Civil Protection System

    Science.gov (United States)

    Altamura, M.; Musso, L.

    2009-09-01

    The legal systems of our Countries provide the citizenship with a high level of protection. Personal safety and the protection of property are guaranteed by the State through organized structures among which we can include the Civil Protection. The progress of science and technology has greatly improved monitoring tools, currently used by the Civil Protection, which allow, to a certain extent, to predict and prevent risk and natural hazards. The assertion of an individual right, which in some cases has reached a constitutional rank, to benefit from Civil Protection services and the widespread perception throughout the citizenship of the competence of the system to prevent disasters, often causes people to take legal action against Civil Protection authorities should they fail in their duties to protect. However, the attempt of having both recognized an economic compensation for the suffered loss and the punishment of those whom misled, frequently undergoes criminal law. This process could have results that may jeopardize the effectiveness of Civil Protection service without meeting citizens’ demands. A dual effort is thus necessary in order to solve such a problem. On the one hand, an interdisciplinary knowledge needs to pervade criminal law in an attempt to relieve its self-referentiality and pretended supremacy. On the other hand an alternative, and more agile, system -such as civil or administrative law- has to be identified in order to respond to the legitimate requests for protection in the case of a faulty behaviour of the authorities.

  10. Metoda ispitivanja kompatibilnosti sredstava lične NHB zaštite / Method of testing compatibility of personal NBC protection devices

    Directory of Open Access Journals (Sweden)

    Dušan Rajić

    2009-07-01

    Full Text Available Na primeru izabranih sredstava lične NHB zaštite demonstrirana je primena metode procene kompatibilnosti, kao vrlo bitne taktičko-tehničke karakteristike za svako novouvedeno sredstvo naoružanja i vojne opreme (NVO u Vojsci Srbije. Utvrđeno je da zaštitno filtrirajuće odelo, zaštitni laki ogrtač i zaštitne rukavice ispunjavaju postavljene kriterijume kompatibilnosti. Opisana metoda provere kompatibilnosti može da se primenjuje i na druga sredstva NVO u fazama razvoja, proizvodnje i eksploatacije. / The selected personal NBC protection devices have served as an example for demonstrating the application of the compatibility evaluation method as a very important tactical-technical characteristic of each newly introduced item of weapon and military equipment in the Serbian army. It has been determined that a filtering protective suit, a light protective coat and protective gloves meet the required criteria of compatibility. The described method of testing compatibility can be also applied to other weapons and military equipment in stages of development, production and exploitation.

  11. Battling for the Rights to Privacy and Data Protection in the Irish Courts

    Directory of Open Access Journals (Sweden)

    Shane Darcy

    2015-02-01

    Full Text Available Far-reaching mass surveillance by the US National Security Agency and other national security services has brought issues of privacy and data protection to the fore in recent years. Information and technology companies have been embroiled in this scandal for having shared, unwittingly or otherwise, users’ personal data with the security services. Facebook, the world’s largest social media company, has long-been criticised by privacy advocates because of its treatment of users’ data. Proceedings before the Irish courts concerning the role of national data protection authorities have seen an examination of these practices in light of relevant Irish and EU law.

  12. Personal Protective Equipment Guide for Military Medical Treatment Facility Personnel Handling Casualties From Weapons of Mass Destruction and Terrorism Events

    Science.gov (United States)

    2003-08-01

    Ebola, and Marburg viruses may be particularly prone to aerosol nosocomial spread. Not all infected patients develop VHFs. 3. There must be...strict adherence to hand hygiene (Ref. 100): Health care workers should clean their hands prior to donning personal protective equipment for patient...good example of a nonstochastic effect of radiation (Ref. 103). Nosocomial infection Infection acquired in the hospital. Nucleocapsid In a

  13. Geographic Data as Personal Data in Four EU Member States

    Science.gov (United States)

    de Jong, A. J.; van Loenen, B.; Zevenbergen, J. A.

    2016-06-01

    The EU Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data aims at harmonising data protection legislation in the European Union. This should promote the free flow of products and services within the EU. This research found a wide variety of interpretations of the application of data protection legislation to geographic data. The variety was found among the different EU Member States, the different stakeholders and the different types of geographic data. In the Netherlands, the Data Protection Authority (DPA) states that panoramic images of streets are considered personal data. While Dutch case law judges that the data protection legislation does not apply if certain features are blurred and no link to an address is provided. The topographic datasets studied in the case studies do not contain personal data, according to the Dutch DPA, while the German DPA and the Belgian DPA judge that topographic maps of a large scale can contain personal data, and impose conditions on the processing of topographic maps. The UK DPA does consider this data outside of the scope of legal definition of personal data. The patchwork of differences in data protection legislation can be harmonised by using a traffic light model. This model focuses on the context in which the processing of the data takes place and has four categories of data: (1) sensitive personal data, (2) personal data, (3), data that can possibly lead to identification, and (4) non-personal data. For some geographic data, for example factual data that does not reveal sensitive information about a person, can be categorised in the third category giving room to opening up data under the INSPIRE Directive.

  14. Technology of Anticorrosive Protection of Steel Constructions by Coatings Based on Rapid-Hardening Bitumen-Latex Emulsion

    Directory of Open Access Journals (Sweden)

    Nykyforchyn, H.M.

    2016-01-01

    Full Text Available The recipes of rapid-hardening bitumen-latex emulsions and coatings on its base are created, in-laboratory tests of their physical, chemical and anticorrosive properties are carried out. The technology of anticorrosive protection and the installation technical documentation for making of aqueous bitumen-latex emulsion is developed, installation is mounted and a pilot lot of rapid-hardening emulsion is produced. Experimental-industrial approbation of the technology of coating formation on pipes in oil and gas industry is carried out.

  15. Informational Self-Determination and Data Protection: A Critical Analysis of the Brazilian Jurisprudence

    Directory of Open Access Journals (Sweden)

    Rafael Copetti

    2015-12-01

    Full Text Available The study, from the hypothetical-deductive method, aims to perform a rereading of the way that the Brazilian jurisprudence has been interpreting the concept of privacy in the storage and sharing of citizens information in the current technological stage of society. Initially, it is studied the origin of personal data protection and the definition of the term privacy. Next, it is conducted a case study based on two decisions of the Court of Justice of Rio Grande do Sul, as well as a decision of the Superior Court of Justice which served as the paradigm for issues related to credit scoring system. Then, are analyzed the foundations that served as motivation for the decisions in comparison to conceptions that give support for the protection of personal data. At the end, it is possible to realize that the Courts have a mistaken view concerning the possibility of storage and commercialization of consumers database, being necessary a review of the positions mentioned.

  16. 40 CFR 170.240 - Personal protective equipment.

    Science.gov (United States)

    2010-07-01

    ... shirts, long pants, short pants, shoes, socks, and other items of work clothing are not considered... movement of the pesticide being used through the material during use. (2) When “waterproof” personal..., one of the following types of footwear must be worn: (i) Chemical-resistant shoes. (ii) Chemical...

  17. Social and personal normative influences on healthcare professionals to use information technology: Towards a more robust social ergonomics.

    Science.gov (United States)

    Holden, Richard J

    2012-09-01

    Social structures and processes are increasingly acknowledged and studied within the human factors/ergonomics (HFE) discipline. At the same time, social phenomena are rarely the focus of HFE work, leaving a knowledge gap. The present study directly addresses social and personal normative forces that influence technology use and performance. Social and personal normative influence to use electronic health records (EHR) were investigated using semi-structured qualitative interviews with 20 attending physicians at two US hospitals. Analyses used a comprehensive framework based on leading social scientific theories and revealed numerous sources of influence, including hospital administration, colleagues, patients, clinical and professional groups, government, and one's self. Influence was achieved through different means and invoked different psychological processes. Findings motivate a new view of professionals' technology use as a highly social process occurring in a social context, with implications for research, policy, design, and in general the development of a robust social ergonomics.

  18. Semantic Learning Service Personalized

    Directory of Open Access Journals (Sweden)

    Yibo Chen

    2012-02-01

    Full Text Available To provide users with more suitable and personalized service, personalization is widely used in various fields. Current e-Learning systems search for learning resources using information search technology, based on the keywords that selected or inputted by the user. Due to lack of semantic analysis for keywords and exploring the user contexts, the system cannot provide a good learning experiment. In this paper, we defined the concept and characteristic of the personalized learning service, and proposed a semantic learning service personalized framework. Moreover, we made full use of semantic technology, using ontologies to represent the learning contents and user profile, mining and utilizing the friendship and membership of the social relationship to construct the user social relationship profile, and improved the collaboration filtering algorithm to recommend personalized learning resources for users. The results of the empirical evaluation show that the approach is effectiveness in augmenting recommendation.

  19. User-centered development of a smart phone mobile application delivering personalized real-time advice on sun protection.

    Science.gov (United States)

    Buller, David B; Berwick, Marianne; Shane, James; Kane, Ilima; Lantz, Kathleen; Buller, Mary Klein

    2013-09-01

    Smart phones are changing health communication for Americans. User-centered production of a mobile application for sun protection is reported. Focus groups (n = 16 adults) provided input on the mobile application concept. Four rounds of usability testing were conducted with 22 adults to develop the interface. An iterative programming procedure moved from a specification document to the final mobile application, named Solar Cell. Adults desired a variety of sun protection advice, identified few barriers to use and were willing to input personal data. The Solar Cell prototype was improved from round 1 (seven of 12 tasks completed) to round 2 (11 of 12 task completed) of usability testing and was interoperable across handsets and networks. The fully produced version was revised during testing. Adults rated Solar Cell as highly user friendly (mean = 5.06). The user-centered process produced a mobile application that should help many adults manage sun safety.

  20. Personal protective equipment, hygiene behaviours and occupational risk of illness after July 2011 flood in Copenhagen, Denmark.

    Science.gov (United States)

    Wójcik, O P; Holt, J; Kjerulf, A; Müller, L; Ethelberg, S; Mølbak, K

    2013-08-01

    Incidence of various diseases can increase following a flood. We aimed to identify professionals in Copenhagen who became ill after contact with 2 July 2011 floodwater/sediment and determine risks and protective factors associated with illness. We conducted a cohort study of employees engaged in post-flood management activities. Participants completed a questionnaire collecting information about demographics, floodwater/sediment exposure, compliance with standard precautions, and symptoms of illness. Overall, 257 professionals participated, with 56 (22%) cases. Risk of illness was associated with not washing hands after floodwater/sediment contact [relative risk (RR) 2∙45], exposure to floodwater at work and home (RR 2∙35), smoking (RR 1∙92), direct contact with floodwater (RR 1∙86), and eating/drinking when in contact with floodwater (RR 1∙77). Professionals need to follow standard precautions when in contact with floodwater/sediment, especially proper hand hygiene after personal protective equipment use and before eating/drinking and smoking.

  1. Radiological protection of the unborn child. Recommendation of the Commission on Radiological Protection and scientific grounds

    International Nuclear Information System (INIS)

    Sarenio, O.

    2006-01-01

    incorporation monitoring of a maximum committed effective dose of 1 mSv to the subsequently born child to age 70 years under the conditions - of a continuous intake of the maximum activity permitted by the limit for occupationally radiation-exposed persons due to incorporation over a period of 10 years and - a single intake of the maximum activity permitted by the limit for occupationally radiation-exposed persons as a result of a single incorporation of typical nuclide mixes, 3. to set out the potential and limits of ambient air monitoring for the incorporation monitoring of women of childbearing age and to submit a recommendation on the basis of the latest advances in science and technology. (orig.)

  2. Occupational sun protection: workplace culture, equipment provision and outdoor workers' characteristics.

    Science.gov (United States)

    Reeder, Anthony I; Gray, Andrew; McCool, Judith P

    2013-01-01

    The aim of this study was to describe outdoor workers' sun-protective practices, workplace sun-safety culture and sun-protective equipment provision; investigate the association of demographic, personal and occupational factors with sun-protective practices; and identify potential strategies for improving workers' sun protection. The present study used a clustered survey design with randomly identified employers in nine occupations. Employees provided questionnaire measures of demographics, personal characteristics (skin type, skin cancer risk perceptions, tanning attitudes, sun-exposure knowledge), personal occupational sun protection practices (exposure reduction, use of sun-protective clothing, sunscreen and shade), workplace sun-protective equipment provision and perceived workplace sun-safety culture. Summative scores were calculated for attitudes, knowledge, workplace provision and culture. A multivariable model was built with worker and workplace variables as plausible predictors of personal sun protection. In this study, 1,061 workers (69% participation) from 112 workplaces provided sufficient information for analysis. Sex, age, prioritized ethnicity, education and risk perception differed significantly between occupational groups (pworkplace sun-protection equipment provision and supportive culture. After adjustment, each one-point increase in Workplace Sun-safety Culture 2013Score (range 12 points) was associated with a 0.16 higher Personal Sun-Protection Score (pWorkplace Provision Score (range 4 points) was associated with a 0.14 higher score (pworkplace culture are promising components for the development of comprehensive programmes to improve outdoor workers' sun-protective practices.

  3. 46 CFR 154.1405 - Respiratory protection.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Respiratory protection. 154.1405 Section 154.1405... Equipment § 154.1405 Respiratory protection. When Table 4 references this section, a vessel carrying the listed cargo must have: (a) Respiratory protection equipment for each person on board that protects the...

  4. Energy-environment policy modeling of endogenous technological change with personal vehicles. Combining top-down and bottom-up methods

    International Nuclear Information System (INIS)

    Jaccard, Mark; Murphy, Rose; Rivers, Nic

    2004-01-01

    The transportation sector offers substantial potential for greenhouse gas (GHG) emission abatement, but widely divergent cost estimates complicate policy making; energy-economy policy modelers apply top-down and bottom-up cost definitions and different assumptions about future technologies and the preferences of firms and households. Our hybrid energy-economy policy model is technology-rich, like a bottom-up model, but has empirically estimated behavioral parameters for risk and technology preferences, like a top-down model. Unlike typical top-down models, however, it simulates technological change endogenously with functions that relate the financial costs of technologies to cumulative production and adjust technology preferences as market shares change. We apply it to the choice of personal vehicles to indicate, first, the effect on cost estimates of divergent cost definitions and, second, the possible response to policies that require a minimum market share for low emission vehicles

  5. Person-centered care and engagement via technology of residents with dementia in aged care facilities.

    Science.gov (United States)

    Goh, Anita M Y; Loi, Samantha M; Westphal, Alissa; Lautenschlager, Nicola T

    2017-12-01

    Touchscreen technology (TT) is a resource that can improve the quality of life of residents with dementia, and care staff, in residential aged care facilities (RACF) through a person-centered care approach. To enable the use of TTs to engage and benefit people with dementia in RACFs, education is needed to explore how these devices may be used, what facilitates use, and how to address barriers. We sought to provide education and explore RACF staff views and barriers on using TT to engage their residents with dementia. An educational session on using TT with residents with dementia was given to staff from three long-term RACFs in Melbourne, Australia. A cross-sectional convenience sample of 17 staff members (personal care attendants, registered nurses, enrolled nurses, allied health clinicians, and domestic staff) who attended were administered questionnaires pre- and post-sessions. As a result of the education seminar, they were significantly more confident in their ability to use TT devices with residents. TT, and education to staff about its use with residents with dementia, is a useful strategy to enhance RACF staff knowledge and confidence, thereby enhancing the use of technology in RACFs in order to improve care standards in people with dementia.

  6. Days individual equipment of protection and professional risks; Equipements de protection individuelle et risques professionnelles

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The personal protection equipment is studied in the legal way (legal liabilities, certification, European texts), technical way (ergonomics, painfulness of ventilated equipment wearing, reliability of a respirable air line, protection gloves against the chemical risk, exposure to nano particulates, working in hot area), human factors (hostile area and emotion management), studies on personal equipment such evaluation, efficiency, conception of new equipment, physiological tolerance, limit of use, and some general safety studies on the working places. (N.C.)

  7. Technology-Aided Pictorial Cues to Support the Performance of Daily Activities by Persons with Moderate Alzheimer's Disease

    Science.gov (United States)

    Lancioni, Giulio E.; Perilli, Viviana; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Cassano, Germana; Pinto, Katia; Minervini, Mauro G.; Oliva, Doretta

    2012-01-01

    We developed a technology-aided intervention strategy relying on pictorial cues alone or in combination with verbal instructions and assessed these two versions of the strategy with three persons with moderate Alzheimer's disease. In Section I of the study, the strategy version with pictorial cues plus verbal instructions was compared with an…

  8. Shared decision-making using personal health record technology: a scoping review at the crossroads.

    Science.gov (United States)

    Davis, Selena; Roudsari, Abdul; Raworth, Rebecca; Courtney, Karen L; MacKay, Lee

    2017-07-01

    This scoping review aims to determine the size and scope of the published literature on shared decision-making (SDM) using personal health record (PHR) technology and to map the literature in terms of system design and outcomes. Literature from Medline, Google Scholar, Cumulative Index to Nursing and Allied Health Literature, Engineering Village, and Web of Science (2005-2015) using the search terms "personal health records," "shared decision making," "patient-provider communication," "decision aid," and "decision support" was included. Articles ( n  = 38) addressed the efficacy or effectiveness of PHRs for SDM in engaging patients in self-care and decision-making or ways patients can be supported in SDM via PHR. Analysis resulted in an integrated SDM-PHR conceptual framework. An increased interest in SDM via PHR is apparent, with 55% of articles published within last 3 years. Sixty percent of the literature originates from the United States. Twenty-six articles address a particular clinical condition, with 10 focused on diabetes, and one-third offer empirical evidence of patient outcomes. The tethered and standalone PHR architectural types were most studied, while the interconnected PHR type was the focus of more recently published methodological approaches and discussion articles. The study reveals a scarcity of rigorous research on SDM via PHR. Research has focused on one or a few of the SDM elements and not on the intended complete process. Just as PHR technology designed on an interconnected architecture has the potential to facilitate SDM, integrating the SDM process into PHR technology has the potential to drive PHR value. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  9. Remote and continuous gamma spectrometry for environmental radiation protection: state of the art technology and perspectives

    International Nuclear Information System (INIS)

    Van Put, Ph.; Lellis, C.; Debauche, A.; Lacroix, J-P.

    2004-01-01

    The instruments technologies for radiological protection of the environment have been considerably enhanced since the last 20 years. From very simple warning bells in the early 80s, the instruments have been sophisticated nowadays to a degree where their performances can be compared to the performances achieved in low level laboratories. This presentation will briefly overview the evolution of these instruments by comparing their technology, their methodology and their performances. Next, it will present the concepts of the state of the art technology in the field of continuous monitoring of the environment. A discussion will follow on the performances and the limitations of this technology. Finally, the presentation will highlight the future perspective of developments by taking into account recent progress in the field of radiation detectors, telecommunication and computer sciences among others. (authors)

  10. Material Protection, Accounting, and Control Technologies (MPACT): Modeling and Simulation Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Cipiti, Benjamin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dunn, Timothy [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Durbin, Samual [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Durkee, Joe W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); England, Jeff [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Jones, Robert [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Ketusky, Edward [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Li, Shelly [Idaho National Lab. (INL), Idaho Falls, ID (United States); Lindgren, Eric [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Meier, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Miller, Michael [Idaho National Lab. (INL), Idaho Falls, ID (United States); Osburn, Laura Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pereira, Candido [Argonne National Lab. (ANL), Argonne, IL (United States); Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Scaglione, John [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Scherer, Carolynn P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sprinkle, James K. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Yoo, Tae-Sic [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-08-05

    The development of sustainable advanced nuclear fuel cycles is a long-term goal of the Office of Nuclear Energy’s (DOE-NE) Fuel Cycle Technologies program. The Material Protection, Accounting, and Control Technologies (MPACT) campaign is supporting research and development (R&D) of advanced instrumentation, analysis tools, and integration methodologies to meet this goal. This advanced R&D is intended to facilitate safeguards and security by design of fuel cycle facilities. The lab-scale demonstration of a virtual facility, distributed test bed, that connects the individual tools being developed at National Laboratories and university research establishments, is a key program milestone for 2020. These tools will consist of instrumentation and devices as well as computer software for modeling. To aid in framing its long-term goal, during FY16, a modeling and simulation roadmap is being developed for three major areas of investigation: (1) radiation transport and sensors, (2) process and chemical models, and (3) shock physics and assessments. For each area, current modeling approaches are described, and gaps and needs are identified.

  11. Physical protection

    International Nuclear Information System (INIS)

    Myers, D.A.

    1989-01-01

    Physical protection is defined and its function in relation to other functions of a State System of Accounting for and Control of Nuclear Materials is described. The need for a uniform minimum international standard for physical protection as well as the need for international cooperation in physical protection is emphasized. The IAEA's INFCIRC/225/Rev. 1 (Annex 1) is reviewed. The Convention on the Physical Protection of Nuclear Material (Annex 2) is discussed. Photographs show examples of typical physical protection technology (Annex 3)

  12. Variability in and agreement between modeled and personal continuously measured black carbon levels using novel smartphone and sensor technologies.

    Science.gov (United States)

    Nieuwenhuijsen, Mark J; Donaire-Gonzalez, David; Rivas, Ioar; de Castro, Montserrat; Cirach, Marta; Hoek, Gerard; Seto, Edmund; Jerrett, Michael; Sunyer, Jordi

    2015-03-03

    Novel technologies, such as smartphones and small personal continuous air pollution sensors, can now facilitate better personal estimates of air pollution in relation to location. Such information can provide us with a better understanding about whether and how personal exposures relate to residential air pollution estimates, which are normally used in epidemiological studies. The aims of this study were to examine (1) the variability in personal air pollution levels during the day and (2) the relationship between modeled home and school estimates and continuously measured personal air pollution exposure levels in different microenvironments (e.g., home, school, and commute). We focused on black carbon as an indicator of traffic-related air pollution. We recruited 54 school children (aged 7-11) from 29 different schools around Barcelona as part of the BREATHE study, an epidemiological study of the relation between air pollution and brain development. For 2 typical week days during 2012-2013, the children were given a smartphone with CalFit software to obtain information on their location and physical activity level and a small sensor, the micro-aethalometer model AE51, to measure their black carbon levels simultaneously and continuously. We estimated their home and school exposure to PM2.5 filter absorbance, which is well-correlated with black carbon, using a temporally adjusted PM2.5 absorbance land use regression (LUR) model. We found considerable variation in the black carbon levels during the day, with the highest levels measured during commuting periods (geometric mean = 2.8 μg/m(3)) and the lowest levels at home (geometric mean = 1.3 μg/m(3)). Hourly temporally adjusted LUR model estimates for the home and school showed moderate to good correlation with measured personal black carbon levels at home and school (r = 0.59 and 0.68, respectively) and lower correlation with commuting trips (r = 0.32 and 0.21, respectively). The correlation between modeled home

  13. Integrating large-scale data and RNA technology to protect crops from fungal pathogens

    Directory of Open Access Journals (Sweden)

    Ian Joseph Girard

    2016-05-01

    Full Text Available With a rapidly growing human population it is expected that plant science researchers and the agricultural community will need to increase food productivity using less arable land. This challenge is complicated by fungal pathogens and diseases, many of which can severely impact crop yield. Current measures to control fungal pathogens are either ineffective or have adverse effects on the agricultural enterprise. Thus, developing new strategies through research innovation to protect plants from pathogenic fungi is necessary to overcome these hurdles. RNA sequencing technologies are increasing our understanding of the underlying genes and gene regulatory networks mediating disease outcomes. The application of invigorating next generation sequencing strategies to study plant-pathogen interactions has and will provide unprecedented insight into the complex patterns of gene activity responsible for crop protection. However, questions remain about how biological processes in both the pathogen and the host are specified in space directly at the site of infection and over the infection period. The integration of cutting edge molecular and computational tools will provide plant scientists with the arsenal required to identify genes and molecules that play a role in plant protection. Large scale RNA sequence data can then be used to protect plants by targeting genes essential for pathogen viability in the production of stably transformed lines expressing RNA interference molecules, or through foliar applications of double stranded RNA.

  14. Audit Report on "Protection of the Department of Energy's Unclassified Sensitive Electronic Information"

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-08-01

    The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financial harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however

  15. Principals' Personal Variables and Information and Communication Technology Utilization in Federal Capital Territory Senior Secondary Schools, Abuja, Nigeria

    Science.gov (United States)

    Ogunshola, Roseline Folashade; Adeniyi, Abiodun

    2017-01-01

    The study investigated principals' personal variables and information and communication technology utilization in Federal Capital Territory (FCT) senior secondary schools, Abuja, Nigeria. The study adopted the correlational research design. The study used a sample of 94 senior secondary schools (including public and private) in FCT. Stratified…

  16. Research and engineering application of coordinated instrumentation control and protection technology between reactor and steam turbine generator on nuclear power plant

    International Nuclear Information System (INIS)

    Sun Xingdong

    2014-01-01

    The coordinated instrumentation control and protection technology between reactor and steam turbine generator (TG) usually is very significant and complicated for a new construction of nuclear power plant, because it carries the safety, economy and availability of nuclear power plant. Based on successful practice of a nuclear power plant, the experience on interface design and hardware architecture of coordinated instrumentation control and protection technology between reactor and steam turbine generator was abstracted and researched. In this paper, the key points and engineering experience were introduced to give the helpful instructions for the new project. (author)

  17. Consumer Protection in Cyberspace

    Directory of Open Access Journals (Sweden)

    Oscar H. Gandy, Jr.

    2011-06-01

    Full Text Available This critical essay introduces the problem of discrimination enabled through the use of transaction-generated-information derived from the analysis of user behaviors within the network environment. The essay begins by describing how segments of the population that are already vulnerable become further victimized through the strategic use of discriminatory algorithms in support of identification, classification, segmentation, and targeting. In response, it evaluates a set of policy options that might be used to limit the harm and compensate the victims of these inherently dangerous technologies. Traditional approaches that stress the protection of privacy through restrictions on the collection and use of personal information are compared with alternatives based on individual and class actions under tort law, as well as more traditional regulatory approaches developed in the area of consumer products safety and environmental regulation.

  18. The Economic Value of Personal Information and Policy Implication

    OpenAIRE

    Kim, Jiin; Nam, Changi; Kim, Seongcheol

    2015-01-01

    Personal information is essential in an information-oriented society for societal development and as a valuable business resource. However, because of poor management and a lack of proper protection, leakage of personal information can take place over time, and the standard for compensation is not well established. In order to establish appropriate policies for its protection, we need to know the economic value of personal information. Using conjoint analysis, we analyze the potential value o...

  19. Hearing damage by personal stereo

    DEFF Research Database (Denmark)

    Hammershøi, Dorte; Ordoñez, Rodrigo Pizarro; Reuter, Karen

    2006-01-01

    The technological development within personal stereo systems, such as MP3 players, iPods etc., has changed music listening habits from home entertainment to everyday and everywhere use. The technology has developed considerably, since the introduction of CD walkmen, and high-level low-distortion ......The technological development within personal stereo systems, such as MP3 players, iPods etc., has changed music listening habits from home entertainment to everyday and everywhere use. The technology has developed considerably, since the introduction of CD walkmen, and high-level low......-distortion music is produced by minimal devices. In this paper, the existing literature on effects of personal stereo systems is reviewed, incl. studies of exposure levels, and effects on hearing. Generally, it is found that the levels being used is of concern, which in one study [Acustica?Acta Acustica, 82 (1996......) 885?894] is demonstrated to relate to the specific use in situations with high levels of background noise. Another study [Med. J. Austr., 1998; 169: 588-592], demonstrates that the effect of personal stereo is comparable to that of being exposed to noise in industry. The results are discussed in view...

  20. Radiation protection in nuclear medicine

    International Nuclear Information System (INIS)

    Seeburrun, V.

    2013-04-01

    Radiation protection in nuclear medicine in this project is concerned with the reduction of doses to workers, patients and members of the public. Protection of workers is achieved by adopting good personal habits, good housekeeping, proper use of personal protective devices and equipment, attend training and have continuous education. Exposure to radiation of workers and the members of the public are minimised by proper management of radioactive waste and safe transport of radioactive material. The design and shielding of a nuclear medicine department shall further provide for the protection of the worker, the patient and the general public. Protection of patient is achieved by justifying the procedure, delivering the minimum radiation dose possible to the patient while obtaining the best image quality and applying guidance levels. Special considerations shall be given to pregnant and breast-feeding patients. Quality assurance programme through image quality, radiopharmaceutical quality and patient records on nuclear medicine procedures shall provide assurance to the patient. (au)

  1. Investigation of Personality Traits between Infertile Women Submitted to Assisted Reproductive Technology or Surrogacy.

    Science.gov (United States)

    Asgari, Najmeh; Yazdkhasti, Fariba; Nasr Esfahani, Mohammad Hossein

    2016-01-01

    Personality traits affect human relationships, social interactions, treatment procedures, and essentially all human activities. The purpose of this study is to investigate the personality traitsincluding sensation seeking, flexibility, and happiness among a variety of infertile women who were apt to choose assisted reproductive technology (ART) or surrogacy. This is a cross-sectional study that was performed on 251 infertile women who visited Isfahan and Tehran Reproductive Medicine Center. These fertility clinics are located in Isfahan and Tehran, Iran. In this study, 201 infertile women who underwent treatment using ART and 50 infertile women who tended to have surrogacy were chosen by convenience sampling. Zuckerman's Sensation Seeking Scale Form V (SSS-V), Psychological Flexibility Questionnaire (adapted from NEO Personality Inventory-Revised) and Oxford Happiness Questionnaire (OHQ) were used as research instruments. All participants had to complete the research instruments in order to be included in this study. Data were analyzed by descriptive-analytical statistics and statistical tests including multivariate analysis of variance (MANOVA) and Z Fisher. Statistically significant effects were accepted for Psurrogacy (Psurrogacy (Psurrogacy (Psurrogacy. This study shows that demographic variables are effective in happiness of infertile women. Also, there is a significant relation among sensation seeking, flexibility and happiness in infertile women.

  2. Stability of person ability measures in people with acquired brain injury in the use of everyday technology: the test-retest reliability of the Management of Everyday Technology Assessment (META).

    Science.gov (United States)

    Malinowsky, Camilla; Kassberg, Ann-Charlotte; Larsson-Lund, Maria; Kottorp, Anders

    2016-01-01

    To evaluate the test-retest reliability of the Management of Everyday Technology Assessment (META) in a sample of people with acquired brain injury (ABI). The META was administered twice within a two-week period to 25 people with ABI. A Rasch measurement model was used to convert the META ordinal raw scores into equal-interval linear measures of each participant's ability to manage everyday technology (ET). Test-retest reliability of the stability of the person ability measures in the META was examined by a standardized difference Z-test and an intra-class correlations analysis (ICC 1). The results showed that the paired person ability measures generated from the META were stable over the test-retest period for 22 of the 25 subjects. The ICC 1 correlation was 0.63, which indicates good overall reliability. The META demonstrated acceptable test-retest reliability in a sample of people with ABI. The results illustrate the importance of using sufficiently challenging ETs (relative to a person's abilities) to generate stable META measurements over time. Implications for Rehabilitation The findings add evidence regarding the test-retest reliability of the person ability measures generated from the observation assessment META in a sample of people with ABI. The META might support professionals in the evaluation of interventions that are designed to improve clients' performance of activities including the ability to manage ET.

  3. Biomedical Use of Aerospace Personal Cooling Garments

    Science.gov (United States)

    Webbon, Bruce W.; Montgomery, Leslie D.; Callaway, Robert K.

    1994-01-01

    Personal thermoregulatory systems are required during extravehicular activity (EVA) to remove the metabolic heat generated by the suited astronaut. The Extravehicular and Protective Systems (STE) Branch of NASA Ames Research Center has developed advanced concepts or liquid cooling garments for both industrial and biomedical applications for the past 25 years. Examples of this work include: (1) liquid cooled helmets for helicopter pilots and race car drivers; (2) vests for fire and mine rescue personnel; (3) bras to increase the definition of tumors during thermography; (4) lower body garments for young women with erythomelaigia; and (5) whole body garments used by patients with multiple sclerosis (MS). The benefits of the biomedical application of artificial thermoregulation received national attention through two recent events: (1) the liquid-cooled garment technology was inducted into the United States Space Foundation's Space Technology Hall of Fame (1993); and (2) NASA has signed a joint Memorandum of Understanding with the Multiple Sclerosis Association (1994) to share this technology for use with MS patient treatment. The STE Branch is currently pursuing a program to refine thermoregulatory design in light of recent technology developments that might be applicable for use by several medical patient populations. Projects have been initiated to apply thermoregulatory technology for the treatment and/or rehabilitation of patients with spinal cord injuries, multiple sclerosis, migraine headaches, and to help prevent the loss of hair during chemotherapy.

  4. Personalized ventilation

    DEFF Research Database (Denmark)

    Melikov, Arsen Krikor

    2004-01-01

    microenvironment. Furthermore, HVAC systems should be designed to protect occupants from airborne transmission of infectious agents that may be present in exhaled air. Personalized ventilation is a new development in the field of HVAC and has the potential to fulfill the above requirements. This paper reviews...... existing knowledge on performance of personalized ventilation (PV) and on human response to it. The airflow interaction in the vicinity of the human body is analyzed and its impact on thermal comfort and inhaled air quality is discussed together with control strategies and the application of PV in practice...

  5. FOREIGN AFFAIRS: Internally Displaced Persons Lack Effective Protection

    National Research Council Canada - National Science Library

    2001-01-01

    Internally displaced persons--those forced to flee their homes because of armed conflict and persecution but who remain within their own country are among the most at-risk, vulnerable populations in the world...

  6. Computer applications in radiation protection

    International Nuclear Information System (INIS)

    Cole, P.R.; Moores, B.M.

    1995-01-01

    Computer applications in general and diagnostic radiology in particular are becoming more widespread. Their application to the field of radiation protection in medical imaging, including quality control initiatives, is similarly becoming more widespread. Advances in computer technology have enabled departments of diagnostic radiology to have access to powerful yet affordable personal computers. The application of databases, expert systems and computer-based learning is under way. The executive information systems for the management of dose and QA data that are under way at IRS are discussed. An important consideration in developing these pragmatic software tools has been the range of computer literacy within the end user group. Using interfaces have been specifically designed to reflect the requirements of many end users who will have little or no computer knowledge. (Author)

  7. Personal and other factors affecting acceptance of smartphone technology by older Chinese adults.

    Science.gov (United States)

    Ma, Qi; Chan, Alan H S; Chen, Ke

    2016-05-01

    It has been well documented that in the 21st century, there will be relatively more older people around the world than in the past. Also, it seems that technology will expand in this era at an unprecedented rate. Therefore, it is of critical importance to understand the factors that influence the acceptance of technology by older people. The positive impact that the use of mobile applications can have for older people was confirmed by a previous study (Plaza et al., 2011). The study reported here aimed to explore and confirm, for older adults in China, the key influential factors of smartphone acceptance, and to describe the personal circumstances of Chinese older adults who use smartphone. A structured questionnaire and face to face individual interviews were used with 120 Chinese older adults (over 55). Structural Equation Modeling was used to confirm a proposed smartphone acceptance model based on Technology Acceptance Model (TAM), and the Unified Theory of Acceptance and Use of Technology (UTAUT). The results showed that those who were younger, with higher education, non-widowed, with better economic condition related to salary or family support were more likely to use smartphone. Also, cost was found to be a critical factor influencing behavior intention. Self-satisfaction and facilitating conditions were proved to be important factors influencing perceived usefulness and perceived ease of use. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  8. A state of the art on coastal environmental protection using radioisotope tracer technology

    CERN Document Server

    Jung, S H; Jin, J H; Kim, J B

    2002-01-01

    Construction of artificial structures has caused a sediment process change due to the variation of hydraulic condition in Korea. Subsequently we have a serious problem of shoaling for shoreline deformation, siltation of the harbor and shipping channel. To protect those abnormal environmental changes, a large estimate has been spent for additional construction such as outer wall facilities, littoral nourishment and dredging. Systematic long-term studies should be carried out to understand the causes of environmental change. In addition, comprehensive plan is required for its monitoring and prevention. The radioisotope application studies for coastal environmental protection have not been actively performed only in the developed countries like France, Canada, and Australia etc., but also in many developing countries like Poland, India. Since KAERI has performed two experiments in costal area of Korea in 1960s, no more study has been reported. Recently the studies of radiotracer application technology is getting...

  9. The personal health future

    NARCIS (Netherlands)

    Spil, Antonius A.M.; Klein, Richard

    2015-01-01

    Despite several personal health record (PHR) product offerings from major technology sector players over the past years, the notion of tracking and maintaining one׳s personal health information electronically has failed to takeoff among consumers. Accordingly, we explore factors potentially shaping

  10. Effective personal protective clothing for health care workers attending patients with severe acute respiratory syndrome.

    Science.gov (United States)

    Wong, Thomas K S; Chung, Joanne W Y; Li, Y; Chan, Wai F; Ching, Patricia T Y; Lam, Conita H S; Chow, Chun B; Seto, Wing H

    2004-04-01

    Optimal usability is crucial in providing protection for health care workers who are exposed to severe acute respiratory syndrome day and night while taking care of patients with the virus. No research study has yet tested the usability of personal protective clothing (PPC). The study was carried out in 3 stages. PPC available in Hong Kong were sorted by their physical properties in the first stage. The second stage was a single-blinded study examining the different usability aspects of the PPC. The third stage was a simulated viral load test. Four types were identified: good water repellency and water resistance, poor air permeability (Type A PPC); good water repellency and air permeability, poor water resistance (Type B PPC); poor water repellency, poor water resistance, and fair air permeability (Type C PPC); and good water repellency, poor air permeability, and fair water resistance (Type D PPC). Type D PPC had a significantly higher number of contamination sites on the subjects' dorsum and palm. Type C PPC had the highest contamination over the trunk. Findings in the viral load test showed that there was a significant difference in the contamination of the face (t=4.69, df=38, Phand contamination is lowest among the 4 groups in the current study.

  11. Emergency Protection from Aerosols

    Energy Technology Data Exchange (ETDEWEB)

    Cristy, G.A.

    2001-11-13

    Expedient methods were developed that could be used by an average person, using only materials readily available, to protect himself and his family from injury by toxic (e.g., radioactive) aerosols. The most effective means of protection was the use of a household vacuum cleaner to maintain a small positive pressure on a closed house during passage of the aerosol cloud. Protection factors of 800 and above were achieved.

  12. Emergency protection from aerosols

    International Nuclear Information System (INIS)

    Cristy, G.A.; Chester, C.V.

    1981-07-01

    Expedient methods were developed that could be used by an average person, using only materials readily available, to protect himself and his family from injury by toxic (e.g., radioactive) aerosols. The most effective means of protection was the use of a household vacuum cleaner to maintain a small positive pressure on a closed house during passage of the aerosol cloud. Protection factors of 800 and above were achieved

  13. Radiation protection course for physicians. 3. rev. ed.

    International Nuclear Information System (INIS)

    Stieve, F.E.

    1979-01-01

    The regulations of the Radiation Protection Ordinance and the X-ray Ordinance concerning the expert training of radiological safety officers and health physicists working in hospitals and general practice require expert knowledge in radiation protection of these persons. Expert knowledge includes knowledge of radiation protection itself but also experience in the medical application of ionizing radiation and radioactive materials and experience required for judging the state of health of persons occupationally exposed to radiation. The discussions between lectures and participants of the radiation protection courses made it necessary to update the textbooks with regard to the latest state of knowledge in radiobiology, radiation hygiene, radiation protection, and legislation. (orig./HP) [de

  14. Actual global problems of radiation protection

    International Nuclear Information System (INIS)

    Ninkovic, M.

    1995-01-01

    Personal views on some actual problems in radiation protection are given in this paper. Among these problems are: evolution methodology used in radiation protection regulations; radiation protection, nuclear energy and safety, and new approaches to the process of the hazardous substances management. An interesting fact relating to the X-ray, radiation protection and Nikola Tesla are given also. (author)

  15. 36 CFR 520.4 - Protection of zoo animals.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Protection of zoo animals... Protection of zoo animals. Except for official purposes, no person shall: (a) Kill, injure, or disturb any exhibit or research animal by any means except to secure personal safety; (b) Pet, attempt to pet, handle...

  16. An Investigation into the Role of Mobile Technology in Collaborative Disease Management for Persons Living with Type 2 Diabetes

    Directory of Open Access Journals (Sweden)

    S. Sultan

    2015-05-01

    Full Text Available Diabetes and other chronic non-communicable diseases represent a leading threat to health care and human development. The authors discusses how mobile technology can achieve collaborative disease management (CDM within a population living with Type 2 diabetes. We introduces a framework for CDM using mobile technologies. While it can be applied to the management of any disease, we describe a specific instance for diabetes peer-support. In this paper, we validate the framework through the development and testing of a Mobile Health initiative called Mobile Diabetes Self-Management Support (DSMS. It allows persons living with diabetes to learn from each others’ experiences through a virtual support group. The paper presents two user studies conducted. The first study captured the participants’ initial perceptions of the application in a controlled environment and the second study investigated system usage and collaboration when the application was used in their personal settings.

  17. Reducing Students' Carbon Footprints Using Personal Carbon Footprint Management System Based on Environmental Behavioural Theory and Persuasive Technology

    Science.gov (United States)

    Lin, Shyh-ming

    2016-01-01

    This study applied environmental behavioural theories to develop a personal carbon footprint management system and used persuasive technology to implement it. The system serves as an educational system to improve the determinants of students' low-carbon behaviours, to promote low-carbon concepts and to facilitate their carbon management. To assess…

  18. Examination of some protective conditions on technological properties of irradiated food grade polysaccharides

    Energy Technology Data Exchange (ETDEWEB)

    Adeil Pietranera, M.S. E-mail: pietrane@cae.cnea.gov.ar; Narvaiz, P. E-mail: narvaiz@cae.cnea.gov.ar

    2001-02-01

    Corn and cassava starches, agar-agar and kappa carrageenan, polysaccharides used as food additives, were gamma irradiated with doses suitable for microbial decontamination. Starches were analysed in paste and pudding viscosity and paper chromatography; agar and carrageenan, in viscosity and compression tests on gels and custards. Afterwards, substances were added to verify whether they could prevent irradiation technological impairment. Results revealed significant differences between control and irradiated samples in most determinations. No added substance was able to protect the functional properties of these additives. (author)

  19. Postgraduate training in radiological protection by e-learning the technological platforms

    Energy Technology Data Exchange (ETDEWEB)

    Verdu, G., E-mail: gverdu@iqn.upv.es [Departamento de Ingeniera Quimica y Nuclear, Universidad Politcnica de Valencia (Spain); Mayo, P.; Alcaraz, D., E-mail: p.mayo@titaniast.com, E-mail: d.alcaraz@titaniast.com [TITANIA Servicios Teconologicos, Grupo Dominguis, Valencia (Spain); Campayo, J.M., E-mail: j.campayo@lainsa.com [LAINSA, Grupo Dominguis, Valencia, (Spain)

    2011-07-01

    The companies that are working in decontamination, dismantling and assessment in nuclear power plants, usually have their employees in different facilities far from its central offices. When there is a training in radiological protection applied to the nuclear field, it is difficult for these people the attendance to the course because of different reasons as the location of the formation centres which sometimes are not near from the nuclear facilities, so they usually cannot attend their daily work with the same effectiveness. In this work we present a postgraduate training in radiological protection supervised by Polytechnical University of Valencia (Spain) applied to nuclear and radioactive facilities by a technological platform developed in collaboration with the university. This platform is adapted and designed to different high level contents and applications in different areas and sections, related to a general part, radioactive facilities, nuclear facilities and advanced concepts. When the student finishes an area, an evaluation has to be done to prove the understanding of the lessons. We have included films of different activities as decontamination devices, radiation detectors..etc with the contents to make the explanations more understandable to the student. The course is complemented with a final review and exam that are not online to guarantee that the training is well finished. In addition the student has some practice related with different items explained during the training as the use of equipment in radiological protection tasks. This type of training is more flexitime and can be adapted to the necessities of each user, avoiding high costs and unnecessary displacements. (author)

  20. Postgraduate training in radiological protection by e-learning the technological platforms

    International Nuclear Information System (INIS)

    Verdu, G.; Mayo, P.; Alcaraz, D.; Campayo, J.M.

    2011-01-01

    The companies that are working in decontamination, dismantling and assessment in nuclear power plants, usually have their employees in different facilities far from its central offices. When there is a training in radiological protection applied to the nuclear field, it is difficult for these people the attendance to the course because of different reasons as the location of the formation centres which sometimes are not near from the nuclear facilities, so they usually cannot attend their daily work with the same effectiveness. In this work we present a postgraduate training in radiological protection supervised by Polytechnical University of Valencia (Spain) applied to nuclear and radioactive facilities by a technological platform developed in collaboration with the university. This platform is adapted and designed to different high level contents and applications in different areas and sections, related to a general part, radioactive facilities, nuclear facilities and advanced concepts. When the student finishes an area, an evaluation has to be done to prove the understanding of the lessons. We have included films of different activities as decontamination devices, radiation detectors..etc with the contents to make the explanations more understandable to the student. The course is complemented with a final review and exam that are not online to guarantee that the training is well finished. In addition the student has some practice related with different items explained during the training as the use of equipment in radiological protection tasks. This type of training is more flexitime and can be adapted to the necessities of each user, avoiding high costs and unnecessary displacements. (author)

  1. Empowering Personalized Medicine with Big Data and Semantic Web Technology: Promises, Challenges, and Use Cases.

    Science.gov (United States)

    Panahiazar, Maryam; Taslimitehrani, Vahid; Jadhav, Ashutosh; Pathak, Jyotishman

    2014-10-01

    In healthcare, big data tools and technologies have the potential to create significant value by improving outcomes while lowering costs for each individual patient. Diagnostic images, genetic test results and biometric information are increasingly generated and stored in electronic health records presenting us with challenges in data that is by nature high volume, variety and velocity, thereby necessitating novel ways to store, manage and process big data. This presents an urgent need to develop new, scalable and expandable big data infrastructure and analytical methods that can enable healthcare providers access knowledge for the individual patient, yielding better decisions and outcomes. In this paper, we briefly discuss the nature of big data and the role of semantic web and data analysis for generating "smart data" which offer actionable information that supports better decision for personalized medicine. In our view, the biggest challenge is to create a system that makes big data robust and smart for healthcare providers and patients that can lead to more effective clinical decision-making, improved health outcomes, and ultimately, managing the healthcare costs. We highlight some of the challenges in using big data and propose the need for a semantic data-driven environment to address them. We illustrate our vision with practical use cases, and discuss a path for empowering personalized medicine using big data and semantic web technology.

  2. Technology that Touches Lives: Teleconsultation to Benefit Persons with Upper Limb Loss

    Directory of Open Access Journals (Sweden)

    Lynsay R. Whelan

    2011-12-01

    Full Text Available While over 1.5 million individuals are living with limb loss in the United States (Ziegler-Graham et al., 2008, only 10% of these individuals have a loss that affects an upper limb. Coincident with the relatively low incidence of upper limb loss, is a shortage of the community-based prosthetic rehabilitation experts that can help prosthetic users to more fully integrate their devices into their daily routines. This article describes how expert prosthetists and occupational therapists at Touch Bionics, a manufacturer of advanced upper limb prosthetic devices, employ Voice over the Internet Protocol (VoIP videoconferencing software telehealth technologies to engage in remote consultation with users of prosthetic devices and/or their local practitioners. The Touch Bionics staff provide follow-up expertise to local prosthetists, occupational therapists, and other health professionals. Contrasted with prior telephone-based consultations, the video-enabled approach provides enhanced capabilities to benefit persons with upper limb loss.  Currently, the opportunities for Touch Bionics occupational therapists to fully engage in patient-based services delivered through telehealth technologies are significantly reduced by their need to obtain and maintain professional licenses in multiple states.

  3. An Approach To Personalized e-Learning

    Directory of Open Access Journals (Sweden)

    Matteo Gaeta

    2013-02-01

    Full Text Available This paper focuses on the concept of personalized e-Learning for the computer science (or informatics education. Several authors have stated that personalization, in educational context, allows executing more efficient and effective learning processes. On the other side the use of Semantic Web technologies (e.g. ontologies is more and more often considered as a technological basis for personalization in e-Learning (the so-called self-regulated learning. In this paper we describe how personalization can be exploited in e-Learning systems, focusing on our proposal: the Intelligent Web Teacher (IWT. Therefore we present the evaluation of our personalization tools tested in real academic courses, where e-Learning activities are carried out to complement the traditional lectures.

  4. The Information Technology Infrastructure for the Translational Genomics Core and the Partners Biobank at Partners Personalized Medicine

    Directory of Open Access Journals (Sweden)

    Natalie Boutin

    2016-01-01

    Full Text Available The Biobank and Translational Genomics core at Partners Personalized Medicine requires robust software and hardware. This Information Technology (IT infrastructure enables the storage and transfer of large amounts of data, drives efficiencies in the laboratory, maintains data integrity from the time of consent to the time that genomic data is distributed for research, and enables the management of complex genetic data. Here, we describe the functional components of the research IT infrastructure at Partners Personalized Medicine and how they integrate with existing clinical and research systems, review some of the ways in which this IT infrastructure maintains data integrity and security, and discuss some of the challenges inherent to building and maintaining such infrastructure.

  5. 29 CFR 1917.92 - Respiratory protection.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Respiratory protection. 1917.92 Section 1917.92 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) MARINE TERMINALS Personal Protection § 1917.92 Respiratory protection. (See § 1917.1(a)(2)(x...

  6. 30 CFR 56.15003 - Protective footwear.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protective footwear. 56.15003 Section 56.15003 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE....15003 Protective footwear. All persons shall wear suitable protective footwear when in or around an area...

  7. Blending technology in teaching advanced health assessment in a family nurse practitioner program: using personal digital assistants in a simulation laboratory.

    Science.gov (United States)

    Elliott, Lydia; DeCristofaro, Claire; Carpenter, Alesia

    2012-09-01

    This article describes the development and implementation of integrated use of personal handheld devices (personal digital assistants, PDAs) and high-fidelity simulation in an advanced health assessment course in a graduate family nurse practitioner (NP) program. A teaching tool was developed that can be utilized as a template for clinical case scenarios blending these separate technologies. Review of the evidence-based literature, including peer-reviewed articles and reviews. Blending the technologies of high-fidelity simulation and handheld devices (PDAs) provided a positive learning experience for graduate NP students in a teaching laboratory setting. Combining both technologies in clinical case scenarios offered a more real-world learning experience, with a focus on point-of-care service and integration of interview and physical assessment skills with existing standards of care and external clinical resources. Faculty modeling and advance training with PDA technology was crucial to success. Faculty developed a general template tool and systems-based clinical scenarios integrating PDA and high-fidelity simulation. Faculty observations, the general template tool, and one scenario example are included in this article. ©2012 The Author(s) Journal compilation ©2012 American Academy of Nurse Practitioners.

  8. Behaviour of police officials towards mentally ill persons

    Directory of Open Access Journals (Sweden)

    Damir Juras

    2014-01-01

    Full Text Available The authors demonstrate the behaviour of police towards mentally ill individuals de lege lata and de lege ferenda. For this, they use an analysis of the existing Protection and Advocacy for the Mentally Ill Act, the draft of the new law which regulates that area, examples from practice, statistical data and the viewpoints of the legal and medical professions. This article points out the most frequent application of police powers when dealing with mentally ill persons and certain quandaries about the practice of admitting mentally ill persons into psychiatric institutions when they are a danger to themselves and others, that is, in the case of providing help to health workers dealing with mentally ill persons. Statistical data for the area of the Republic of Croatia point to a slight trend in the increase of police interventions over the last five years and also in the professional police approach towards such individuals. In conclusion, the coordinated activity of all services dealing with mentally ill persons is proposed as are additional education and the specialisation of police officials dealing with such persons. Furthermore, the need for balance between the necessity to protect the rights of mentally ill persons and the protection of rights and the security of the surroundings in which such persons live and the security of the entire community are pointed out.

  9. 10. VDE/ABB lightning protection conference. Lectures

    International Nuclear Information System (INIS)

    2013-01-01

    The proceedings of the 10. VDE/ABB lightning protection conference include lectures on the following issues: Status on the standardization and resulting consequences; lightning protection of specific facilities; electrical grounding and potential equalization; lightning research; personal security and protection.

  10. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    Science.gov (United States)

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  11. Protective device for organs exposed to medical X-radiation

    International Nuclear Information System (INIS)

    Zimmer, K.

    1978-01-01

    The protective device for male or female gonads consists of a protective screen made of hard lead coated with silicon caoutchouc, a flexible supporting arm, and a base plate on which the supporting arm for the protective screen is monted. The protective screen has got the shape of a dish resp. a pear-shaped contour for male resp. female persons. The base may be arranged on a Bucky table between the legs of the person to be examined by means of suction cups. (DG) [de

  12. 48 CFR 828.7103 - Financial protection.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Financial protection. 828... Contracts 828.7103 Financial protection. (a) A contractor must have and maintain an amount of financial protection to cover liability to third persons and loss of or damage to the contractor's property that meets...

  13. Enhanced personal protection system for the PS

    CERN Multimedia

    Caroline Duc

    2013-01-01

    During the first long shutdown (LS1) a new safety system will be installed in the primary beam areas of the PS complex in order to bring the standard of personnel radiation protection at the PS into line with that of the LHC.   Pierre Ninin, deputy group leader of GS-ASE and responsible for the installation of the new PS complex safety system, in front of a new access control system. The LHC access control systems are state-of-the-art, whereas those of the injection chain accelerators were running the risk of becoming obsolete. For the past two years a project to upgrade the access and safety systems of the first links in the LHC accelerator chain has been underway to bring them into compliance with nuclear safety standards. These systems provide the personnel with automatic protection by limiting access to hazardous areas and by ensuring that nobody is present in the areas when the accelerator is in operation. By the end of 2013, the project teams will ha...

  14. The Impact of Environmental Design on Doffing Personal Protective Equipment in a Healthcare Environment: A Formative Human Factors Trial.

    Science.gov (United States)

    Herlihey, Tracey A; Gelmi, Stefano; Cafazzo, Joseph A; Hall, Trevor N T

    2017-06-01

    OBJECTIVE To explore the impact of environmental design on doffing personal protective equipment in a simulated healthcare environment. METHODS A mixed-methods approach was used that included human-factors usability testing and qualitative questionnaire responses. A patient room and connecting anteroom were constructed for testing purposes. This experimental doffing area was designed to overcome the environmental failures identified in a previous study and was not constructed based on any generalizable hospital standard. RESULTS In total, 72 healthcare workers from Ontario, Canada, took part in the study and tested the simulated doffing area. The following environmental design changes were tested and were deemed effective: increasing prominence of color-coded zones; securing disinfectant wipes and hand sanitizer; outlining disposal bins locations; providing mirrors to detect possible contamination; providing hand rails to assist with doffing; and restricting the space to doff. Further experimentation and iterative design are required with regard to several important features: positioning the disposal bins for safety, decreasing the risk of contamination and user accessibility; optimal positioning of mirrors for safety; communication within the team; and positioning the secondary team member for optimal awareness. Additional design suggestions also emerged during this study, and they require future investigation. CONCLUSIONS This study highlights the importance of the environment on doffing personal protective equipment in a healthcare setting. Iterative testing and modification of the design of the environment (doffing area) are important to enhancing healthcare worker safety. Infect Control Hosp Epidemiol 2017;38:712-717.

  15. European workshop on technologies for environmental protection

    Energy Technology Data Exchange (ETDEWEB)

    Buesing, J H; Pippich, B [eds.

    1996-12-31

    Current European research activities in the field of environmental technologies are discussed under the following headings: photocatalysis; emission abatement - catalytic processes (mainly NO{sub x} reduction catalysts for vehicles and industrial boilers); emission abatement - biological and chemical processes; biological wastewater treatment; chemical and physical wastewater treatment; integrated wastewater treatment; environmental technologies in pulp and paper industry; environmental technologies in surface treatment; selected examples of `clean technologies`; environmental technologies in ceramic and cement industry and policy and strategies.

  16. Technology development for evaluation of operational quantities in radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Lyul; Chang, S. Y.; Lee, L. T.; Kim, B. H.; Chung, K. K.; Lee, J. I.; Lim, G. S.; Kim, J. S.; Nam, Y. M.; Chang, J. K.; Kim, D. Y.; Yang, J. S

    2000-03-01

    A study on the fabrication of a new personal thermo-luminescence dosimeter, which can evaluate the personal dose equivalent H{sub p}(d), has been performed. Optimum conditions for fabrication of a LiF:Mg,Cu,Na,Si TL phosphor powder has been determined and a disc type TL pellet has been fabricated from this TL powder. Another type of CaSO{sub 4}:Dy,Mo TL material has been also fabricated. These two TL materials have shown greater TL sensitivity than the foreign-made commercial TL materials. Mono-energetic fluorescence X-ray from 8.6 keV to 75 keV for use in performance testing of the developed TLDs energy response have been constructed and evaluated for the performance of the purity, air kerma, beam uniformity and distribution, and scattered fraction of X-rays. Reference neutron field of a D{sub 2}O moderated {sup 252}Cf source was characterized and the irradiation system using {sup 226}Ra and {sup 137}Cs sources was installed to construct the environmental gamma reference radiation and the low-level gamma radiation. A capability of calibration and measurement of KAERI In Vivo counting system for transuranic elements in the lung has been evaluated through the participation in the overseas intercomparison study on the In Vivo radioactivity measurement. An improvement and advancement of KAERI lung counting technology have been made by the analysis off uncertainties from the assumption of uniform radioactivity distribution in the lung, experimental determination and comparing of detection efficiency with different lung sets, and mathematical efficiency calibration of In Vivo counting system. (author)

  17. US/Belarusian government-to-government material protection, control, and accounting cooperation at the Sosny Science and Technology Center

    International Nuclear Information System (INIS)

    Case, R.S. Jr.; Baumann, M.; Madsen, R.W.; Krevsum, E.; Haase, M.

    1996-01-01

    A formal program of cooperation between the US Department of Energy and the Belarusian regulatory agency Promatomnazdor (PAN) began in 1994. A visit to the Belarusian Sosny Science and Technology Center (SSTC) by representatives from the US, Sweden, Japan, and the International Atomic Energy Agency resulted in a multinational program of cooperation to enhance the existing material protection, control, and accounting systems in place at Sosny. Specific physical-protection-related recommendations included upgrades to the physical protection systems at Buildings 33 and 40 at Sosny and the security systems in the SSTC central alarm station. US experts in conjunction with the multinational team and Belarus representatives, have reviewed initial designs for physical protection upgrades at Sosny. Subsequently, the US assumed an essential role for funding and technical oversight for enhancements at the SSTC, aspects of its emergency communication systems, and the upgrade of the SSTC site access control system. This paper addresses the status of physical protection enhancements at the Sosny site

  18. Clothing and personal hygiene

    Science.gov (United States)

    Finogenov, A. M.; Azhayev, A. N.; Kaliberdin, G. V.

    1975-01-01

    The biomedical maintenance of astronauts is discussed in terms of personal hygiene. Principal characteristics and general requirements are described which must be followed in perfecting a system of hygienic practices and in devising means to maintain personal hygiene, flight clothing, underwear, bedding, and medical-domestic equipment for manned space flights of varying durations. Factors discussed include: disposable clothing, thermal protection, oral hygiene, cleansing of the skin, and grooming of the hair.

  19. Interest in using mobile technology to help self-manage alcohol use among persons living with the human immunodeficiency virus: A Florida Cohort cross-sectional study.

    Science.gov (United States)

    Sharpe, J Danielle; Zhou, Zhi; Escobar-Viera, César G; Morano, Jamie P; Lucero, Robert J; Ibañez, Gladys E; Hart, Mark; Cook, Christa L; Cook, Robert L

    2018-01-02

    Alcohol consumption at hazardous levels is more prevalent and associated with poor health outcomes among persons living with the human immunodeficiency virus (HIV; PLWH). Although PLWH are receptive to using technology to manage health issues, it is unknown whether a cell phone app to self-manage alcohol use would be acceptable among PLWH who drink. The objectives of this study were to determine factors associated with interest in an app to self-manage drinking and to identify differences in baseline mobile technology use among PLWH by drinking level. The study population included 757 PLWH recruited from 2014 to 2016 into the Florida Cohort, an ongoing cohort study investigating the utilization of health services and HIV care outcomes among PLWH. Participants completed a questionnaire examining demographics, substance use, mobile technology use, and other health behaviors. Multivariable logistic regression was used to identify factors significantly associated with interest in an app to self-manage drinking. We also determined whether mobile technology use varied by drinking level. Of the sample, 40% of persons who drink at hazardous levels, 34% of persons who drink at nonhazardous levels, and 19% of persons who do not drink were interested in a self-management app for alcohol use. Multivariable logistic regression analysis indicated that nonhazardous drinking (adjusted odds ratio [AOR] = 1.78; confidence interval [CI 95%]: 1.10-2.88) and hazardous drinking (AOR = 2.58; CI: 1.60-4.16) were associated with interest, controlling for age, gender, education, and drug use. Regarding mobile technology use, most of the sample reported smartphone ownership (56%), text messaging (89%), and at least one cell phone app (69%). Regardless of drinking level, overall mobile technology use among PLWH was moderate, whereas PLWH who consumed alcohol expressed greater interest in a cell phone app to self-manage alcohol use. This indicates that many PLWH who drink would be interested

  20. Patent protection for microbial technologies.

    Science.gov (United States)

    Sherkow, Jacob S

    2017-11-01

    Microbial technologies often serve as the basis of fundamental research tools in molecular biology. These present a variety of ethical, legal and social issues concerning their patenting. This commentary presents several case studies of these issues across three major microbiological tools: CRISPR, viral vectors and antimicrobial resistance drugs. It concludes that the development of these technologies-both scientifically and commercially-depend, in part, on the patent regime available for each, and researchers' willingness to enforce those patents against others. © FEMS 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  1. Integrating sequencing technologies in personal genomics: optimal low cost reconstruction of structural variants.

    Directory of Open Access Journals (Sweden)

    Jiang Du

    2009-07-01

    Full Text Available The goal of human genome re-sequencing is obtaining an accurate assembly of an individual's genome. Recently, there has been great excitement in the development of many technologies for this (e.g. medium and short read sequencing from companies such as 454 and SOLiD, and high-density oligo-arrays from Affymetrix and NimbelGen, with even more expected to appear. The costs and sensitivities of these technologies differ considerably from each other. As an important goal of personal genomics is to reduce the cost of re-sequencing to an affordable point, it is worthwhile to consider optimally integrating technologies. Here, we build a simulation toolbox that will help us optimally combine different technologies for genome re-sequencing, especially in reconstructing large structural variants (SVs. SV reconstruction is considered the most challenging step in human genome re-sequencing. (It is sometimes even harder than de novo assembly of small genomes because of the duplications and repetitive sequences in the human genome. To this end, we formulate canonical problems that are representative of issues in reconstruction and are of small enough scale to be computationally tractable and simulatable. Using semi-realistic simulations, we show how we can combine different technologies to optimally solve the assembly at low cost. With mapability maps, our simulations efficiently handle the inhomogeneous repeat-containing structure of the human genome and the computational complexity of practical assembly algorithms. They quantitatively show how combining different read lengths is more cost-effective than using one length, how an optimal mixed sequencing strategy for reconstructing large novel SVs usually also gives accurate detection of SNPs/indels, how paired-end reads can improve reconstruction efficiency, and how adding in arrays is more efficient than just sequencing for disentangling some complex SVs. Our strategy should facilitate the sequencing of

  2. Complex Protection of Vertical Stainless Steel Tanks

    Directory of Open Access Journals (Sweden)

    Fakhrislamov Radik Zakievich

    2014-03-01

    Full Text Available The authors consider the problem of fail-safe oil and oil products storage in stainless steel tanks and present the patented tank inner side protection technology. The latter provides process, ecological and fire safety and reducing soil evaporation of oil products, which is a specific problem. The above-mentioned technology includes corrosion protection and heat insulation protection providing increase of cover durability and RVS service life in general. The offered technological protection scheme is a collaboration of the author, Steel Paint GmbH firm and JSC “Koksokhimmontazhproyekt”. PU foam unicomponent materials of Steel Paint GmbH firm provide the protection of tank inner side and cover.

  3. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  4. Optimization of radiation protection in nuclear medicine: from reference dosimetry to personalized dosimetry

    International Nuclear Information System (INIS)

    Hadid, Lama

    2011-01-01

    In nuclear medicine, radiopharmaceuticals are distributed in the body through biokinetic processes. Thus, each organ can become a source of radiation delivering a fraction of emitted energy in tissues. Therefore, dose calculations must be assessed accurately and realistically to ensure the patient radiation protection. Absorbed doses were until now based on mathematical standard models and electron transport approximations. The International Commission on Radiological Protection (ICRP) has recently adopted voxel phantoms as a more realistic representation of the reference adult. The main goal of this thesis was to study the influence of the use of the new reference models and Monte Carlo methods on the major dosimetric quantities. In addition, the contribution of patients? specific geometry to the absorbed dose was compared to a standard geometry, enabling the evaluation of uncertainties arising from the reference values. Particular attention was paid to the bone marrow which is characterized by a high radiosensitivity and a complex microscopic structure. An accurate alpha dosimetry was assessed for bone marrow using microscopic images of several trabecular bone sites. The results showed variations in the absorbed fractions as a function of the particles? energy, the skeletal site and the amount of fat within marrow cavities, three parameters which are not taken into account in the values published by the ICRP. Finally, the heterogeneous activity distribution of the radiopharmaceuticals was considered within the framework of the treatment of a hepato-cellular carcinoma with selective internal radiotherapy using Yttrium-90 through the analysis of dose-volume histograms. The developments made in this thesis show the importance and the feasibility of performing a personalized dosimetry for nuclear medicine patients. (author)

  5. The Benevolent Hegemon: The United States National Space Protection Strategy-Anchored in Cooperation Not Technology

    Science.gov (United States)

    2010-04-01

    for data distribution, and not methods of firepower delivery, protection is unnecessary. 1 In addition, since the physical loss of a satellite does...capabilities at the transmission sites, the satellites, or the user equipment; (2) physical attacks against actual spacecraft or ground stations; (3...Barry D. “Doctrine, Technology, and War.” In Warfare Studies AY10 Coursebook , edited by Sharon McBride, 15-35. Maxwell AFB, AL: Air University Press

  6. New radiation protection legislation in Sweden

    International Nuclear Information System (INIS)

    Jender, M.; Persson, Lars

    1984-01-01

    The objective of the new Act is to protect humans, animals and the environment from the harmful effects of ionizing as well as non-ionizing radiation. As previously, the main responsibility for public radiation protection will rest with a single central radiation protection authority. According to the Act, the general obligations with regard to radiation protection will assign greater responsibility than in the past to persons carrying out activities involving radiation. Persons engaged in such activities will be responsible for the safe processing and storage of radioactive waste. The Act also contains rules governing decommissioning of technical equipment capable of generating radiation. The Act contains several rules providing for more effective supervision. The supervisory authority may, in particular, decide on the necessary regulations and prohibitions for each individual case. The scope for using penal provisions has been extended and a rule on the mandatory execution of orders regarding radiation protection measures has been introduced. (authors)

  7. Systems biology of personalized nutrition

    NARCIS (Netherlands)

    Ommen, B. van; Broek, T. van den; Hoogh, I. de; Erk, M. van; Someren, E. van; Rouhani-Rankouhi, T.; Anthony, J.C.; Hogenelst, K.; Pasman, W.; Boorsma, A.; Wopereis, S.

    2017-01-01

    Personalized nutrition is fast becoming a reality due to a number of technological, scientific, and societal developments that complement and extend current public health nutrition recommendations. Personalized nutrition tailors dietary recommendations to specific biological requirements on the

  8. The protection of personal data in the fight against terrorism
    New perspectives of PNR European Union instruments in the light of the Treaty of Lisbon

    Directory of Open Access Journals (Sweden)

    Michele Nino

    2010-01-01

    Full Text Available This article addresses the protection of personal data in the European Union in the context of the fight against international terrorism taking into account the new European Union architecture provided for by the Treaty of Lisbon. After having delineated the European legal background concerning the right to privacy, the author examines the Passenger Name Records (PNR Agreements concluded by the European Union with the United States, Canada and Australia. A further object of analysis is the 2007 proposal for a Council Framework Decision on the use of PNR data for law enforcement purposes, which is aimed at creating an autonomous PNR system in the European Union. The author considers that these instruments are likely to violate rights and fundamental freedoms of individuals, in particular the right to privacy. This is also due to the architecture of the European Union, whose structure is incapable of adequately and completely protecting the right to personal data protection. As a consequence, the author proposes solutions to modify PNR instruments, especially in light of the future changes that the Treaty of Lisbon will make to the structure of the European Union.

  9. 30 CFR 57.15003 - Protective footwear.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protective footwear. 57.15003 Section 57.15003... Surface and Underground § 57.15003 Protective footwear. All persons shall wear suitable protective footwear when in or around an area of a mine or plant where a hazard exists which could cause an injury to...

  10. The Comparison of Personalization Recommendation for E-Commerce

    Science.gov (United States)

    Ya, Luo

    Personalization recommendation is the key technology in E-commerce, which affects the performance of E-commerce system. This paper mainly introduces personalization recommendation system and its role, and several widely used recommendation technology. Through comparing and analyzing on the strengths and weaknesses of recommendation technology, it concludes that the combined application for a variety of techniques should satisfy the actual needs better.

  11. Assessing dose of the representative person for the purpose of radiation protection of the public. ICRP publication 101. Approved by the Commission in September 2005.

    Science.gov (United States)

    2006-01-01

    The Commission intended that its revised recommendations should be based on a simple, but widely applicable, system of protection that would clarify its objectives and provide a basis for the more formal systems needed by operating managers and regulators. The recommendations would establish quantified constraints, or limits, on individual dose from specified sources. These dose constraints apply to actual or representative people who encounter occupational, medical, and public exposures. This report updates the previous guidance for estimating dose to the public. Dose to the public cannot be measured directly and, in some cases, it cannot be measured at all. Therefore, for the purpose of protection of the public, it is necessary to characterise an individual, either hypothetical or specific, whose dose can be used for determining compliance with the relevant dose constraint. This individual is defined as the 'representative person'. The Commission's goal of protection of the public is achieved if the relevant dose constraint for this individual for a single source is met and radiological protection is optimised. This report explains the process of estimating annual dose and recognises that a number of different methods are available for this purpose. These methods range from deterministic calculations to more complex probabilistic techniques. In addition, a mixture of these techniques may be applied. In selecting characteristics of the representative person, three important concepts should be borne in mind: reasonableness, sustainability, and homogeneity. Each concept is explained and examples are provided to illustrate their roles. Doses to the public are prospective (may occur in the future) or retrospective (occurred in the past). Prospective doses are for hypothetical individuals who may or may not exist in the future, while retrospective doses are generally calculated for specific individuals. The Commission recognises that the level of detail afforded by its

  12. Search Engines : Some Data Protection Issues

    OpenAIRE

    Unger, Patrick

    2009-01-01

    The thesis elaborates on a topic which has attracted a lot of discussion in recent years and is the subject of an ongoing debate. A big controversy has flourished between the company Google Inc. and several privacy groups' ostensibly led by the "Working Party on the Protection of Individuals with regard to the Processing of Personal Data". Deep data protection concerns have been raised in this debate by the use of a search engine and its storing of personal data belonging to the data subject....

  13. Figure 2. Representation of the technological dimension of privacy-Educational Research on the Technological Dimension of Private Life

    OpenAIRE

    Liliana Mâţă

    2010-01-01

    Following the development of new technologies in recent decades have been a number of innovative, but also privacy threats, elements: bank cards, personal computers, communication networks, internet, digital signature, email, surveillance systems for children. The structure of the technological dimension of private life can be represented by the following elements (Figure 2): personal objects technology (material itSelf), electronic identity, personal blog (personal Self), spec...

  14. AEA Technology, Harwell site emergency plan

    International Nuclear Information System (INIS)

    1993-01-01

    This plan, describes the site arrangements and facilities for dealing with an emergency at Harwell. These arrangements consist of amongst other things provision of suitably qualified, experienced and trained staff to take up posts, provision of suitable facilities and equipment, arrangements to alert and protect persons on and off the site, liaison and contact arrangements with external agencies and organisations and supply of information before and during any emergency. Other organisations have their own arrangements for dealing with an emergency at AEA Technology Harwell. The arrangements for dealing with any off-site consequences are drawn together in the ''Oxfordshire County Council Essential Services Emergency Plan (Off-Site) for AEA Technology, Harwell''. Prior information for members of the public who may be affected in the event of an emergency at Harwell is issued in the form of leaflets. (author)

  15. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  16. Preparing the United States for Zika Virus: Pre-emptive Vector Control and Personal Protection.

    Science.gov (United States)

    Diaz, James H

    2016-12-01

    Discovered in 1947 in a monkey in the Zika forest of Uganda, Zika virus was dismissed as a cause of a mild illness that was confined to Africa and Southeast Asia and transmitted by Aedes mosquitoes. In 2007, Zika virus appeared outside of its endemic borders in an outbreak on the South Pacific Island of Yap. In 2013, Zika virus was associated with a major neurological complication, Guillain-Barré syndrome, in a larger outbreak in the French Polynesian Islands. From the South Pacific, Zika invaded Brazil in 2015 and caused another severe neurological complication, fetal microcephaly. The mosquito-borne transmission of Zika virus can be propagated by sexual transmission and, possibly, by blood transfusions, close personal contacts, and organ transplants, like other flaviviruses. Since these combined mechanisms of infectious disease transmission could result in catastrophic incidences of severe neurological diseases in adults and children, the public should know what to expect from Zika virus, how to prevent infection, and what the most likely failures in preventive measures will be. With federal research funding stalled, a Zika vaccine is far away. The only national strategies to prepare the United States for Zika virus invasion now are effective vector control measures and personal protection from mosquito bites. In addition to a basic knowledge of Aedes mosquito vectors and their biting behaviors, an understanding of simple household vector control measures, and the selection of the best chemical and physical mosquito repellents will be required to repel the Zika threat. Copyright © 2016 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  17. Infectious Disease Management through Point-of-Care Personalized Medicine Molecular Diagnostic Technologies

    Directory of Open Access Journals (Sweden)

    Luc Bissonnette

    2012-05-01

    Full Text Available Infectious disease management essentially consists in identifying the microbial cause(s of an infection, initiating if necessary antimicrobial therapy against microbes, and controlling host reactions to infection. In clinical microbiology, the turnaround time of the diagnostic cycle (>24 hours often leads to unnecessary suffering and deaths; approaches to relieve this burden include rapid diagnostic procedures and more efficient transmission or interpretation of molecular microbiology results. Although rapid nucleic acid-based diagnostic testing has demonstrated that it can impact on the transmission of hospital-acquired infections, we believe that such life-saving procedures should be performed closer to the patient, in dedicated 24/7 laboratories of healthcare institutions, or ideally at point of care. While personalized medicine generally aims at interrogating the genomic information of a patient, drug metabolism polymorphisms, for example, to guide drug choice and dosage, personalized medicine concepts are applicable in infectious diseases for the (rapid identification of a disease-causing microbe and determination of its antimicrobial resistance profile, to guide an appropriate antimicrobial treatment for the proper management of the patient. The implementation of point-of-care testing for infectious diseases will require acceptance by medical authorities, new technological and communication platforms, as well as reimbursement practices such that time- and life-saving procedures become available to the largest number of patients.

  18. Role of methods and technology of management in the sphere of protecting the rights and freedoms of the imprisoned

    Directory of Open Access Journals (Sweden)

    Pavel A. Matyukhov

    2016-01-01

    Full Text Available Objective to form the sciencebased knowledge about the place and the role of technology and methods of management system in solving the problems of the penal system in the sphere of protection of the rights and freedoms of the imprisoned. Methods universal dialectic method of cognition analysis analogy and systemicstructural and abstractlogical methods. Results it was found that the combination of structural elements of the Federal Execution Service of Russia whose activities are in one way or another aimed at enabling prisoners to use their rights and freedoms has a systemic character. It was determined that the efficiency of functioning of any system including the criminalexecutive is provided by managing it its elements. The crucial role of the used methods and technologies is shown. The opinion is formed and justified that their skilled application in the management of the criminalexecutive system will improve the efficiency of solving its tasks including in the sphere of protection of the rights and freedoms of the imprisoned. Scientific novelty the attempt to examine the role of technology and management practices in the functioning of the system ensuring protection of the rights and freedoms of the imprisoned. Practical significance the main provisions and conclusions of the article can be used both in scientific and practical activities of managers of different levels and units of the penal system to address the challenges they face including on the protection of the rights and freedoms of the imprisoned. nbsp

  19. Technology under Planetary Protection Research (PPR)

    Data.gov (United States)

    National Aeronautics and Space Administration — Planetary protection involves preventing biological contamination on both outbound and sample return missions to other planetary bodies. Numerous areas of research...

  20. Personalization has a Price, Controllability is the Currency: Predictors for the Intention to use Personalized eGovernment Websites

    NARCIS (Netherlands)

    van Velsen, Lex Stefan; van der Geest, Thea; van de Wijngaert, Lidwien; van den Berg, Stéphanie Martine; Steehouder, M.F.

    2015-01-01

    Content personalization on government websites provides individuals with a personal selection of information. In this study, we determine the role of trust in a government organization, trust in the technology, and perceived controllability on the intention to use content personalization for