WorldWideScience

Sample records for personnel security investigations

  1. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  2. Investigation of Shift Work Disorders among Security Personnel

    OpenAIRE

    Zahra Zamanian; Mansooreh Dehghani; Heidar Mohammady; Mohammadtaghi Rezaeiani; Hadi Daneshmandi

    2012-01-01

    In today’s advanced world resulting from the improvement of technology, societies tend to encounter a large number of problems and accidents. As we know, university’s security personnel are classified as shift workers and are exposed to health disturbing factors. The aim of this study was investigation of shiftwork disorders among security personnel of the hospitals Affiliated to Shiraz University of Medical Sciences, Central. This case-control study was conducted among 130 security personnel...

  3. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    Science.gov (United States)

    2017-06-01

    derogatory information, unfavorable administrative actions, and adverse actions to the appropriate personnel security, human resources , and...national security clearance? What type of clearances do people typically have (e.g., Secret, Top Secret, TS/SCI, SAP , etc.)? (2) Does [the

  4. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  5. 28 CFR 16.132 - Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records...

    Science.gov (United States)

    2010-07-01

    ... System—Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ-006. 16.132...

  6. Employment of security personnel

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. In his comments, W. Hunold accedes to the court's decision and discusses the underlying reasons of this decision and of a previous ruling in the same matter by putting emphasis on the difference between a contract for services and a contract for work, and a contract for temporary employment. The author also discusses the basic features of an employment contract. (orig./HP) [de

  7. Site security personnel training manual

    International Nuclear Information System (INIS)

    1978-10-01

    As required by 10 CFR Part 73, this training manual provides guidance to assist licensees in the development of security personnel training and qualifications programs. The information contained in the manual typifies the level and scope of training for personnel assigned to perform security related tasks and job duties associated with the protection of nuclear fuel cycle facilities and nuclear power reactors

  8. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  9. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  10. 32 CFR 154.8 - Types and scope of personnel security investigations.

    Science.gov (United States)

    2010-07-01

    ..., benefits, and privileges under Federal programs. Accordingly, personal interviews are an integral part of... forth in the following paragraphs of this section. (1) BI/PR. A personal interview shall be conducted by... security clearability, or be otherwise stigmatizing. (3) Hostage situation. A personal interview shall be...

  11. Projecting Personnel Security Investigations (PSI) Requirements: Current Issues, Challenges and a Viable Approach

    Science.gov (United States)

    2008-09-01

    the DoD components to project annual investigations within 5% of annual submissions in order to properly staff the OPM investigations programa ...Level97E N/ANavigator Trainee92T1 N/APilot Trainee92T0 N/AWing Commander91W N/AGeneral Officer90G N/AAide- De -Camp88A N/ACommand and Control86P N/AUnited...the Navy and Marine Corps can simply reflect inclusion of clearances from individuals who have transitioned from the Selected Reserves to the

  12. Personnel Investigations and Clearance Tracking (OPI)

    Data.gov (United States)

    Office of Personnel Management — Security file-related information for the U.S. Office of Personnel Management (OPM)'s employee and contractor personnel. The data is OPM-specific, not government-wide.

  13. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  14. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  15. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  16. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  17. 32 CFR 154.42 - Evaluation of personnel security information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  18. Cytogenic Investigations in Flight Personnel

    International Nuclear Information System (INIS)

    Wolf, G.; Obe, G.; Bergau, L.

    1999-01-01

    During long-distance flights at high altitudes flight personnel are exposed to cosmic radiation. In order to determine whether there are biological effects of such low dose radiation exposure in aircrew, chromosomal aberrations were investigated in 59 female cabin attendants and a matched control group of 31 members of station personnel. The mean number of dicentric chromosomes amounts to 1.3 (95% CI 1.0-1.6) per 1,000 cells in cabin attendants and 1.4 (95% CI 1.0-1.9) per 1,000 cells in controls. In an additional control group of 56 female clerks from Berlin the mean frequency of dicentric chromosomes was 1.3 (95% CI 1.0-1.6). Neither in dicentric frequency and distribution nor in other aberrations was a significant difference between the groups of flight and station personnel found. The high frequency of multi-aberrant cells was remarkable in flight personnel as well as in station personnel. The reason for this phenomenon is unknown and needs further investigation. (author)

  19. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  20. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  1. Security personnel training using a computer-based game

    International Nuclear Information System (INIS)

    Ralph, J.; Bickner, L.

    1987-01-01

    Security personnel training is an integral part of a total physical security program, and is essential in enabling security personnel to perform their function effectively. Several training tools are currently available for use by security supervisors, including: textbook study, classroom instruction, and live simulations. However, due to shortcomings inherent in each of these tools, a need exists for the development of low-cost alternative training methods. This paper discusses one such alternative: a computer-based, game-type security training system. This system would be based on a personal computer with high-resolution graphics. Key features of this system include: a high degree of realism; flexibility in use and maintenance; high trainee motivation; and low cost

  2. Forecasting the Demand for Information Security Personnel

    Directory of Open Access Journals (Sweden)

    Anatoliy Alexandrovich Malyuk

    2016-06-01

    Full Text Available During the formation of information society the problem of determining the demand for IS personnel (DfISP, consisting of IS specialists and IS practitioners, is of particular relevance at present. The goal of the paper is to calculate the demand for IS specialists (DfISS. To achieve it we used the informal heuristic methods and introduced some important indicators for DfISP forecast. As a validation of the conceptual approach proposed we show how to apply it on the regional level of one country on one real-world example. All the reasoning and calculations can be narrowed down to the DfISS forecasting within one corporation or IS professionals of a specific profile.

  3. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  4. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  5. Basic legal provisions concerning the activities of industrial security personnel

    International Nuclear Information System (INIS)

    Eberstein, H.H.

    1980-01-01

    The author confines himself to sabotage and espionage. Necessary counter-measures are determined by the respective type of activities. Sect. 618 of the German Civil Code and Sect. 120 a of the Industrial Code give basic legal provisions for the protection of industrial personnel. The legal position held by owner or occupant forms the legal basis for 'vulnerable point protection'. The owner's rights are assigned to the industrial police and are exercised in correspondence with the service or employment contract set up according to Sect. 611 and the following sections of the German Civil Code. Outside guards work according to the performance contract given int the Sections 675, 611, 631 of the German Civil Code. The security personnel has the common right of self-help: self-defence, civil rights concerning the state of national emergency and self-defence under criminal law, rights derived from ownership and property. The author critically argues views held by Mr. Hoffmann-Riem who thinks that police powers have been assigned to private persons. He definitely answers in the negative to the execution of, or encroachment on, sovereign (police) powers by industrial security personnel. A special legal regulation is not necessary, since private protection in form of professional selfdefence is admissible under the law in force. (HSCH) [de

  6. The Methodological Approach to Determining the Level of Formation and Provision of Enterprise Personnel Security

    Directory of Open Access Journals (Sweden)

    Gavkalova Nataliia L.

    2016-11-01

    Full Text Available The aim of the article is to substantiate the methodical approach to determining the level of formation and provision of enterprise personnel security. By analyzing, systematizing and generalizing scientific achievements of many scientists, approaches to the evaluation of personnel security at the enterprise were considered, a set of indices for evaluation of personnel security was defined. There justified the urgency of creating a comprehensive approach to evaluation of personnel security that includes implementation of the following stages: defining a list of indices corresponding to the level of formation and provision of personnel security with the help of the expert evaluation method; calculating integral indices of personnel security for each component and the corresponding level by means of the taxonomic analysis; grouping enterprises by the level of formation and provision of personnel security with the use of the cluster and discriminant analysis. It is found that the implementation of this approach will allow not only determining the level of formation and provision of personnel security at the enterprise, but also developing appropriate recommendations on improving its state. Prospects for further research in this direction are evaluation of conditions for formation and provision of personnel security at the enterprise, which will enable revealing negative destabilizing factors that influence personnel security

  7. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  8. Analysis of Specific Features of International Standards of Personnel Security of an Enterprise

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P.

    2014-03-01

    Full Text Available The article marks out components of personnel security of an enterprise, outlines processes of personnel management, which correspond with conditions of security of life and labour, competent, socially protected professional activity, availability of the acting system of motivation and stimulation, and possibilities for corporate conflicts resolution. The article presents basic standards, rules and legislative acts that regulate ensuring personnel security. It analyses specific features of application of standards with respect to: life security and labour protection culture at an enterprise, including managerial systems and practice, behaviour of personnel at working places and also intellectual component of personnel security, which envisages that personnel has knowledge and competences that assist in achievement of strategic goals of an enterprise.

  9. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  10. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  11. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  12. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Science.gov (United States)

    2010-10-01

    ... information technology (IT) system, as required by the Department of Commerce Security Manual and Department of Commerce Security Program Policy and Minimum Implementation Standards. (b) Insert clause 1352.237... as National Security Contracts that will be performed on or within a Department of Commerce facility...

  13. 49 CFR 1522.121 - Security threat assessments for personnel of TSA-approved validation firms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for personnel of TSA... FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation... for personnel of TSA-approved validation firms. Each of the following must successfully complete a...

  14. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    Science.gov (United States)

    2013-11-12

    to capture and transmit fingerprints . • Accurate Biometrics , a commercial Livescan fingerprinting provider, also received fingerprints electronically...FOUO). Monterey, CA: Defense Personnel Security Research Center. Herbig, K. L. (2008). Changes in espionage by American citizens , 1947-2007. (Tech...by American citizens , 1947-2001. (Tech. Rep. 02-05). Monterey, CA: Defense Personnel Security Research Center. Heuer, Jr., R. J., Crawford, K. S

  15. Performing personnel dosimetry investigations and records quality assurance

    International Nuclear Information System (INIS)

    Perle, S.C.

    2002-01-01

    Radiation Safety Officers (RSOs) sometimes face situations in which personnel dosimetry estimates are required after dosimeters issued to radiation workers (film or TLD badges, extremity dosimeters, etc.) are lost or damaged before processing. This article was prepared to help those involved with personnel dosimetry investigations became aquatinted with this process. A factor that contributes to the anxiety of those unfamiliar with dosimetry investigations is the lack of published guidance available in this subject. More printed resources are needed to help radiation safety professionals familiarize themselves and understand personnel dosimetry investigations. Topics discussed in this presentation include the justification of performing dosimetry investigations, recommendations on how to perform them and the advantages of performing such investigations

  16. An Investigation of Social Factors Affecting on Personnel Job Satisfaction of Remedial Service Insurance Department

    Directory of Open Access Journals (Sweden)

    Sayyed Yaser Ebrahimian Jolodar

    2012-01-01

    Full Text Available Because of the paramount importance of job satisfaction and due to its main consequences such as reduction of work absence and resignation, personnel promotion and society‟s health, and more importantly, its role in achievement of organization goals, this study aimed at investigating the effects of six social factors including personnel‟s belief, salary and benefits, participation in organizational decision-making, sense of job security, interaction with colleagues and meeting the basic needs of personnel on job satisfaction. The statistical population of this study was the personnel of Remedial Service Insurance Department in Sari and the questionnaire was distributed among them. The results showed that there is a significant and positive correlation among all these factors and they have meaningful effects on personnel job satisfaction based on multiple regression analysis. Furthermore, findings revealed that personnel‟s belief about their job has the most effects on job satisfaction.

  17. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  18. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  19. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  20. Evaluation of scattered radiation emitted from X-ray security scanners on occupational dose to airport personnel

    International Nuclear Information System (INIS)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-01-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits. - Highlights: • Backscattered radiation emitted from the airport security scanners is estimated. • Inverse relation observed between backscattered radiation and scanners distance. • Occupational dose for personnel inspecting the scanners were up to 2.04 mSv/y. • The projected dose of security and engineering staff are well within dose limits.

  1. The laser Megajoule facility personnel security and safety interlocks

    International Nuclear Information System (INIS)

    Chapuis, J.C.; Arnoul, J.P.; Hurst, A.; Manson, M.

    2012-01-01

    The LMJ (Laser Megajoule) is designed to deliver about 1.4 MJ of 0.35 μm light to targets for high energy density physics experiments. Such an installation entails specific hazards related to the presence of intense laser beams, and high voltage power laser amplifiers. Furthermore, the thermonuclear fusion reactions induced by the experiment also produce different radiations and neutrons burst, and also activate various materials in the chamber environment. All these hazards could be lethal. The SSP (Personnel Safety System) was designed to prevent accidents and protect personnel working in the LMJ. To satisfy at the lowest cost the requirements of safety regulations and those of the operation management, the choice was made to implement a functional architecture built around two independent technological barriers when required by the risk level. Each technical barrier is composed of two subsets, one dedicated to hazard sources management, and the other one dedicated to worker presence management. The two completely independent barriers, even at the sensor or actuator level, are designed with different technologies adapted to the required Safety Integrity Level. The combination of these 2 barriers is equivalent to a unique barrier with a rate of dangerous failure of about 10 -6 per year

  2. Drug Use and Abuse: Background Information for Security Personnel

    Science.gov (United States)

    1994-05-01

    Neurotoxicity of methamphetamine : Mechanisms of action and issues related to aging. In Miller, M. A., & Kozel, N. J., (Eds.), op. cit. 99. Cox et al...lives. This presents a dilemma for clearance adjudicators. If clearance standards are too lax, security may not be protected . If standards are too...strict, many well-adjusted, adventuresome, and creative employees may be screened out. Drug use may weaken judgment and affect ability to protect

  3. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  4. Health consequences of shift-work: the case of iranian hospital security personnel.

    Science.gov (United States)

    Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes

    2015-01-01

    Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.

  5. Investigating how everyday people experience security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    In this paper I propose a method for analyzing everyday people's experiences with IT-security. I furthermore report how I applied the method. The proposal is motivated by work of other researchers and their efforts to get beyond secure behavior, and to get an insight in secure or insecure...... experiences that everyday users of technology encounter. The background for introducing this method is a project under the heading of IT Security for Citizens, which bridges between research competencies in HCI and security. In this project we develop methods and concepts to analyze digital signature systems...... and security sensible systems in a broad sense, from the point of view of contemporary CHI. The project includes literature studies of usable security, as well as empirical investigations and design work. This paper reports on my method to target user experiences of and with security technology....

  6. Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach.

    Science.gov (United States)

    Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem

    2013-01-01

    This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff.

  7. Results of nuclear security culture survey on personnel at nuclear power plants

    International Nuclear Information System (INIS)

    Yoo, Hosik; Lee, Jeong-Ho

    2015-01-01

    Highlights: • A new surveying questionnaire for evaluating the security awareness of personnel was developed. • The developed surveying tools consist of four categories and 44 questions in total. • The surveying tools developed in this study can be used in other countries. - Abstract: A survey to evaluate awareness of the nuclear security culture of personnel at nuclear facilities was developed. The survey was made up of a series of questionnaires that were divided into four categories, beliefs and attitude, operating systems, leadership behaviors and staff behaviors. Each category contained six to 16 questions. The category on beliefs and attitude was composed of questions that asked plant workers on how much consideration facility personnel give to issues of security when doing his/her work. The section pertaining to operating systems for nuclear security consisted of questions on guidance documents, information security, and education and training. The questions on leadership behaviors were separated into two parts, one for managers and another for staff. These include questions relating to communication between management and staff, surveillance work related to nuclear security and the sharing of information. The last category of questions concerned staff behaviors. It consisted of questions on knowledge, procedures and implementation related to nuclear security. A survey was conducted on 858 people who worked at nuclear power plants using the questionnaire that was developed in this study. The survey was performed between October 7 to 17, 2014. The survey results were collected and analyzed. A numerical value was given to each question, so that the results of the survey were represented as a score. The data revealed that awareness of the nuclear security culture increased with age. This increase stopped when staff members entered their 50s. It is believed that a person in his/her 50s has a greater degree of experience and passion for their work than

  8. Reprint of 'Evaluation of Scattered Radiation Emitted From X-ray Security Scanners on Occupational Dose to Airport Personnel'

    Science.gov (United States)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-11-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits.

  9. Lack of skilled personnel as threat to HR security of industrial enterprises

    Directory of Open Access Journals (Sweden)

    Ozernikova Tatiana

    2017-01-01

    Full Text Available The article assesses the needs of Russian industrial enterprises for skilled labor. The authors consider deficiency in qualified personnel as a threat to the human resources security of industrial enterprises, and analyze its causes. The study includes the criteria to distinguish highly skilled employees in the labor force (education level, occupation, correspondence of performed work to education, and analysis of the dynamics of their number. It identifies the internal and external factors that have a significant influence on the number of qualified personnel. The external factors include the size of the salary, population growth due to migration, the regional level of the socio-economic development. The applied methods of analysis are single-factor analysis of variance (F-test, multiple regression and descriptive statistics. The analysis is based on the materials of the Russian Federal State Statistics Service, as well as on the Russian Longitudinal Monitoring Survey - Higher School of Economics.

  10. Machine vision applications for physical security, quality assurance and personnel dosimetry

    International Nuclear Information System (INIS)

    Kar, S.; Shrikhande, S.V.; Suresh Babu, R.M.

    2016-01-01

    Machine vision is the technology used to provide imaging-based solutions to variety of applications, relevant to nuclear facilities and other industries. It uses computerized image analysis for automatic inspection, process control, object sorting, parts assembly, human identity authentication, and so on. In this article we discuss the in-house developed machine vision systems at EISD, BARC for three specific areas: Biometric recognition for physical security, visual inspection for QA of fuel pellets, and fast neutron personnel dosimetry. The advantages in using these systems include objective decision making, reduced man-rem, operational consistency, and capability of statistical quantitative analysis. (author)

  11. Codetermination of the works council in matterss of a security screening of personnel

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If the licensing authority issues a licence to the operator of a nuclear installation subject to the obligation to have personnel to be employed or to be kept on screened for security purposes by the licensing authority, the works council of the nuclear installation is not in the position to demand refrainment from screening activities unless the works council has given consent. (BAGE 58, 297 = NZA 1988, 811 = AP Paragraph 87 BetrVG 1972 - Ordnung des Betriebes - Nr. 14). Decision of the Federal Labour Court of July 9, 1991 - 1 ABR 57/90 (lower instance: LAG Koeln, decision dated June 12, 1990 - 4 TaBV 2/90). (orig.) [de

  12. 10 CFR Appendix B to Part 73 - General Criteria for Security Personnel

    Science.gov (United States)

    2010-01-01

    .... Fixed site. B. Transportation. VI. Nuclear Power Reactor Training and Qualification Plan for Personnel.... Definitions Introduction Applicants and power reactor licensees subject to the requirements of § 73.55 shall... licensee to investigate into or judge the reading habits, political or religious beliefs, or attitudes on...

  13. Employment of personnel of a security service company does not require the consent of the works council

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. Federal Labour Court, decision dated May 5, 1992 - 1 ABR 78/91. (orig./HP) [de

  14. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  15. Investigating weaknesses in Android certificate security

    Science.gov (United States)

    Krych, Daniel E.; Lange-Maney, Stephen; McDaniel, Patrick; Glodek, William

    2015-05-01

    Android's application market relies on secure certificate generation to establish trust between applications and their users; yet, cryptography is often not a priority for application developers and many fail to take the necessary security precautions. Indeed, there is cause for concern: several recent high-profile studies have observed a pervasive lack of entropy on Web-systems leading to the factorization of private keys.1 Sufficient entropy, or randomness, is essential to generate secure key pairs and combat predictable key generation. In this paper, we analyze the security of Android certificates. We investigate the entropy present in 550,000 Android application certificates using the Quasilinear GCD finding algorithm.1 Our results show that while the lack of entropy does not appear to be as ubiquitous in the mobile markets as on Web-systems, there is substantial reuse of certificates only one third of the certificates in our dataset were unique. In other words, we find that organizations frequently reuse certificates for different applications. While such a practice is acceptable under Google's specifications for a single developer, we find that in some cases the same certificates are used for a myriad of developers, potentially compromising Android's intended trust relationships. Further, we observed duplicate certificates being used by both malicious and non-malicious applications. The top 3 repeated certificates present in our dataset accounted for a total of 11,438 separate APKs. Of these applications, 451, or roughly 4%, were identified as malicious by antivirus services.

  16. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    Science.gov (United States)

    2015-12-01

    culture, morale, and job satisfaction levels of employees .28 Gerstein argues the development of a Homeland Security personnel system and career maps...and culture, low morale, and job satisfaction levels of employees . DHS has been following a similar approach to the DOD in terms of professional...Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees , and retention

  17. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  18. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  19. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  20. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    Science.gov (United States)

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  1. Report: EPA’s Information Systems and Data Are at Risk Due to Insufficient Training of Personnel With Significant Information Security Responsibilities

    Science.gov (United States)

    Report #14-P-0142, March 21, 2014. The EPA places its information systems and data at risk due to an organizational structure that has not specified required duties and responsibilities to ensure personnel are trained on key information security roles.

  2. DOD PERSONNEL CLEARANCES: Additional OMB Actions Are Needed to Improve the Security Clearance Process

    National Research Council Canada - National Science Library

    2006-01-01

    Our independent analysis of timeliness data showed that industry personnel contracted to work for the federal government waited more than one year on average to receive top secret clearances, longer...

  3. Information security : an investigation into password habits

    OpenAIRE

    Richardson, Darren

    2015-01-01

    This thesis considers password security guidelines used in current environments and stipulates that password requirements force users to create and use passwords which are easy for computers to guess but hard for humans to remember. The thesis begins by exploring a number of the most prevalent methods of illicitly obtaining passwords in an attempt to design an experimental method to test the notion of weak password distribution. Password cracking techniques are discussed, as well as less ...

  4. An investigation of secure remote instrument control

    International Nuclear Information System (INIS)

    Schissel, D.P.; Abla, G.; Fredian, T.; Greenwald, M.; Penaflor, B.G.; Stillerman, J.; Walker, M.L.; Ciarlette, D.J.

    2010-01-01

    This paper examines the computer science issues associated with secure remote instrumentation control for magnetic fusion experiments. Computer science research into enhancing the ability to scientifically participate in a fusion experiment remotely has been growing in size in an attempt to better address the needs of fusion scientists worldwide. The natural progression of this research is to examine how to move from remote scientific participation to remote hardware control. The vision is to define a gatekeeper software system that will be the only channel of interaction for incoming requests to the secured area of the experimental site. The role of the gatekeeper is to validate the identification and access privilege of the requestor and to insure the general validity of the proposed request. The vision for the gatekeeper is that it be a modular system that is simple in design and defined in a way that makes its implementation and operation transparent and obvious. The architecture of the module interface is flexible enough that it can easily allow the future addition of new modules. At the same time, it should be transparent to end-users and allow a high volume of activity so as to not provide a work bottleneck. The results of the gatekeeper design and initial implementation are presented as well as a discussion on the implication of this research on the operation of fusion experimental machines such as ITER.

  5. An investigation of secure remote instrument control

    Energy Technology Data Exchange (ETDEWEB)

    Schissel, D.P., E-mail: schissel@fusion.gat.co [General Atomics, P.O. Box 85608, San Diego, CA 92186-5608 (United States); Abla, G. [General Atomics, P.O. Box 85608, San Diego, CA 92186-5608 (United States); Fredian, T.; Greenwald, M. [Massachusetts Institute of Technology, Cambridge, MA (United States); Penaflor, B.G. [General Atomics, P.O. Box 85608, San Diego, CA 92186-5608 (United States); Stillerman, J. [Massachusetts Institute of Technology, Cambridge, MA (United States); Walker, M.L. [General Atomics, P.O. Box 85608, San Diego, CA 92186-5608 (United States); Ciarlette, D.J. [US ITER Project Office, Oak Ridge National Laboratory, Oak Ridge, TN (United States)

    2010-07-15

    This paper examines the computer science issues associated with secure remote instrumentation control for magnetic fusion experiments. Computer science research into enhancing the ability to scientifically participate in a fusion experiment remotely has been growing in size in an attempt to better address the needs of fusion scientists worldwide. The natural progression of this research is to examine how to move from remote scientific participation to remote hardware control. The vision is to define a gatekeeper software system that will be the only channel of interaction for incoming requests to the secured area of the experimental site. The role of the gatekeeper is to validate the identification and access privilege of the requestor and to insure the general validity of the proposed request. The vision for the gatekeeper is that it be a modular system that is simple in design and defined in a way that makes its implementation and operation transparent and obvious. The architecture of the module interface is flexible enough that it can easily allow the future addition of new modules. At the same time, it should be transparent to end-users and allow a high volume of activity so as to not provide a work bottleneck. The results of the gatekeeper design and initial implementation are presented as well as a discussion on the implication of this research on the operation of fusion experimental machines such as ITER.

  6. PLC-based search and secure interlock system for the personnel safety in folded tandem ion accelerator

    International Nuclear Information System (INIS)

    Padmakumar, Sapna; Subramanyum, N.B.V.; Bhatt, Jignesh P.; Ware, Shailaja V.; Kansara, M.J.; Gupta, S.K.; Singh, P.

    2006-01-01

    Safety of the personnel is one of the key issues addressed in any accelerator project. The FOTIA facility at BARC is capable of operating under standard operation conditions without any radiation hazard. Even then for a safe and reliable operation of FOTIA a PLC (Programmable logic controller) based interlock system has been implemented. This interlocking system is compact, modular, flexible, robust and easy for troubleshooting. These advantages led to the popularity of PLC rather than using a relay-based system. This paper highlights the salient features of the search and secure interlock for the personal safety of FOTIA. (author)

  7. An Investigation of Secure Remote Instrument Control

    Energy Technology Data Exchange (ETDEWEB)

    Schissel, D.; Abla, G.; Penaflor, B. [General Atomics, San Diego (United States); Ciarlette, D. [Oak Ridge National Laboratory, Oak Ridge (United States)

    2009-07-01

    This paper examines the computer science issues associated with secure remote instrumentation control for magnetic fusion experiments. Computer science research into enhancing the ability to scientifically participate in a fusion experiment remotely has been growing in size in an attempt to better address the needs of fusion scientists worldwide. The natural progression of this research is to examine how to move from remote scientific participation to remote hardware control. The vision is to define a gatekeeper software system that will be the only channel of interaction for incoming requests to the experimental site. The role of the gatekeeper is to validate the identification and access privilege of the requester and to insure the validity of the proposed request. The vision for the gatekeeper is that it be a modular system that is simple in design and defined in a way that makes its implementation and operation transparent and obvious. The architecture of the module interface is flexible enough that it can easily allow the future addition of new modules. At the same time, it should be transparent to end-users and allow a high volume of activity so as to not provide a work bottleneck. Appropriate security requires the ability to verify identity (authentication), verify access control (authorization), and validate the appropriateness of requests. The validation process can include provenance and semantic methodologies. The results of the gatekeeper design and initial prototype testing will be presented as well as a discussion on the implication of this research on the operation of fusion experimental machines such as ITER. (authors)

  8. 32 CFR Appendix E to Part 154 - Personnel Security Determination Authorities

    Science.gov (United States)

    2010-07-01

    ... designee 5. Chairman, Joint Chiefs of Staff and/or designee 6. Directors of the Defense Agencies and/or... personnel for assignment to Presidential Support activities: The Executive Secretary to the Secretary and... of Strategic Target Planning 2. Director, Joint Staff, OJCS 3. Chief of Staff, U.S. Army 4. Chief of...

  9. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  10. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as... security equipment and systems; (i) Inspection, control, and monitoring techniques; (j) Methods of physical...

  11. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  12. Contribution of Security Forces Personnel to Deter Migration and Improve Stability in West Africa

    Science.gov (United States)

    2017-06-09

    response, cybersecurity analyst, chemical facility inspector, and others.19 Limitations There are several limitations to this research. The time...basins and artificial lakes. This is one of the greatest achievements because agriculture represents one of the main economic activities of the...on intelligence to fill the gap in personnel. However, due to the level of poverty, human intelligence assets are the most preferred. Therefore, in

  13. Investigation Effect of Shift Work on Job Burnout and Depression, Anxiety, Stress Scale in Military Personnel

    Directory of Open Access Journals (Sweden)

    Ayoub Ghanbary Sartang

    2018-06-01

    Full Text Available Shift work has been recognized as an important tool for organizing of work in developing countries. The disturbed depression, stress accident are the most common health‐related effects of shift work. The military personnel shift worker during work, are exposed to stress and psychological pressure that certainly affect the efficiency of their work. The aim of this study was to Investigation Effect of shift work on job burnout and Depression, Anxiety, Stress Scale in military personnel. This cross-sectional study was carried out on 100 military personnel male in Southern Iran. Respondents were divided into two groups based on their working schedule (50 shift work personnel / 50 day work personnel. Data collection tools were a Depression, Anxiety, and Stress Scale (DASS-21, demographic characteristics and Maslach job burnout questionnaire. Convenience sampling was used as sampling method. Finally, Data analysis was performed with SPSS (version 20, descriptive statistics, One Way Anova test, ANCOVA and t-independent test. The results of showed that shift work has an impact on burnout and DASS-21 and mean obtained score for DASS-21 and job burnout in shift workers are more day work individuals. Analysis of variance test showed significant difference between job burnout in day workers and shift workers and job burnout were more in shift workers. Also significant difference between DASS-21 in day workers and shift workers and DASS-21 was more in shift workers. This study showed that shift work has an impact on burnout and scale DASS-21 shall is taken to Intervention actions in shift works.

  14. Investigation of Psychological Health and Migraine Headaches Among Personnel According to Effort-Reward Imbalance Model

    Directory of Open Access Journals (Sweden)

    Z. Darami

    2012-05-01

    Full Text Available Background and aims: The relationship between physical-mental health and Migraine headaches and stress, especially job stress, is known. Many factors can construct job stress in work settings. The factor that has gained much attention recently is inequality (imbalance of employees’ effort versus the reward they gain. The aim of the current attempt was to investigate the validity of effort-reward imbalance model and indicate the relation of this model with migraine headaches and psychological well-being among subjects in balance and imbalance groups. Methods: Participants were 180 personnel of Oil distribution company located in Isfahan city, and instruments used were General health questionnaire (Goldberg & Hilier, Social Re-adjustment Rating Scale (Holmes & Rahe, Ahvaz Migraine Questionnaire (Najariyan and Effort-reward imbalance scale (Van Vegchel & et al.   Results: The result of exploratory and confirmatory factor analysis for investigating the Construct validity of the effort-reward imbalance model showed that in both analyses, the two factor model was confirmed. Moreover, findings indicate that balance group was in better psychological (p<0/01 and physical (migraine (p<0/05 status comparing to the imbalance group. These findings indicate the significance of justice to present appropriate reward relative to personnel performance on their health.   Conclusion: Implication of these findings can improve Iranian industrial personnel health from both physical and psychological aspects.  

  15. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    Science.gov (United States)

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  16. [An investigation on job burnout of medical personnel in a top three hospital].

    Science.gov (United States)

    Li, Y Y; Li, L P

    2016-05-20

    To investigate job burnout status of medical Personnel in a top three hospitals, in order to provide basic data for intervention of the hospital management. A total of 549 doctors and nurses were assessed by Maslach Burnout Inventory-Human Service Survey (MBI-HSS). SPSS 19.0 software package was applied to data description and analysis, including univariate analysis and orderly classification Logistic regression analysis. The rate of high job burnout of doctors and nurses are 36.3% and 42.8% respectively. Female subjects got higher scores (29.4±13.5) on emotional exhaustion than male subjects (26.2±12.8) compared with.Doctors got lower scores (28.2±15.9) on emotional exhaustion and higher scores (31.4±9.3) on personal accomplishment than nurses.Compared with subjects with higher professional title, young subjects with primary professional title got lower scores on personal accomplishment.Subjects with 11-20 years working age got the highest scores on depersonalization.Among all the test departments, medical personnel of emergency department got the highest scores (31.9±12.6) on emotional exhaustion,while the lowest scores (28.1±8.0) on personal accomplishment. According to the results of orderly classification Logistic regression analysis, age, job type,professional qualifications and clinical departments type entered the regression model. Physical resources and emotional resources of medical personnel are overdraft so that they got some high degree of job burnout.Much more attention should be paid to professional mental health of nurses,and personnel who at low age,got low professional titles.Positive measures should be provided, including management mechanism,organizational culture, occupational protection and psychological intervention.

  17. Method to control the persons permitted to enter plants with increased security requirements and personnel lock for such plants

    International Nuclear Information System (INIS)

    Blaser, E.; Eickhoff, H.; Tretschoks, W.

    1978-01-01

    The personnel lock for a plant with increased security requirements, e.g. a nuclear power plant, has got two lock gates. Only persons whose right to enter has been established by the control equipment will be admitted to the lock chamber. For this purpose an identification recess is built in front of the first access to the lock chamber, where size, weight and the contours of the persons wanting to enter are roughly measured and compared with a code card carried along. The weight is established by a balance forming part of the base of the recess. By means of contact surfaces in the region of knees, upper thigh, chest and shoulder an upright position of the person is guaranteed. Scanning of the physical dimensions is performed with laser, infrared and light barriers. (DG) [de

  18. Investigation of a Markov Model for Computer System Security Threats

    Directory of Open Access Journals (Sweden)

    Alexey A. A. Magazev

    2017-01-01

    Full Text Available In this work, a model for computer system security threats formulated in terms of Markov processes is investigated. In the framework of this model the functioning of the computer system is considered as a sequence of failures and recovery actions which appear as results of information security threats acting on the system. We provide a detailed description of the model: the explicit analytical formulas for the probabilities of computer system states at any arbitrary moment of time are derived, some limiting cases are discussed, and the long-run dynamics of the system is analysed. The dependence of the security state probability (i.e. the state for which threats are absent on the probabilities of threats is separately investigated. In particular, it is shown that this dependence is qualitatively different for odd and even moments of time. For instance, in the case of one threat the security state probability demonstrates non-monotonic dependence on the probability of threat at even moments of time; this function admits at least one local minimum in its domain of definition. It is believed that the mentioned feature is important because it allows to locate the most dangerous areas of threats where the security state probability can be lower then the permissible level. Finally, we introduce an important characteristic of the model, called the relaxation time, by means of which we construct the permitting domain of the security parameters. Also the prospects of the received results application to the problem of finding the optimal values of the security parameters is discussed.

  19. Report: Management Alert - EPA Has Not Initiated Required Background Investigations for Information Systems Contractor Personnel

    Science.gov (United States)

    Report #17-P-0409, September 27, 2017. Not vetting contractor personnel before granting them network access exposes the EPA to risks. Contractor personnel with potentially questionable backgrounds who access sensitive agency data could cause harm.

  20. [The main stages and prospects of investigation of occupational loss of hearing in the flight personnel of civilian aviation].

    Science.gov (United States)

    Kozin, O V

    2009-01-01

    The objective of the present paper is to review the main stages of investigations into the mechanisms of occupational loss of hearing in the light personnel of civilian aviation starting from the early period in the development of aviation (the first decades of the XXth century) up to the present time. Much attention is given to clinical and audiologic studies involving the flight personnel, elaboration of guidelines and instructions on elucidation, diagnosis, and expert examination of occupational deafness in the personnel of civilian aviation. Prospects for handling the problem in this country are discussed.

  1. WNP-2, securities fraud investigation are fired up

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    Washington's WNP-2 nuclear plant faces a securities fraud investigation just as it is ready to start operating on schedule. The investigation's outcome and WNP-2's performance will determine whether WNP-1 and WNP-3 will be financed. Angry bondholders who did not receive interest on their investments in January prompted Congressional hearings, at which it was learned that institutional buyers had pulled out of the Washington Public Power Supply System project and unloaded the bonds on thousands of unsuspecting individuals for whom tax-free municipal bonds are inappropriate. Securities Exchange Commission investigators will focus on the initial offering and disclosure by the issuer to determine if the Wall Street unloading was legal

  2. Personnel monitoring- overexposure investigations and follow-up in non-DAE institutions during 1994-2003

    International Nuclear Information System (INIS)

    Mahajan, J.M.; Massand, O.P.

    2004-04-01

    Personnel Monitoring Section, Bhabha Atomic Research Centre, Mumbai, is entrusted with the responsibility of providing a countrywide personnel monitoring to radiation workers using external radiation like X, beta, gamma and neutron. As per Radiation Protection Rules (RPR) of 1971 promulgated by the competent authority the personnel monitoring service is mandatory for all the workers working with radiation. The radiation exposures received by them should be within the limits prescribed by AERB. For effective control of doses to the radiation workers the reporting, investigation and follow-up of overexposure cases play an important part in the countrywide personnel monitoring programme. Various aspects of overexposure investigations and follow-up as well as the analysis of overexposure doses recorded or received by the radiation workers during 1994 to 2003 are presented in this report. (author)

  3. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    Science.gov (United States)

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  4. Information security knowledge sharing in organizations : Investigating the effect of behavioral information security governance and national culture

    OpenAIRE

    Rocha Flores, Waldo; Antonsen, Egil; Ekstedt, Mathias

    2014-01-01

    This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries – namely, USA and Sweden – allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledg...

  5. National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments

    National Research Council Canada - National Science Library

    Doyle, Charles

    2006-01-01

    .... These National Security Letters (NSLs) seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies...

  6. Investigating a homogeneous culture for operating personnel working in domestic nuclear power plants

    International Nuclear Information System (INIS)

    Park, Jinkyun

    2016-01-01

    It is evident that a cultural difference (or variability) is one of the determinants affecting the performance of human operators. This means that, from the point of human reliability analysis (HRA), the effect of the cultural variability on the performance of human operators should be carefully scrutinized. In this regard, the cultural profile of operating personnel working in two domestic nuclear power plants (NPPs) were collected and compared based on the Hofstede's 11 cultural dimensions. However, as the coverage of this comparison is not sufficient to manifest the existence of a homogenous culture, cultural data were additionally collected from 52 operating personnel working in domestic NPPs, of which the working environments were distinctive from those of previous NPPs. As a result, it was observed that the cultural profiles of operating personnel working in different NPPs closely resemble each other except in a few cultural dimensions. This result suggests that, operating personnel at least working in domestic NPPs, largely share a homogeneous culture. Accordingly, although more extensive analyses are required to validate the results of this study, it is promising that the cultural variability of operating personnel could be soundly characterized if they share a homogeneous culture. - Highlights: • Cultural variability is critical for understanding human performance. • Hofstede's national and organizational culture model is used. • Cultural profiles for six groups of domestic operating personnel are compared. • Domestic operating personnel seem to share a homogenous culture.

  7. Investigation of Employee Security Behaviour: A Grounded Theory Approach

    OpenAIRE

    Connolly , Lena; Lang , Michael; Tygar , J. ,

    2015-01-01

    Part 5: Security Management and Human Aspects of Security; International audience; At a time of rapid business globalisation, it is necessary to understand employee security behaviour within diverse cultural settings. While general deterrence theory has been extensively used in Behavioural Information Security research with the aim to explain the effect of deterrent factors on employees’ security actions, these studies provide inconsistent and even contradictory findings. Therefore, a further...

  8. Assessing Psycho-Social Resilience in Diplomatic, Civilian & Military Personnel Serving in a High-Threat Security Environment during Counter-Insurgency and Counter-Terrorism Operations in Iraq

    Directory of Open Access Journals (Sweden)

    Anne Speckhard

    2012-08-01

    Full Text Available Currently thousands of military, diplomatic and civilian personnel are deployed under NATO, UN, and other multi-national, as well as national auspices in high-threat security environments, including active conflict zones such as Iraq and Afghanistan.  Soldiers are generally well trained and prepared psychologically to face armed conflict. Civilian contractors and diplomats, on the other hand, often are not.  Moreover in today’s high-threat security environments terrorists, insurgents and even child soldiers may be the opposing force, creating a more uncertain and anxiety provoking environment and more difficult to identify security threat. These facts have serious implications for the psycho-social resilience of diplomatic, civilian and military personnel deployed in such environments.  This article investigates psycho-social resilience in a small exploratory sample of US embassy staff, contractors and US forces serving in Iraq during 2007, a time when Improvised Explosive Devices (IEDs, roadside bombings, mortar attacks, kidnappings, murders and sniper fire were an everyday occurrence in Iraq.

  9. PERSONNEL COSTS IN THE CZECH CONSTRUCTION SECTOR: INVESTIGATING THE EFFECT OF COMPANY SIZE

    Directory of Open Access Journals (Sweden)

    Martina Paulišová

    2017-01-01

    Full Text Available : Managing personnel costs is important in all companies, especially in those whose production is labor intensive. The construction sector therefore qualifies as a suitable area for analyzing issues associated with these costs. The aim of this study is to find out whether company size affects personnel cost management under various circumstances. Four research hypotheses focus on the relationships among and the relative importance of personnel costs, use of standards, range of employee benefits offered, and economic actions taken when faced with an economic crisis. The evaluation of hypotheses is supported by using the chi-square test of independence with the aim of confirming or rejecting the statistical significance of relationships between the examined categorical variables. Results have confirmed a significant effect of company size. Several research implications and suggested future research directions are also presented in the conclusion of this paper.

  10. A Framework for Adaptive Information Security Systems : A Holistic Investigation

    OpenAIRE

    Mwakalinga, Jeffy

    2011-01-01

    This research proposes a framework for adaptive information security systems that considers both the technical and social aspects of information systems security. Initial development of information systems security focused on computer technology and communication protocols. Researchers and designers did not consider culture, traditions, ethics, and other social issues of the people using the systems when designing and developing information security systems. They also seemed to ignore environ...

  11. Options for Using Military Waiver Information in Personnel Security Clearance Investigations

    Science.gov (United States)

    2007-03-01

    for applicants in Navy training schools (OPNAV INSTRUCTION 1514.lB). Waiver data are stored in PRIDE but limited to daily lists of waiver requests...Defense Waiver Codes Waiver code Explanation AYA Age maximum exceeded for enlistment purposes; waiver granted by the highest authority 1 level

  12. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Brown, C.H.

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs

  13. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  14. Methicillin-resistant Staphylococcus aureus in horses and horse personnel: an investigation of several outbreaks.

    Science.gov (United States)

    van Duijkeren, E; Moleman, M; Sloet van Oldruitenborgh-Oosterbaan, M M; Multem, J; Troelstra, A; Fluit, A C; van Wamel, W J B; Houwers, D J; de Neeling, A J; Wagenaar, J A

    2010-02-24

    At the Veterinary Microbiological Diagnostic Center, the Netherlands, the percentage of methicillin-resistant Staphylococcus aureus (MRSA) isolates found in equine clinical samples increased from 0% in 2002 to 37% in 2008. MRSA of spa-type t064, belonging to MLST ST8 and spa-types t011 and t2123, both belonging to the livestock-associated MLST ST398, predominated. During an outbreak of post-surgical MRSA infections in horses at a veterinary teaching hospital in 2006/2007, MRSA isolates of spa-type t2123 were cultured from 7 horses and 4/61 personnel which indicated zoonotic transmission. After intervention the outbreak stopped. However, another outbreak occurred in 2008, where 17 equine MRSA isolates of spa-type t011 (n=12), t2123 (n=4), and t064 (n=1) were found. This time, 16/170 personnel were positive for MRSA with spa-type t011 (n=11) and t2123 (n=5). Personnel in close contact with horses were more often MRSA-positive (15/106) than those without (1/64). Screening of horses upon admission showed that 9.3% were MRSA-positive predominantly with spa-type t011. Weekly cross-sectional sampling of all hospitalized horses for 5 weeks showed that 42% of the horses were MRSA-positive at least once, again predominantly with spa-type t011, which suggests that nosocomial transmission took place. Fifty-three percent of the environmental samples were MRSA-positive, including samples from students' and staff members' rooms, and all were spa-type t011. This indicates that humans contribute to spreading the organism. Culturing of samples employing high-salt pre-enrichment performed better than a comparable method without pre-enrichment. Our results show that nosocomial transmission occurs in equine clinics and suggests that personnel play a role in the transmission. Copyright 2009 Elsevier B.V. All rights reserved.

  15. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E.

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs

  16. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs.

  17. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  18. Investigation of internal contamination by tritium in A-1 nuclear power plant personnel in 1974

    International Nuclear Information System (INIS)

    Ondris, D.; Herchl, M.; Homolova, E.

    1977-01-01

    The results are presented of the 1974 personnel monitoring of the Bohunice A-1 nuclear power plant staff for internal contamination with tritium. Totally, 650 urine samples taken from 103 workers were analyzed using the recommended ICRP procedure. In routine examinations, the highest dose equivalent value of tritium incorporated within two weeks did not exceed 10 mrem, i.e., the maximum annual dose equivalent did not exceed 260 mrem. 8.5 μCi tritium per 1 litre urine was considered to be an alarm value. In a selected group of 21 high-risk persons analyses were conducted before and after each operation associated with tritium hazards. The limit dose was set to 5.8 μCi.l -1 , i.e., the tritium concentration equivalent to 10% of the maximum permissible annual intake. In 18 workers where tritium risk was of a more serious nature the biological half-life was followed up, with the average biological half-life being 8.5 days, with 5 days for the minimum and 12 days for the maximum values. The results show that in 1974 the tritium burden did not exceed 1/10 of the maximum permissible dose for any of the A-1 nuclear power plant workers. (L.O.)

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  20. Latex glove sensitivity amongst diagnostic imaging healthcare personnel: a self-reporting investigation

    International Nuclear Information System (INIS)

    Healy, Jan; Brennan, Patrick C.; Bowden, Julie Anne

    2003-01-01

    The use of latex gloves has risen dramatically among healthcare workers resulting in an increase in the number of workers experiencing reactions to gloves. Little evidence of reactions among Irish healthcare workers is available. The current, self-reporting study investigated the prevalence to latex gloves amongst four professional groups within three Diagnostic Imaging Departments. Prevalence is similar to that demonstrated elsewhere with 18.3% of individuals expressing latex associated symptoms. Symptoms included itching and redness of hands, dry cracked skin, soreness of eyes and upper respiratory tract complaints. These results indicate that latex hypersensitivity is a real problem amongst Irish healthcare workers. This preliminary work provides the basis of a much larger controlled study currently being planned

  1. [Investigation methodology and application on scientific and technological personnel of traditional Chinese medical resources based on data from Chinese scientific research paper].

    Science.gov (United States)

    Li, Hai-yan; Li, Yuan-hai; Yang, Yang; Liu, Fang-zhou; Wang, Jing; Tian, Ye; Yang, Ce; Liu, Yang; Li, Meng; Sun Li-ying

    2015-12-01

    The aim of this study is to identify the present status of the scientific and technological personnel in the field of traditional Chinese medicine (TCM) resource science. Based on the data from Chinese scientific research paper, an investigation regarding the number of the personnel, the distribution, their output of paper, their scientific research teams, high-yield authors and high-cited authors was conducted. The study covers seven subfields of traditional Chinese medicine identification, quality standard, Chinese medicine cultivation, harvest processing of TCM, market development and resource protection and resource management, as well as 82 widely used Chinese medicine species, such as Ginseng and Radix Astragali. One hundred and fifteen domain authority experts were selected based on the data of high-yield authors and high-cited authors. The database system platform "Skilled Scientific and Technological Personnel in the field of Traditional Chinese Medicine Resource Science-Chinese papers" was established. This platform successfully provided the retrieval result of the personnel, output of paper, and their core research team by input the study field, year, and Chinese medicine species. The investigation provides basic data of scientific and technological personnel in the field of traditional Chinese medicine resource science for administrative agencies and also evidence for the selection of scientific and technological personnel and construction of scientific research teams.

  2. Investigation of mutagenic effects in personnel occupationally exposed to ionizing radiation in Brazil

    International Nuclear Information System (INIS)

    Cunha Junior, Luiz Raimundo Campos da Silva e

    2015-01-01

    Ionizing radiation (IR) are present in most of the early diagnosis of a multitude of diseases, many cancers are included, and have the characteristic of a quick and accurate diagnosis, and often cheaper. The use of this type of energy but requires specific care protection, since the IR has a characteristic of altering the genetic material through mutations. The radiology area operators in hospitals are the class of workers who are exposed more directly and thus are targets of investigations that may assist in understanding the interaction of IR with the biological material, in addition to assisting these professionals in requirement radiological protection We collected 73 samples of individuals working in various radiology departments in five hospitals in four different states in Brazil (Sao Paulo, Minas Gerais, Rio Grande do Sul and Para). The selection criteria for participation were: at least 18 years old and 2 years in the profession, not alcoholic or smoker, not taking drugs. For cytogenetic analysis were performed the comet test and micronucleus, and chromosome aberration study. This study was approved by ethics committee All the samples were compared to individuals of the same age and gender who have not gone through any kind of radiological examination in the last 6 months. When compared with the control, MN tests and AC showed a total damage, using the t test, the database and SPSS BioEstat. The comet assay showed a higher level of damage compared to controls (0.84 0,47). the average age was established and made relationship between gender and age of the participants, the more damage levels in females compared to males. Individuals aged over 45 years also showed a higher level of damage when compared with the age. A factor to be taken into consideration is that the population of Porto Alegre present a lower level of damage compared to other groups, and most likely this event due to the use of DR equipment Direct conversion. The Belo Horizonte and Ribeirao

  3. An Investigation of the Factors Related to Low Parent-Adolescent Attachment Security in Taiwan.

    Science.gov (United States)

    Chen, Chen-Jung; Sung, Huei-Chuan; Chen, Yi-Chang; Wang, Chih-Hung

    2017-09-01

    Adolescence may involve increases in many behavioral problems and psychosocial maladaptation. Adolescents must successfully cope with these challenges to achieve positive developmental milestones. To investigate whether low parental attachment security among adolescents in Taiwan is associated with their demographic characteristics, psychosocial maladaptation, and depression. A cross-sectional survey. A total of 335 adolescents completed the questionnaires. The Inventory of Parent and Peer Attachment, the Chinese version of the Youth Self-Report, and the Beck Depression Inventory-II were used to survey the participants. Correlation and multiple linear regressions, using low attachment security as the response variable, were used in the statistical analysis. The prevalence of Taiwanese adolescents with low parental attachment security was 38.5%. Low parental attachment security in adolescents was significantly associated with parental remarriage status and psychosocial maladaptation. By considering these risk factors, nursing educators and nurses could develop effective interventions to strengthen parent-adolescent attachment security.

  4. Using the competing values framework (CVF to investigate organisational culture in a major private security company

    Directory of Open Access Journals (Sweden)

    D Kokt

    2011-06-01

    Full Text Available The proliferation of crime, especially in the South African context, has placed considerable emphasis on the private security industry.  This has also increased fierce competition in the private security domain with both national and international private security companies infiltrating the South African market.  Like public policing private security has an important role to play in combating crime and other transgressions, with the exception that private security owes its existence to paying customers.  By using the Competing Values Framework (CVF as conceptual guide, the researchers are able to provide the managers of the company under investigation with insight on how their cultural orientation affects their functioning and ultimately their competitive advantage.

  5. Personnel monitoring

    International Nuclear Information System (INIS)

    1965-01-01

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  6. Personnel monitoring

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1966-12-31

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  7. A game theoretic investigation of deception in network security

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, Thomas E.; Grosu, Daniel

    2010-12-03

    We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. Finally, we discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network.

  8. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's manual for the training of SNM guards. Covered are: self-defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  9. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume contains the student guide. It contains the introduction to the course, terrorism, field search and restraints, criminal procedures, introduction to criminal law, offenses against persons and property, rules of conduct, use of force, firearms qualification course, self defense, arrest authority, civil liability, report writing, stress, and tactics

  10. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  11. An approach for investigation of secure access processes at a combined e-learning environment

    Science.gov (United States)

    Romansky, Radi; Noninska, Irina

    2017-12-01

    The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.

  12. 8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Identity, law enforcement, or security investigations or examinations relating to applications for immigration relief, protection, or restriction on removal. 1003.47 Section 1003.47 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE GENERAL PROVISIONS...

  13. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  14. Personnel Preparation.

    Science.gov (United States)

    Fair, George, Ed.; Stodden, Robert, Ed.

    1981-01-01

    Three articles comprise a section on personnel preparation in vocational education. Articles deal with two inservice programs in career/vocational education for the handicapped and a project to train paraprofessionals to assist special educators in vocational education. (CL)

  15. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  16. [A preliminary evaluation of mental status and an investigation of occupational health knowledge demand in operating and maintenance personnel in wind power plants].

    Science.gov (United States)

    Hu, S Q; Zhang, Q; Zhu, X H; Sun, K; Chen, S Z; Liu, A G; Luo, G L; Huang, W

    2016-10-20

    Objective: To investigate the mental status, level of occupational health knowledge, health behaviors, and occupational health knowledge demand in operating and maintenance personnel in wind power plants, and to provide a basis for formulating protective measures of occupational health for operating and maintenance personnel in wind power plants. Methods: A cluster sampling was performed in regionally representative wind power plants in the wind power industry from May 2014 to June 2015, and the Symptom Checklist-90 (SCL-90) and a self-made evaluation questionnaire were used to investigate the general status, mental health, and occupational health knowledge demand in 160 operating and maintenance workers. Results: Of all respondents, 26.9% had mental health issues. The awareness rate of infectious disease knowledge and preventive measures was 11.9%. Of all workers, 96.5% wanted to know the occupational hazard factors in the workplace, and 96.3% wanted to get the knowledge of the prevention of related diseases. Conclusion: Mental health issues in operating and maintenance personnel in wind power plants cannot be neglected and there is a high demand for occupational health services and related knowledge. Comprehensive intervention measures for health promotion in the workplace should be adopted to improve working environment, enhance individual mental health education, increase the level of occupational health management, and protect the health of workers.

  17. Authorization gives the personnel he/she gives the center he/she gives Isotopes for the acting he/she gives tied functions with the security and the radiological protection

    International Nuclear Information System (INIS)

    Perez Pijuan, S.; Hernandez Alvarez, R.; Peres Reyes, Y.; Venegas Bernal, M.C.

    1998-01-01

    The conception is described used in a center production labelled compound and radiopharmaceuticals for the authorization to the support, operation and supervision personnel The approaches are exposed used to define the excellent positions for the security the installation. The are described the training programs, designed starting from the indentification the specific competitions for each duty station and with particular emphasis in the development gives abilities you practice. It is used for the administration and evaluation gives the programs training the Automated System Administration Programs Training (GESAT)

  18. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    Science.gov (United States)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  19. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  20. Investigating the issue of copyright and security measures in digital libraries

    Directory of Open Access Journals (Sweden)

    Sedigheh Ahmadi Fasih

    2013-11-01

    Full Text Available During the past few years, digital libraries have been the primary source of retrieving necessary information. IT helps many scholars have the access to recently published value added researches around the world. However, information security and copyright concerns are among the most important issues and there must be good rules and regulation to protect authors against any sort of copyright violation. In this paper, we present an empirical investigation to find out about the status of copyright issues in one of Iranian libraries. The proposed study of this paper designs a questionnaire in Likert scale and distributes it among 96 librarian experts. Cronbach alpha is equal to 0.76, which is well above the minimum acceptable level. The results of our investigation indicate that although expert believe the status of copyright is in desirable level when the level of significance is five percent, there are some concerns on some issues. In other words, experts believed that all copyrights are not well protected and digital libraries do not follow governmental rules and regulation on fully protecting authors’ rights. In addition, experts believed that the security of sources available on digital libraries is not well protected.

  1. Genetic Contributions to Continuity and Change in Attachment Security: A Prospective, Longitudinal Investigation from Infancy to Young Adulthood

    Science.gov (United States)

    Raby, K. Lee; Cicchetti, Dante; Carlson, Elizabeth A.; Egeland, Byron; Collins, W. Andrew

    2013-01-01

    Background Longitudinal research has demonstrated that individual differences in attachment security show only modest continuity from infancy to adulthood. Recent findings based on retrospective reports suggest that individuals’ genetic variation may moderate the developmental associations between early attachment-relevant relationship experiences and adult attachment security. The purpose of this study was to use a prospective, longitudinal design to investigate genetic contributions to continuity and changes in attachment security from infancy to young adulthood in a higher risk sample. Methods Infant attachment security was assessed using the Strange Situation Procedure at 12 and 18 months. Adults’ general attachment representations were assessed using the Adult Attachment Interview at age 19 and age 26. Romantic attachment representations were assessed with the Current Relationship Interview at ages 20–21 and ages 26–28. Individuals were genotyped for variants within the oxytocin receptor (OXTR), dopamine D4 receptor (DRD4), and serotonin transporter linked polymorphic region (5-HTTLPR). Results The continuity of attachment security from infancy into young adulthood was consistently moderated by OXTR genetic variation. Infant attachment security predicted the security of adults’ general and romantic attachment representations only for individuals with the OXTR G/G genotype. This interaction was significant when predicting adult attachment security as measured by the Adult Attachment Interview at age 19 and 26 and the Current Relationship Interview at ages 26–28. DRD4 and 5-HTTLPR genetic variation did not consistently moderate the longitudinal associations between attachment security during infancy and adulthood. Conclusions This study provides initial longitudinal evidence for genetic contributions to continuity and change in attachment security from infancy to young adulthood. Genetic variation related to the oxytocin system may moderate the

  2. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  3. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  4. Supporting the personnel reliability decision-making process with artificial intelligence

    International Nuclear Information System (INIS)

    Harte, D.C.

    1991-01-01

    Recent legislation concerning personnel security has vastly increased the responsibility and accountability of the security manager. Access authorization, fitness for duty, and personnel security access programs require decisions regarding an individual's trustworthiness and reliability based on the findings of a background investigation. While these guidelines provide significant data and are useful as a tool, limited resources are available to the adjudicator of derogatory information on what is and is not acceptable in terms of granting access to sensitive areas of nuclear plants. The reason why one individual is deemed unacceptable and the next acceptable may be questioned and cause discriminatory accusations. This paper is continuation of discussion on workforce reliability, focusing on the use of artificial intelligence to support the decisions of a security manager. With this support, the benefit of previous decisions helps ensure consistent adjudication of background investigations

  5. An empirical investigation to analysis the dimensions of cultural security: A case study of educational system

    Directory of Open Access Journals (Sweden)

    Elyas Nouraei

    2013-02-01

    Full Text Available The purpose of this study is to explore the concept of cultural security and its practical implications in a case study of educational system. There are several definitions of culture, which describe different aspects of cultural security. In fact, cultural security tends to show various behaviors, thinking, beliefs and other people’s perspectives in a society, which represents the overall circumstances. Cultural security and its issues make it possible to have a clear image of a society or community. This paper aims to identify the important dimensions of cultural security in terms of basic components of cultural security identified in a framework. Therefore, after identifying the components, using a questionnaire, required data are gathered from the universities of the city of Ilam, Iran and they are analyzed by SPSS18.0 software and its appropriate statistical tests.

  6. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  7. Access to Justice for the Wrongfully Accused in National Security Investigations

    Directory of Open Access Journals (Sweden)

    Jasminka Kalajdzic

    2009-02-01

    Full Text Available Among the casualties in the ‘war on terror’ is the presumption of innocence. It is now known that four Canadians who were the subject of investigation by the RCMP and CSIS were detained and tortured in Syria on the basis of information that originated in and was shared by Canada. None has ever been charged with a crime. On their return home, all four men called for a process that would expose the truth about the role of Canadian agencies in what happened to them, and ultimately help them clear their names and rebuild their lives. To date, in varying degrees, all four men continue to wait for that “process.” In this paper, I examine the access to justice mechanisms available to persons who are wrongfully accused of being involved in terrorist activities. Utilizing the case study of one of the four men, Abdullah Almalki, I explore the various processes available to him: (i a complaint to the relevant domestic complaints bodies, the Security Intelligence Review Committee and the Commission for Public Complaints Against the RCMP; (ii a commission of inquiry; and (iii a civil tort claim. Due in large part to the role national security confidentiality plays in these mechanisms, all three models are found to be ineffective for those seeking accountability in the national security context. Parmi les victimes de la «guerre contre le terrorisme» figure la présomption d’innocence. On sait maintenant que quatre Canadiens qui ont fait l’objet d’enquêtes par la GRC et le SCRS ont été détenus et torturés en Syrie suite à des renseignements ayant leur origine au Canada et partagés par le Canada. Nul d’entre eux n’a jamais été accusé de crime. À leur retour, tous les quatre hommes ont demandé un processus qui exposerait la vérité au sujet du rôle d’agences canadiennes dans ce qui leur est arrivé et qui éventuellement leur aiderait à rétablir leur réputation et refaire leur vie. À ce jour, à des degrés divers, tous

  8. Securing services in the cloud: an investigation of the threats and the mitigations

    Science.gov (United States)

    Farroha, Bassam S.; Farroha, Deborah L.

    2012-05-01

    The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.

  9. 49 CFR 1542.219 - Supplementing law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Supplementing law enforcement personnel. 1542.219 Section 1542.219 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.219 Supplementing law...

  10. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  11. Investigative Operations: Use of Covert Testing to Identify Security Vulnerabilities and Fraud, Waste, and Abuse

    National Research Council Canada - National Science Library

    2007-01-01

    ... and internal control weaknesses at executive branch agencies. These vulnerabilities and internal control weaknesses include those that could compromise homeland security, affect public safety, or have a financial impact on taxpayer's dollars...

  12. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  13. How secure is your information system? An investigation into actual healthcare worker password practices.

    Science.gov (United States)

    Cazier, Joseph A; Medlin, B Dawn

    2006-09-27

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.

  14. Automatic personnel contamination monitor

    International Nuclear Information System (INIS)

    Lattin, Kenneth R.

    1978-01-01

    United Nuclear Industries, Inc. (UNI) has developed an automatic personnel contamination monitor (APCM), which uniquely combines the design features of both portal and hand and shoe monitors. In addition, this prototype system also has a number of new features, including: micro computer control and readout, nineteen large area gas flow detectors, real-time background compensation, self-checking for system failures, and card reader identification and control. UNI's experience in operating the Hanford N Reactor, located in Richland, Washington, has shown the necessity of automatically monitoring plant personnel for contamination after they have passed through the procedurally controlled radiation zones. This final check ensures that each radiation zone worker has been properly checked before leaving company controlled boundaries. Investigation of the commercially available portal and hand and shoe monitors indicated that they did not have the sensitivity or sophistication required for UNI's application, therefore, a development program was initiated, resulting in the subject monitor. Field testing shows good sensitivity to personnel contamination with the majority of alarms showing contaminants on clothing, face and head areas. In general, the APCM has sensitivity comparable to portal survey instrumentation. The inherit stand-in, walk-on feature of the APCM not only makes it easy to use, but makes it difficult to bypass. (author)

  15. A novel wireless local positioning system for airport (indoor) security

    Science.gov (United States)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  16. Homeland Security and Emergency Management Education: An Investigation into Workforce Needs

    Science.gov (United States)

    Carlson, Cameron D.

    2017-01-01

    The U.S. Department of Homeland Security (DHS) was created in the wake of the September 11th 2001 terrorist events. DHS's formation, the largest reorganization of a governmental agency in over 50 years, brought a new emphasis on the protection of the nation, its citizens and its infrastructure to government emergency management policy. Previously,…

  17. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  18. An investigation into users' information security awareness on social networks in south western Nigeria

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2016-11-01

    Full Text Available Background: Social networks (SNs offer new and exciting opportunities for interaction among people, cutting across different stratum of the society and providing a ubiquitous mechanism that supports a wide variety of activities. They are at the same time being exploited by criminals to fraudulently obtain information from unsuspecting users. Unfortunately, the seamless communication and semblance of safety assumed by most users make them oblivious to the potential online dangers. Objective: Using quantitative methods on selected social sites, this study empirically examined the information security awareness of SN users in south western Nigeria. Method: A self-designed research instrument was administered for data collection while descriptive and inferential statistics were employed using chi-square, cross-tabulation and t-test for data analysis and result interpretation. Result: Findings from the analysed data suggest that the risk perception vary among male and female SN users and that the general perception of risks regarding SN usage is also very low. Conclusion: Adequate security awareness coupled with detailed legal measures are required to keep SNs secured. However, an individual is duly responsible for the habit of ignoring potential risks posed by the networks.

  19. Teamwork and the National Security Personnel System

    National Research Council Canada - National Science Library

    Willoughby, Michael B

    2007-01-01

    .... However, concern exists that only rewarding individual performance may adversely impact teamwork, collaboration, and information sharing, which could ultimately impact organizational performance...

  20. Corrective Action Investigation Plan for Corrective Action Unit 573: Alpha Contaminated Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2014-05-01

    Corrective Action Unit (CAU) 573 is located in Area 5 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 573 is a grouping of sites where there has been a suspected release of contamination associated with non-nuclear experiments and nuclear testing. This document describes the planned investigation of CAU 573, which comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives.

  1. Neutron personnel dosimetry

    International Nuclear Information System (INIS)

    Griffith, R.V.

    1981-01-01

    The current state-of-the-art in neutron personnel dosimetry is reviewed. Topics covered include dosimetry needs and alternatives, current dosimetry approaches, personnel monitoring devices, calibration strategies, and future developments

  2. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  3. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  4. Personnel Monitoring Department - DEMIN

    International Nuclear Information System (INIS)

    1989-01-01

    The activities and purposes of the Personnel Monitoring Dept. of the Institute of Radioprotection and Dosimetry of the Brazilian CNEN are presented. A summary of the personnel monitoring service is given, such as dosemeters supply, laboratorial inspections, and so on. The programs of working, publishing, courses and personnel interchange are also presented. (J.A.M.M.)

  5. Personnel preferences in personnel planning and scheduling

    OpenAIRE

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations Research, a subfield of applied mathematics, we show that operational efficiency can be achieved while taking personnel preferences into account. In the design of optimization methods, we explicitly con...

  6. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  7. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  8. Summary of investigations in personnel shaft pre-grouting drillholes ONK-PP131, -PP134 and -PP137 in Olkiluoto, 2008

    International Nuclear Information System (INIS)

    Heikkinen, E.; Ahokas, T.; Heikkinen, P.; Kristiansson, S.; Tiensuu, K.; Pere, T.

    2010-06-01

    Posiva Oy is preparing for disposal of spent nuclear fuel in the bedrock at Olkiluoto, Eurajoki. This act is in accordance with the application filed in 1999, the Decision-in- Principle of the State Council in 2000, and the ratification by Parliament in 2001. The ONKALO underground characterisation facility has been under construction since 2004. Construction work has included excavation of an access tunnel (currently at a depth of c. 350 m) and driving of three vertical shafts using raise-boring. In 2008, geological, hydrological and geophysical measurements were carried out in three vertical drillholes intended for pre-grouting of personnel shaft ONK-KU1 at depth level -177 to -280 m. The drillholes are 76 mm in diameter, 104.5 m long and located 3.2 m apart within the perimeter of vertical shaft to be constructed. The shaft also contains geological and geophysical information from deep drillhole OL-KR24. Goal of survey and integrating interpretation was to investigate variation in bedrock properties and their predictability in small scale. Goal was also to demonstrate appropriate survey techniques. These techniques can be applied for characterization of bedrock in disposal tunnel and specifically in the near field of disposal holes. Information is gained from fracturing with orientations and continuity as well as hydraulic conductivity, and position and continuity of electrically conductive layers and fractures. Surveys included flow logging, crosshole mise-a-la-masse measurements, optical imaging and drillhole radar surveys. Data sets were adjusted to common depth level with core logging according to geological reference points. Results were interpreted for hydraulically conductive fractures and their orientations, fracture orientations, and electrical conductivity features from mise-a-la-masse and radar. Geophysical results were compared with geological information. The drillholes are located in a sparsely fractured rock mass. Rock quality is very good and

  9. Evaluation of Agency's Public Personnel Administration

    OpenAIRE

    Neal W. Tamayo

    2017-01-01

    As a consultant for a government agency, this paper will design recommendations and improvements for the agency’s public personnel administration. In order to do this, the consultant has to become familiar with the agency, its departments and also understand the key factors. The department chosen from the government for this paper is the Social Security Administration (Kestenbaum, 2014).

  10. The Intensification of the Personnel Role.

    Science.gov (United States)

    Wangler, Lawrence A.

    1979-01-01

    Discusses personnel profession's increased responsibilities which are due to (1) consolidation of the Equal Employment Opportunity Commission, (2) labor law reform, (3) privacy legislation, (4) social security legislation, (5) open retirement, (6) medical plan costs, (7) codetermination, (8) labor scarcity, (9) top management compensation, and…

  11. Investigation into the risk perceptions of investors in the securities of nuclear-dependent electric utilities

    International Nuclear Information System (INIS)

    Spudeck, R.E.

    1983-01-01

    Two weeks prior to the Three Mile Island accident, March 15, 1979, the Nuclear Regulatory Commission ordered five operating nuclear plants shut down in order to reexamine safety standards in these plants. Reports in the popular and trade press during this time suggested that these events, particularly the accident at Three Mile Island, caused investors in the securities of electric utilities that had nuclear-generation facilities to revise their risk perceptions. This study was designed to examine the impact of both the Nuclear Regulatory Commission order and the accident at Three Mile Island on investor risk perceptions. Selected categories of electric utilities were chosen to examine any differential risk effects resulting from these events. An asset pricing model devoid of many of the restrictive assumptions of more familiar models was used to model investor behavior. The findings suggest that the events described did cause investors to revise upward their perceptions of systematic risk regarding different categories of electric utilities. More specifically, those electric utilities that were operating nuclear plants in 1979 experienced the largest and most sustained increase in systematic risk. However, electric utilities that in 1979 had no operating nuclear plants, but had planned and committed funds for nuclear plants in the future, also experienced increases in systematic risk

  12. Nuclear Forensics: Scientific Analysis Supporting Law Enforcement and Nuclear Security Investigations.

    Science.gov (United States)

    Keegan, Elizabeth; Kristo, Michael J; Toole, Kaitlyn; Kips, Ruth; Young, Emma

    2016-02-02

    Nuclear forensic science, or "nuclear forensic", aims to answer questions about nuclear material found outside of regulatory control. In this Feature, we provide a general overview of nuclear forensics, selecting examples of key "nuclear forensic signatures" which have allowed investigators to determine the identity of unknown nuclear material in real investigations.

  13. Administrative Subpoenas and National Security Letters in Criminal and Foreign Intelligence Investigations: Background and Proposed Adjustments

    National Research Council Canada - National Science Library

    Doyle, Charles

    2005-01-01

    .... Several statutes at least arguably authorize the use of administrative subpoenas primarily or exclusively for use in a criminal investigation in cases involving health care fraud, child abuse, Secret...

  14. Musculoskeletal disorders in main battle tank personnel

    DEFF Research Database (Denmark)

    Nissen, Lars Ravnborg; Guldager, Bernadette; Gyntelberg, Finn

    2009-01-01

    PURPOSE: To compare the prevalence of musculoskeletal disorders of personnel in the main battle tank (MBT) units in the Danish army with those of personnel in other types of army units, and to investigate associations between job function in the tank, military rank, and musculoskeletal problems......, and ankle. RESULTS AND CONCLUSIONS: There were only 4 women in the MBT group; as a consequence, female personnel were excluded from the study. The participation rate was 58.0% (n = 184) in the MBT group and 56.3% (n = 333) in the reference group. The pattern of musculoskeletal disorders among personnel...

  15. An analysis of generalised heuristics for vehicle routing and personnel rostering problems

    OpenAIRE

    Mustafa Misir; Pieter Smet; Greet Vanden Berghe

    2015-01-01

    The present study investigates the performance of heuristics while solving problems with routing and rostering characteristics. The target problems include scheduling and routing home care, security and maintenance personnel. In analysing the behaviour of the heuristics and determining the requirements for solving the aforementioned problems, the winning hyper-heuristic from the first International Cross-domain Heuristic Search Challenge (CHeSC 2011) is employed. The completely new applicatio...

  16. Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line Banking

    OpenAIRE

    Bongani Ngwenya; Khanyisa Malufu

    2012-01-01

    The increase in computer crime has led to scepticism about themove made by the banks to introduce on-line banking. Someview this as a noble move which has made the banking systemmore efficient, reliable and secure, while others view it as arisky and insecure way of banking. The aim of this study wasto assess whether on-line banking in the developing countriesis secure or not. The researcher chose a descriptive-quantitativeresearch design. Data was collected using a self constructedquestionnai...

  17. Investigation regarding the long-term security developments in the Swedish nuclear power and the response to the accident at Fukushima

    International Nuclear Information System (INIS)

    Skaanberg, Lars

    2012-01-01

    Swedish nuclear plants need to continue to work on analysis and actions in the plants, partly to meet the demands of legislation and agreed action plans, and partly due to additional security requirements on account of experiences from the Fukushima Dai-ichi accident, stress tests, security investigations and investigations relating to physical protection. It is also essential to continue with safety improvements to gradually increase margins against unforeseen events in aging plants during long-term operation

  18. 10 CFR 712.16 - DOE security review.

    Science.gov (United States)

    2010-01-01

    ... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file... 10 Energy 4 2010-01-01 2010-01-01 false DOE security review. 712.16 Section 712.16 Energy... Program Procedures § 712.16 DOE security review. (a) A personnel security specialist will perform a...

  19. Personnel preferences in personnel planning and scheduling

    NARCIS (Netherlands)

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations

  20. Personnel Policy and Profit

    DEFF Research Database (Denmark)

    Bingley, Paul; Westergård-Nielsen, Niels Chr.

    2004-01-01

    personnel structure variation. It is found that personnel policy is strongly related to economic performance. At the margin, more hires are associated with lower profit, and more separations with higher profit. For the average firm, one new job, all else equal, is associated with ?2680 (2000 prices) lower...

  1. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  2. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  3. Automating the personnel dosimeter monitoring program

    International Nuclear Information System (INIS)

    Compston, M.W.

    1982-12-01

    The personnel dosimetry monitoring program at the Portsmouth uranium enrichment facility has been improved by using thermoluminescent dosimetry to monitor for ionizing radiation exposure, and by automating most of the operations and all of the associated information handling. A thermoluminescent dosimeter (TLD) card, worn by personnel inside security badges, stores the energy of ionizing radiation. The dosimeters are changed-out periodically and are loaded 150 cards at a time into an automated reader-processor. The resulting data is recorded and filed into a useful form by computer programming developed for this purpose

  4. Corrective Action Investigation Plan for Corrective Action Unit 365: Baneberry Contamination Area, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2010-12-01

    Corrective Action Unit 365 comprises one corrective action site (CAS), CAS 08-23-02, U-8d Contamination Area. This site is being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for the CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The site will be investigated based on the data quality objectives (DQOs) developed on July 6, 2010, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for the Baneberry site. The primary release associated with Corrective Action Unit 365 was radiological contamination from the Baneberry nuclear test. Baneberry was an underground weapons-related test that vented significant quantities of radioactive gases from a fissure located in close proximity to ground zero. A crater formed shortly after detonation, which stemmed part of the flow from the fissure. The scope of this investigation includes surface and shallow subsurface (less than 15 feet below ground surface) soils. Radionuclides from the Baneberry test with the potential to impact groundwater are included within the Underground Test Area Subproject. Investigations and corrective actions associated with the Underground Test Area Subproject include the radiological inventory resulting from the Baneberry test.

  5. 78 FR 35042 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2013-06-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0407] Merchant Marine Personnel... Labor Organization's Maritime Labour Convention, 2006.'' This meeting will be open to the public. DATES... words ``Department of Homeland Security'' and the docket number for this action. Comments received will...

  6. Molecular investigation of Staphylococcus aureus isolated from the patients, personnel, air and environment of an ICU in a hospital in Tehran.

    Science.gov (United States)

    Mirzaii, Mehdi; Emaneini, Mohammad; Jabalameli, Fereshteh; Halimi, Shahnaz; Taherikalani, Morovat

    2015-01-01

    The aim of this study was to determine the prevalence and characteristics of Staphylococcus aureus isolates from the patients, staff, air and environments of an ICU in a hospital in Tehran. During this study, 37 S. aureus isolates were collected and analyzed via the spa typing method. Of the 37 S. aureus isolates, 35 (94%) were methicillin resistant (MRSA), 28 (76%) were identified as SCCmec types III or IIIA, four (10%) were identified as SCCmec types I or IA and three (8%) were identified a SCCmec type IV. All of the MRSA isolates were resistant to oxacillin and contained mecA. The isolates were all spa typed and found to comprise 11 spa types, including t7688, t7689, and t7789, which have not previously been reported. The spa type t7688 was isolated from the hands of two ICU personnel. The spa type t7689 was observed among five isolates from the air and the environment. The spa type t7789 was observed among three isolates from the patients, ventilators and the air. The majority of the isolates (43%) belonged to spa types t030 and t037. Our results revealed that MRSA strains that were isolated from the air, the environment of the ICU and the patients who were colonized or infected with MRSA often exhibited the same spa and SCCmec types. These results also reveal that the isolates from the patients and environment were usually indistinguishable. Copyright © 2014 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  7. Training of nonlicensed personnel

    International Nuclear Information System (INIS)

    Hetrick, D.E.

    1975-01-01

    The safety and efficiency with which a station operates is a function of the competence and proficiency of all personnel. This includes the nonlicensed personnel who make up the bulk of the station staff. Thus the training of these members of the station complement is an important function in overall station performance. Standards, regulations, regulatory guides, and codes provide guidance to the training requirements for such personnel. Training needs and objectives must be established, a plan prepared and then all incorporated into a training program. A well planned and operated training program will stimulate effective communications between the different groups within the station and between the station and off site support groups

  8. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  9. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  10. ABOUT THE SPECIAL INVESTIGATIONS OF THE PROTECTION OF THE TECHNICAL SECURITY SYSTEMS AGAINST INFORMATION LEAKAGE DUE TO THE ACOUSTO-ELECTRICAL TRANSFORMATIONS

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2016-12-01

    Full Text Available None of the critically important facilities can operate without the engineered safety system. Functionally varied security networks or a fire alarm system can refer to this system as well as safety and reliability which are provided by secured energy, water and heating supply. In the process of attestation according to the requirements of information security of information objects with such technical means, it is necessary to conduct special investigations of protection against leakage of acoustic speech information through the channels of the acousto-electrical transformations (AET. There are major aspects in the data leak via AET, which currently include the following: lack of and /or obtaining legal and safety norms to regulate specified parameters; lack of the automated hardware and software system for some AET variations to carry out measurements; lack of specified safety equipment for some AET variations; lack of shelter security units; high costs of AET measurement and control units; and low measurement repeatability.

  11. Civilian Personnel: Career Management

    National Research Council Canada - National Science Library

    2001-01-01

    This revision; (1) Contains changes required by the establishment of a consolidated and realigned management structure for civilian personnel, manpower, and related functions in the Office of the Assistant Secretary of the Army...

  12. Personnel neutron dosimetry

    International Nuclear Information System (INIS)

    Hankins, D.

    1982-04-01

    This edited transcript of a presentation on personnel neutron discusses the accuracy of present dosimetry practices, requirements, calibration, dosemeter types, quality factors, operational problems, and dosimetry for a criticality accident. 32 figs

  13. Personnel dose assignment practices

    International Nuclear Information System (INIS)

    Fix, J.J.

    1993-04-01

    Implementation of DOE N 5480.6 Radiological Control Manual Article 511(3) requirements, to minimize the assignment of personnel dosimeters, should be done only under a broader context ensuring that capabilities are in place to monitor and record personnel exposure both for compliance and for potential litigation. As noted in NCRP Report No. 114, personnel dosimetry programs are conducted to meet four major objectives: radiation safety program control and evaluation; regulatory compliance; epidemiological research; and litigation. A change to Article 511(3) is proposed that would require that minimizing the assignment of personnel dosimeters take place only following full evaluation of overall capabilities (e.g., access control, area dosimetry, etc.) to meet the NCRP objectives

  14. Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Grant Evenson

    2012-05-01

    Corrective Action Unit (CAU) 550 is located in Areas 7, 8, and 10 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 550, Smoky Contamination Area, comprises 19 corrective action sites (CASs). Based on process knowledge of the releases associated with the nuclear tests and radiological survey information about the location and shape of the resulting contamination plumes, it was determined that some of the CAS releases are co-located and will be investigated as study groups. This document describes the planned investigation of the following CASs (by study group): (1) Study Group 1, Atmospheric Test - CAS 08-23-04, Atmospheric Test Site T-2C; (2) Study Group 2, Safety Experiments - CAS 08-23-03, Atmospheric Test Site T-8B - CAS 08-23-06, Atmospheric Test Site T-8A - CAS 08-23-07, Atmospheric Test Site T-8C; (3) Study Group 3, Washes - Potential stormwater migration of contaminants from CASs; (4) Study Group 4, Debris - CAS 08-01-01, Storage Tank - CAS 08-22-05, Drum - CAS 08-22-07, Drum - CAS 08-22-08, Drums (3) - CAS 08-22-09, Drum - CAS 08-24-03, Battery - CAS 08-24-04, Battery - CAS 08-24-07, Batteries (3) - CAS 08-24-08, Batteries (3) - CAS 08-26-01, Lead Bricks (200) - CAS 10-22-17, Buckets (3) - CAS 10-22-18, Gas Block/Drum - CAS 10-22-19, Drum; Stains - CAS 10-22-20, Drum - CAS 10-24-10, Battery. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed

  15. Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    Evenson, Grant

    2012-01-01

    Corrective Action Unit (CAU) 550 is located in Areas 7, 8, and 10 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 550, Smoky Contamination Area, comprises 19 corrective action sites (CASs). Based on process knowledge of the releases associated with the nuclear tests and radiological survey information about the location and shape of the resulting contamination plumes, it was determined that some of the CAS releases are co-located and will be investigated as study groups. This document describes the planned investigation of the following CASs (by study group): (1) Study Group 1, Atmospheric Test - CAS 08-23-04, Atmospheric Test Site T-2C; (2) Study Group 2, Safety Experiments - CAS 08-23-03, Atmospheric Test Site T-8B - CAS 08-23-06, Atmospheric Test Site T-8A - CAS 08-23-07, Atmospheric Test Site T-8C; (3) Study Group 3, Washes - Potential stormwater migration of contaminants from CASs; (4) Study Group 4, Debris - CAS 08-01-01, Storage Tank - CAS 08-22-05, Drum - CAS 08-22-07, Drum - CAS 08-22-08, Drums (3) - CAS 08-22-09, Drum - CAS 08-24-03, Battery - CAS 08-24-04, Battery - CAS 08-24-07, Batteries (3) - CAS 08-24-08, Batteries (3) - CAS 08-26-01, Lead Bricks (200) - CAS 10-22-17, Buckets (3) - CAS 10-22-18, Gas Block/Drum - CAS 10-22-19, Drum; Stains - CAS 10-22-20, Drum - CAS 10-24-10, Battery. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed

  16. Personnel radiation dosimetry

    International Nuclear Information System (INIS)

    1987-01-01

    The book contains the 21 technical papers presented at the Technical Committee Meeting to Elaborate Procedures and Data for the Intercomparison of Personnel Dosimeters organizaed by the IAEA on 22-26 April 1985. A separate abstract was prepared for each of these papers. A list of areas in which additional research and development work is needed and recommendations for an IAEA-sponsored intercomparison program on personnel dosimetry is also included

  17. A personnel TLD system with person identification

    International Nuclear Information System (INIS)

    Widell, C.O.

    1974-01-01

    The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)

  18. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  19. Manpower, Personnel, and Training Assessment (MPTA) Handbook

    Science.gov (United States)

    2015-11-01

    programs. 8. Target Audience Description ( TAD ) The TAD is the initial description of the number and type of personnel required to operate, maintain...requirements, etc.) describing the Soldiers operating or maintaining the system. In cases where operating a system requires a security clearance, the TAD ...Authority. Milestone Decision Authority Target Audience Description ( TAD ) AR 602-2 AR 611-1 DA Pam 611-21 X X X X X X The TAD lists

  20. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  1. Investigation of the chemical explosion of an ion exchange resin column and resulting americium contamination of personnel in the 242-Z building, August 30, 1976

    Energy Technology Data Exchange (ETDEWEB)

    1976-10-19

    As a result of an explosion in the Waste Treatment Facility, 242-Z Building, 200 West Area of the Hanford Reservation on August 30, 1976, the Manager of the Richland Operations Office (RL), Energy Research and Development Administration (ERDA), appointed an ERDA Committee to conduct a formal investigation and to prepare a report on their findings of this occurrence. The Committee was instructed to conduct the investigation in accordance with ERDAMC 0502, insofar as circumstances would permit, to cover and explain technical elements of the casual sequence(s) of the occurrence, and to describe management systems which should have or could have prevented the occurrence. This report is the result of the investigation and presents the conclusions of the review.

  2. Corrective Action Investigation Plan for Corrective Action Unit 366: Area 11 Plutonium Valley Dispersion Sites, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    Matthews, Patrick

    2011-01-01

    Corrective Action Unit 366 comprises the six corrective action sites (CASs) listed below: (1) 11-08-01, Contaminated Waste Dump No.1; (2) 11-08-02, Contaminated Waste Dump No.2; (3) 11-23-01, Radioactively Contaminated Area A; (4) 11-23-02, Radioactively Contaminated Area B; (5) 11-23-03, Radioactively Contaminated Area C; and (6) 11-23-04, Radioactively Contaminated Area D. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed July 6, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 366. The presence and nature of contamination at CAU 366 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose (TED) at sample locations to the dose-based final action level (FAL). The TED will be calculated by summing the estimates of internal and external dose. Results from the analysis of soil samples collected from sample plots will be used to calculate internal radiological dose. Thermoluminescent dosimeters placed at each sample location will be used to measure external radiological dose. Based on historical documentation of the releases

  3. Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions

    Science.gov (United States)

    Uher, J.; Harper, J.; Mennecke, R. G.; Patton, P.; Farroha, B.

    2016-05-01

    The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.

  4. Corruption in the Kenya Police Force and Impacts on Kenyan Security: Investigating the Need for Police Reforms

    Science.gov (United States)

    2017-03-21

    been using the police culture, philosophy , and organization structure in the Police Service based on the British colonial security system. Such...reflects on the police corruption that wreaks the moral authority of law enforcement; thus, undermining the public trust and confidence in the law...economic growth emphasized in the Kenya’s vision 2030. Since independence, Kenya’s security structure, philosophy , and systems have been inherited and

  5. Investigating the Process of Valuing Investments in Intangibles: A Case Study in Safety and Security in the Multinational Hotel Industry

    OpenAIRE

    Punpugdee, Nuttapon

    2005-01-01

    Safety and security have emerged as a major force driving change in the multinational hotel industry. As a problem area not well-developed in the literature but considered a crucial force influencing hotel firms' value by the multinational hotel community, safety and security provide an excellent opportunity for industry professionals and academic researchers to improve the value creation of multinational hotel firms. A research need is more urgent in the upscale sector of the industry, and t...

  6. Air Force Health Study. An Epidemiologic Investigation of Health Effects in Air Force Personnel Following Exposure to Herbicides. First Followup Examination Results. Volume 1

    Science.gov (United States)

    1987-10-01

    include actinic elastosis,,ape scars, disfigurement, excessive hair growth , and Peyronie’s disease. Severe chloracne is often accom- panied by acute...differences between the Ranch vii Hands and the Comparisons, and these differances vera not traditional indi- cators of dioxin-related disease. Both the...Investigation Dioxis* alo Sadmilfr-iis&R"Bn 05bi 40 ormang Air Force Nealta Study Morbidity * tG* 1 AI IA C8000 so *wow 4440" O*e*MV IVea =7Win ee-" * This

  7. Training of maintenance personnel

    International Nuclear Information System (INIS)

    Rabouhams, J.

    1986-01-01

    This lecture precises the method and means developed by EDF to ensure the training of maintenance personnel according to their initial educational background and their experience. The following points are treated: General organization of the training for maintenance personnel in PWR and GCR nuclear power stations and in Creys Malville fast breeder reactor; Basic nuclear training and pedagogical aids developed for this purpose; Specific training and training provided by contractors; complementary training taking into account the operation experience and feedback; Improvement of velocity, competence and safety during shut-down operations by adapted training. (orig.)

  8. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (l) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper discusses the various types of security applications that are presently being considered for the above areas and briefly describes a few examples of the application of this technology

  9. Personnel photographic film dosimetry

    International Nuclear Information System (INIS)

    Keirim-Markus, I.B.

    1981-01-01

    Technology of personnel photographic film dosimetry (PPD) based on the photographic effect of ionizing radiation is described briefly. Kinds of roentgen films used in PPD method are enumerated, compositions of a developer and fixing agents for these films are given [ru

  10. Harmonious personnel scheduling

    NARCIS (Netherlands)

    Fijn van Draat, Laurens; Post, Gerhard F.; Veltman, Bart; Winkelhuijzen, Wessel

    2006-01-01

    The area of personnel scheduling is very broad. Here we focus on the ‘shift assignment problem’. Our aim is to discuss how ORTEC HARMONY handles this planning problem. In particular we go into the structure of the optimization engine in ORTEC HARMONY, which uses techniques from genetic algorithms,

  11. Nuclear Test Personnel Review

    Science.gov (United States)

    FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak

  12. Investigating Food and Agribusiness Corporations as Global Water Security, Management and Governance Agents: The case of Nestlé, Bunge and Cargill

    Directory of Open Access Journals (Sweden)

    Suvi Sojamo

    2012-10-01

    Full Text Available This article investigates the agency of the world’s largest food and agribusiness corporations in global water security via case studies of Nestlé, Bunge and Cargill by analysing their position in the political economy of the world agro-food system and the ways they intentionally and non-intentionally manage and govern water in their value chains and wider networks of influence. The concentrated power of a few corporations in global agro-food value chains and their ability to influence the agro-food market dynamics and networks throughout the world pose asymmetric conditions for reaching not only global food security but also water security. The article will analyse the different forms of power exercised by the corporations in focus in relation to global water security and the emerging transnational water governance regime, and the extent to which their value chain position and stakeholder interaction reflect or drive their actions. Due to their vast infrastructural and technological capacity and major role in the global agro-food political economy, food and agribusiness corporations cannot avoid increasingly engaging, for endogenous and exogenous reasons, in multi-stakeholder initiatives and partnerships to devise methods of managing the agro-food value chains and markets to promote global water security. However, their asymmetric position in relation to their stakeholders demands continuous scrutiny.

  13. Investigation of mutagenic effects in personnel occupationally exposed to ionizing radiation in Brazil; Investigacao de efeitos mutagenicos em trabalhadores expostos a radiacao ionizante no Brasil

    Energy Technology Data Exchange (ETDEWEB)

    Cunha Junior, Luiz Raimundo Campos da Silva e

    2015-07-01

    Ionizing radiation (IR) are present in most of the early diagnosis of a multitude of diseases, many cancers are included, and have the characteristic of a quick and accurate diagnosis, and often cheaper. The use of this type of energy but requires specific care protection, since the IR has a characteristic of altering the genetic material through mutations. The radiology area operators in hospitals are the class of workers who are exposed more directly and thus are targets of investigations that may assist in understanding the interaction of IR with the biological material, in addition to assisting these professionals in requirement radiological protection We collected 73 samples of individuals working in various radiology departments in five hospitals in four different states in Brazil (Sao Paulo, Minas Gerais, Rio Grande do Sul and Para). The selection criteria for participation were: at least 18 years old and 2 years in the profession, not alcoholic or smoker, not taking drugs. For cytogenetic analysis were performed the comet test and micronucleus, and chromosome aberration study. This study was approved by ethics committee All the samples were compared to individuals of the same age and gender who have not gone through any kind of radiological examination in the last 6 months. When compared with the control, MN tests and AC showed a total damage, using the t test, the database and SPSS BioEstat. The comet assay showed a higher level of damage compared to controls (0.84 0,47). the average age was established and made relationship between gender and age of the participants, the more damage levels in females compared to males. Individuals aged over 45 years also showed a higher level of damage when compared with the age. A factor to be taken into consideration is that the population of Porto Alegre present a lower level of damage compared to other groups, and most likely this event due to the use of DR equipment Direct conversion. The Belo Horizonte and Ribeirao

  14. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  15. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  16. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  17. System Dynamics of Polysilicon for Solar Photovoltaics: A Framework for Investigating the Energy Security of Renewable Energy Supply Chains

    Directory of Open Access Journals (Sweden)

    Debra Sandor

    2018-01-01

    Full Text Available Renewable energy, produced with widely available low-cost energy resources, is often included as a component of national strategies to address energy security and sustainability. Market and political forces cannot disrupt the sun or wind, unlike oil and gas supplies. However, the cost of renewable energy is highly dependent on technologies manufactured through global supply chains in leading manufacturing countries. The countries that contribute to the global supply chains may take actions that, directly or indirectly, influence global access to materials and components. For example, high-purity polysilicon, a key material in solar photovoltaics, has experienced significant price fluctuations, affecting the manufacturing capacity and cost of both polysilicon and solar panels. This study developed and validated an initial system dynamics framework to gain insights into global trade in polysilicon. The model represents an initial framework for exploration. Three regions were modeled—China, the United States, and the rest of the world—for a range of trade scenarios to understand the impacts of import duties and non-price drivers on the relative volumes of imports and domestic supply. The model was validated with the historical case of China imposing an import duty on polysilicon from the United States, the European Union, and South Korea, which altered the regional flows of polysilicon—in terms of imports, exports, and domestic production—to varying degrees. As expected, the model tracked how regional demand shares and influx volumes decrease as a duty on a region increases. Using 2016 as a reference point, in the scenarios examined for U.S. exports to China, each 10% increase in the import duty results in a 40% decrease in import volume. The model also indicates that, under the scenarios investigated, once a duty has been imposed on a region, the demand share from that region declines and does not achieve pre-duty levels, even as global

  18. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  19. Modernization of personnel training

    International Nuclear Information System (INIS)

    Haferburg, M.; Rehn, H.

    1997-01-01

    Personnel training in German nuclear power plants adheres to high standards complying with government regulations. The development of PC technology allows the introduction of new training methods, e.g. computer based training (CBT), as well as their integration into existing systems. In Germany, the operators of nuclear power plants have developed their own computer based standards with a screen design, a hardware platform and an assessment standard. 25% of the theoretical training of the shift personnel is covered by CBT. The CBT-Programmes offer multimedia features: videos, photographs, sound, graphs and switching diagrams of existing systems, practice oriented simulations and 3-D animations. Interaction is the most important attribute of an efficient self-learning-programme. A typical example of such an appropriate theme is the CBT-Lesson ''Pressure Surges in Pipes and Components of Power Plants''. (author)

  20. Do Military Personnel Patent

    Science.gov (United States)

    2016-12-01

    following questions: In what fields are military personnel most likely to patent, and how do demographics, such as age, race, and gender , along with...technologies, which have transformed how the United States wages war. DARPA continues to develop new technologies and capabilities for the U.S. military today...build the European navies so it instead decided to utilize an innovative ship design to exploit a gap specific to the British Royal Navy. The six

  1. Electronic Official Personnel Folder System

    Data.gov (United States)

    US Agency for International Development — The eOPF is a digital recreation of paper personnel folder that stores electronic personnel data spanning an individual's Federal career. eOPF allows employees to...

  2. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  3. Qualification of NPP operations personnel

    International Nuclear Information System (INIS)

    Wang Jiao.

    1987-01-01

    Competence of personnel is one of the important problems for safety operation of nuclear power plant. This paper gives a description of some aspects, such as the administration of NPP, posts, competence of personnel, training, assessing the competence and personnel management

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  6. Detection of Early lung Cancer Among Military Personnel (DECAMP)

    Science.gov (United States)

    2017-10-01

    Award Number: W81XWH-11-2-0161 TITLE: Detection of Early lung Cancer Among Military Personnel (DECAMP) PRINCIPAL INVESTIGATOR: Avrum E. Spira...W81XWH-11-2-0161 Detection of Early lung Cancer Among Military Personnel (DECAMP) 5b. GRANT NUMBER W81XWH-11-2-0161 5c. PROGRAM ELEMENT NUMBER 6...biomarkers found in blood, tissues, or other bodily fluids, which may be used for the early detection of lung cancer among military personnel and

  7. Personnel ionizing radiation dosimeter

    International Nuclear Information System (INIS)

    Williams, R.A.

    1975-01-01

    A dosimeter and method for use by personnel working in an area of mixed ionizing radiation fields for measuring and/or determining the effective energy of x- and gamma radiation; beta, x-, and gamma radiation dose equivalent to the surface of the body; beta, x-, and gamma radiation dose equivalent at a depth in the body; the presence of slow neutron, fast neutron dose equivalent; and orientation of the person wearing the dosimeter to the source of radiation is disclosed. Optionally integrated into this device and method are improved means for determining neutron energy spectrum and absorbed dose from fission gamma and neutron radiation resulting from accidental criticality

  8. Personnel policy and management

    International Nuclear Information System (INIS)

    Dangelmaier, P.

    1986-01-01

    In the field of personnel policy and management two main points must be considered and fitted together: the aspects of the applicant and the aspects of the utility. The applicant wishes a position which suits to his abilities, education, training, experience and self-evaluation. The enterprise has beside these qualification criteria to look to some additional points: reliability - not only in the profession of the applicant but also in his daily life. In this examination licensing authorities are involved too; responsibility in a very broad sense and the ability to make correct decisions sometimes under stress situations. (orig.)

  9. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  10. 77 FR 11142 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-02-24

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0133] Merchant Marine Personnel... at the Hilton San Francisco Airport Bayfront Hotel, 600 Airport Blvd., Burlingame, CA 94010. For..., we are inviting public comment on the issues to be considered by the working group, which are listed...

  11. 77 FR 65570 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0968] Merchant Marine Personnel... hotel facilities or services for individuals with disabilities or to request special assistance, contact... comment on the issues to be considered by the work group, which are listed in the ``Agenda'' section below...

  12. TRIAGE of Irradiated Personnel

    Science.gov (United States)

    1996-09-25

    DISTRIBUTION/AVAILABILITY STATEMENT APUBLIC RELEASE , 13. SUPPLEMENTARY NOTES 14. ABSTRACT See Report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF...4510). Under draft STANAG 4511, multiple pro- phylactic antiemetic medications and regimens were evaluated prior to adoption of granisetron . Two drugs...exceeded the criteria (shown below), granisetron and ondansetron. The former was adopted due to a better technical profile and the operational

  13. A performance evaluation of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.; Wright, L.J.

    1987-01-01

    Personnel identity verification devices, which are based on the examination and assessment of a body feature or a unique repeatable personal action, are steadily improving. These biometric devices are becoming more practical with respect to accuracy, speed, user compatibility, reliability and cost, but more development is necessary to satisfy the varied and sometimes ill-defined future requirements of the security industry. In an attempt to maintain an awareness of the availability and the capabilities of identity verifiers for the DOE security community, Sandia Laboratories continues to comparatively evaluate the capabilities and improvements of developing devices. An evaluation of several recently available verifiers is discussed in this paper. Operating environments and procedures more typical of physical access control use can reveal performance substantially different from the basic laboratory tests

  14. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  15. Training of personnel

    International Nuclear Information System (INIS)

    1997-01-01

    Selected staffs (in the area of NPPs) are examined by the State Examining Committee established by Nuclear Regulatory Authority of the Slovak Republic (NRA SR's) chairman. The committee consists of representatives of NRA SR , Bohunice NPPs, Mochovce NPP, Research Institute of Nuclear Energy and experts from the Faculty of Electrical Engineering and Information Technology of the Slovak Technical University. The review of selected personnel of NPP V-1, V-2 and Mochovce NPP which passed exams in 1996 is given. NRA SR paid attention to the upgrading training process of individual categories of staff for V-1, V-2 and Mochovce NPPs, simulator training and training with computerized simulation system according to the United criteria of nuclear installation personnel training that started in 1992. During the year, an inspection was performed focused on examination of technical equipment of the simulator of Mochovce NPP, professional eligibility and overall preparation of simulator training including simulator software. Throughout the year launching works continued at the simulator with the deadline of commissioning to trial use operation in the first half of 1997

  16. Quo vadis, personnel monitoring

    International Nuclear Information System (INIS)

    Becker, K.

    1975-01-01

    With the increasing use of nuclear power and radiation sources, the selection of optimum systems for personnel monitoring is becoming a matter of worldwide concern. The present status of personnel dosimetry, sometimes characterized by unstable and inaccurate detectors and oversimplified interpretation of the results, leaves much to be desired. In particular, photographic film, although having certain advantages with regard to economics and information content, undergoes rapid changes in warm and humid climates. Careful sealing reduces, but does not prevent, these problems. The replacement of film by solid-state dosimeters, primarily thermoluminescence dosimeters, is in progress or being considered by an increasing number of institutions and requires a number of decisions concerning the choice of the optimum detector(s), badge design, and evaluation system; organizational matters, such as the desirability of automation and computerized bookkeeping; etc. The change also implies the potential use of such advanced concepts as different detectors and monitoring periods for the large number of low-risk persons and the small number of high-risk radiation workers. (auth)

  17. Personnel training and certification

    International Nuclear Information System (INIS)

    Whittemore, W.L.

    1976-01-01

    In order to make the full benefits of neutron radiography available in the nondestructive test (NDT) field, it has been necessary to formalize its application. A group under the Penetrating Radiation Committee of the American Society for Nondestructive Testing (ASNT) was organized to prepare a recommended practice for neutron radiography. The recommended practices require the establishment of an appropriate certification program. The requirements on the employer to establish and maintain a qualification and certification program are outlined. To conduct a program of nondestructive testing using neutron radiography requires the usual three levels of qualified and certified personnel. The program is administered by a Level III person. Routine exposure, reviews, and reporting of test results are the responsibilities of Level I and Level II personnal. The amount of training and nature of the required practical examination are also specified. The recommended practices document assures users that NDT work in the field of neutron radiography is performed by qualified personnel. Although no training courses are available to provide experience in the depth required by the recommended practices document, SNT-TC-1A, short courses are provided at a number of locations to familarize user's representatives with the interpretation of neutron radiographs and capabilities and limitations of the technique

  18. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  19. 2014 Year End Report: Center for Development of Security Excellence

    Science.gov (United States)

    2014-01-01

    Personnel Security Adjudications In August 2014, LT Tetyana Muirhead, a U.S. Navy Nurse , earned her Certificates in Security Leadership and in...website or on the CDSE YouTube channel. Personnel can watch the webinars and download associated job aids and resources. CDSE OPEN ELEARNING COURSES

  20. The security system of nuclear installations and its impact on labour law

    International Nuclear Information System (INIS)

    Daeubler, W.

    1984-01-01

    'Hazardous technologies', in particular nuclear technology, are a challenge to labour law because in these branches of industry, selection of personnel and employment conditions are completely governed by government regulations, and codetermination rights often are neutralized due to security regulations. The author investigates ways and means of reconciling the interests of security provisions on the one hand, and of codetermination rights on the other. The crucial points in this context are inevitable measures such as security screening of personnel, surveillance and physical protection measures, secrecy protection. The author discusses the difficult issue of whether there are possibilities to off-set the curtailments of the right of codetermination by new ways and means of participation by employees which ought to be offered on a higher level, i.e. on the authorities level rather than on the level of industrial plants. (HSCH) [de

  1. Privacy Act System of Records: EPA Personnel Emergency Contact Files, EPA-44

    Science.gov (United States)

    Learn about the EPA Personnel Emergency Contact Files System, including including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedure.

  2. Personnel Selection Method Based on Personnel-Job Matching

    OpenAIRE

    Li Wang; Xilin Hou; Lili Zhang

    2013-01-01

    The existing personnel selection decisions in practice are based on the evaluation of job seeker's human capital, and it may be difficult to make personnel-job matching and make each party satisfy. Therefore, this paper puts forward a new personnel selection method by consideration of bilateral matching. Starting from the employment thoughts of ¡°satisfy¡±, the satisfaction evaluation indicator system of each party are constructed. The multi-objective optimization model is given according to ...

  3. Severe accident testing of a personnel airlock

    International Nuclear Information System (INIS)

    Clauss, D.B.; Parks, M.B.; Julien, J.T.; Peters, S.W.

    1988-01-01

    Sandia National Laboratories (Sandia) is investigating the leakage potential of mechanical penetrations as part of a research program on containment integrity under severe accident loads for the U.S. Nuclear Regulatory Commission (NRC). Barnes et al. (1984) and Shackelford et al. (1985) identified leakage from personnel airlocks as an important failure mode of containments subject to severe accident loads. However, these studies were based on relatively simple analysis methods. The complex structural interaction between the door, gasket, and bulkhead in personnel airlocks makes analytical evaluation of leakage difficult. In order to provide data to validate methods for evaluating the leakage potential, a full-size personnel airlock was subject to simulated severe accident loads consisting of pressure and temperature up to 300 psig and 800 degrees F. The test was conducted at Chicago Bridge and Iron under contract to Sandia. The authors provide a detailed report on the test program

  4. Burnout among Danish prison personnel

    DEFF Research Database (Denmark)

    Andersen, Dorte Raaby; Andersen, Lars Peter; Gadegaard, Charlotte Ann

    2017-01-01

    Objectives The objective of this follow-up study was to investigate associations between individual, occupational and work environment factors and burnout among both uniformed and non-uniformed personnel working in the Danish Prison and Probation Service. Methods The participants (N = 4808......) with client contact received a questionnaire in 2010 and again in 2011. In 2010, 2843 participants responded to the questionnaire (59.1%), and in 2011, 1741 responded to the questionnaire, yielding a response rate of 61.2% of the baseline population, and 36.2% of the invited population. Burnout and work...... characteristics were measured with validated scales from the Copenhagen Psychosocial Questionnaire, and data was analysed by logistic regression. Results Risk factors with the highest impact on burnout were work environmental factors: quantitative demands, emotional demands, involvement in and meaning of work...

  5. Dental Health Status and Treatment Needs of Police Personnel of a ...

    African Journals Online (AJOL)

    Background: Oral health is an integral part of general health. Police personnel form the backbone for safety and security of a community hence their health is of utmost importance. Aim: The present study was conducted to assess the oral health status and treatment needs of police personnel employed in police stations of ...

  6. Investigating the Influence of Regional Stress on Fault and Fracture Permeability at Pahute Mesa, Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Reeves, Donald M. [Desert Research Inst. (DRI), Reno, NV (United States); Smith, Kenneth D. [Univ. of Nevada, Reno, NV (United States); Parashar, Rishi [Desert Research Inst. (DRI), Reno, NV (United States); Collins, Cheryl [Desert Research Inst. (DRI), Las Vegas, NV (United States); Heintz, Kevin M. [Desert Research Inst. (DRI), Las Vegas, NV (United States)

    2017-05-24

    Regional stress may exert considerable control on the permeability and hydraulic function (i.e., barrier to and/or conduit for fluid flow) of faults and fractures at Pahute Mesa, Nevada National Security Site (NNSS). In-situ measurements of the stress field are sparse in this area, and short period earthquake focal mechanisms are used to delineate principal horizontal stress orientations. Stress field inversion solutions to earthquake focal mechanisms indicate that Pahute Mesa is located within a transtensional faulting regime, represented by oblique slip on steeply dipping normal fault structures, with maximum horizontal stress ranging from N29°E to N63°E and average of N42°E. Average horizontal stress directions are in general agreement with large diameter borehole breakouts from Pahute Mesa analyzed in this study and with stress measurements from other locations on the NNSS.

  7. 32 CFR 634.33 - Training of law enforcement personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Training of law enforcement personnel. 634.33 Section 634.33 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.33 Training of law enforcement personnel. (a) A...

  8. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    physical protection system is not covered by such studies, since this type of detection gives no information on either the effectiveness or the reliability of the MC and A systems. A critical scenario is defined as one which leads to discrepancies involving substantial amounts of NM or for which the detection delay is long. Special care is taken when analysing these scenarios. For critical scenarios, sensitivity analysis could be made to determine the smallest quantity of NM the disappearance of which could be detected or the criteria leading to the detection of the disappearance in the control system or in the accounting system. The threats taken into account are identified with reference to the design basis threat specified by the competent authority. Both internal and external threats are taken in account. Internal threats are defined as attempts by insiders to steal quantities of nuclear material, either once or on several occasions; accumulating these quantities leads to a significant quantity of NM. External threats are defined as attempts by groups of aggressors to steal significant amounts of nuclear material. Two hypotheses are taken into account to test the ability of the physical protection system to counter threats of this type. The first is based on a small group of aggressors with limited resources and the second involves a larger team with more sophisticated resources. Of course security studies have to be carried out in compliance with the corresponding confidentiality rules. In addition, such studies have to be regularly updated, notably if significant modifications are made in the MC and A or PP systems. It is important that security studies are available in the facilities for competent personnel, as it gives the rationale behind control and protection of NM. In particular, it could be used, in a performance-based approach, to support analysis reports or to illustrate that the required level of security has been reached. (author)

  9. Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Garfinkel, Simson

    2013-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  10. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Schulte Christopher

    2011-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  11. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  12. Personnel Officers: Judging Their Qualifications.

    Science.gov (United States)

    Webb, Gisela

    1988-01-01

    Discusses the backgrounds and qualifications appropriate for a library personnel administrator, including (1) a master's degree in library science; (2) library work experience; (3) additional training in administration, personnel management, organizational development, and psychology; and (4) personal attributes such as good communication skills,…

  13. Personnel Practices for Small Colleges.

    Science.gov (United States)

    Bouchard, Ronald A.

    Personnel administration in higher education is the focus of this "hands-on, how-to-do-it" guide that provides fundamental materials for developing and maintaining a sound personnel program. Part One (Employment) examines government regulations, employee recruitment and selection, pre-employment inquiries and screening, post-employment process,…

  14. Neutron personnel dosimetry

    International Nuclear Information System (INIS)

    Griffith, R.V.

    1982-01-01

    The measurement of neutron exposures to personnel is an issue that has received increased attention in the last few years. It is important to consider key aspects of the whole dosimetry system when developing dose estimates. This begins with selection of proper dosimeters and survey instruments, and extends through the calibration methods. One must match the spectral response and sensitivity of the dosimeter to the spectral characteristics of the neutron fields. Threshold detectors that are insensitive to large fractions of neutrons in the lower energy portion of reactor spectra should be avoided. Use of two or more detectors with responses that complement each other will improve measurement quality. It is important to understand the spectral response of survey instruments, so that spectra which result in significant overresponse do not lead to overestimation of dose. Calibration sources that do not match operational field spectra can contribute to highly erroneous results. In those situations, in-field calibration techniques should be employed. Although some detection developments have been made in recent years, a lot can be done with existing technology until fully satisfactory, long term solutions are obtained

  15. Personnel dosimetry in fluoroscopy

    International Nuclear Information System (INIS)

    Baechler, S.; Gardon, M.; Bochud, F.; Sans-Merce, M.; Verdun, F.R.; Trueb, Ph.

    2006-01-01

    Physicians who frequently perform fluoroscopic examinations are exposed to high intensity radiation fields and should use protective equipment such as lead aprons, thyroid shields and lead glasses. Standard individual dosimeters are worn under the lead apron in order to measure a dose that is representative of effective dose. However, large parts of the body are not protected by the apron (e.g. arms, head). Given a protection factor for the apron of about 100, an important irradiation of a body part not under the apron could go undetected. A study was conducted to analyse this situation by measuring dose using two dosimeters, one over-apron and one under-apron, for radiologists performing frequent fluoroscopic examinations. Measurements made over six-month period show that, indeed, the use of a single under-apron dosimeter is inadequate for personnel monitoring. Large doses to the head and arms are going undetected by this technique. A method for weighting the doses measured by under- and over-apron dosimeters to obtain a value better representative of the effective dose will be proposed. (authors)

  16. Special training of shift personnel

    International Nuclear Information System (INIS)

    Martin, H.D.

    1981-01-01

    The first step of on-the-job training is practical observation phase in an operating Nuclear Plant, where the participants are assigned to shift work. The simulator training for operating personnel, for key personnel and, to some extent, also for maintenance personnel and specialists give the practical feeling for Nuclear Power Plant behaviour during normal and abnormal conditions. During the commissioning phase of the own Nuclear Power Plant, which is the most important practical training, the participants are integrated into the commissioning staff and assisted during their process of practical learning by special instructors. The preparation for the licensing exams is vitally important for shift personnel and special courses are provided after the first non-nuclear trial operation of the plant. Personnel training also includes performance of programmes and material for retraining, training of instructors and assistance in building up special training programmes and material as well as training centers. (orig./RW)

  17. Sanitation investments in Ghana: An ethnographic investigation of the role of tenure security, land ownership and livelihoods

    Directory of Open Access Journals (Sweden)

    Y. Awunyo-Akaba

    2016-07-01

    Full Text Available Abstract Background Ghana’s low investment in household sanitation is evident from the low rates of improved sanitation. This study analysed how land ownership, tenancy security and livelihood patterns are related to sanitation investments in three adjacent rural and peri-urban communities in a district close to Accra, Ghana’s capital. Methods Qualitative data was gathered for this comparative ethnographic study over seven months, (June, 2011-January, 2012 using an average of 43 (bi-weekly participant observation per community and 56 in-depth interviews. Detailed observational data from study communities were triangulated with multiple interview material and contextual knowledge on social structures, history of settlement, land use, livelihoods, and access to and perceptions about sanitation. Results This study shows that the history of settlement and land ownership issues are highly correlated with people’s willingness and ability to invest in household sanitation across all communities. The status of being a stranger i.e. migrant in the area left some populations without rights over the land they occupied and with low incentives to invest in sanitation, while indigenous communities were challenged by the increasing appropriation of their land for commercial enterprises and for governmental development projects. Interview responses suggest that increasing migrant population and the high demand for housing in the face of limited available space has resulted in general unwillingness and inability to establish private sanitation facilities in the communities. The increasing population has also created high demand for cheap accommodation, pushing tenants to accept informal tenancy agreements that provided for poor sanitation facilities. In addition, poor knowledge of tenancy rights leaves tenants in no position to demand sanitation improvements and therefore landlords feel no obligation or motivation to provide and maintain domestic

  18. Sanitation investments in Ghana: An ethnographic investigation of the role of tenure security, land ownership and livelihoods.

    Science.gov (United States)

    Awunyo-Akaba, Y; Awunyo-Akaba, J; Gyapong, M; Senah, K; Konradsen, F; Rheinländer, T

    2016-07-18

    Ghana's low investment in household sanitation is evident from the low rates of improved sanitation. This study analysed how land ownership, tenancy security and livelihood patterns are related to sanitation investments in three adjacent rural and peri-urban communities in a district close to Accra, Ghana's capital. Qualitative data was gathered for this comparative ethnographic study over seven months, (June, 2011-January, 2012) using an average of 43 (bi-weekly) participant observation per community and 56 in-depth interviews. Detailed observational data from study communities were triangulated with multiple interview material and contextual knowledge on social structures, history of settlement, land use, livelihoods, and access to and perceptions about sanitation. This study shows that the history of settlement and land ownership issues are highly correlated with people's willingness and ability to invest in household sanitation across all communities. The status of being a stranger i.e. migrant in the area left some populations without rights over the land they occupied and with low incentives to invest in sanitation, while indigenous communities were challenged by the increasing appropriation of their land for commercial enterprises and for governmental development projects. Interview responses suggest that increasing migrant population and the high demand for housing in the face of limited available space has resulted in general unwillingness and inability to establish private sanitation facilities in the communities. The increasing population has also created high demand for cheap accommodation, pushing tenants to accept informal tenancy agreements that provided for poor sanitation facilities. In addition, poor knowledge of tenancy rights leaves tenants in no position to demand sanitation improvements and therefore landlords feel no obligation or motivation to provide and maintain domestic sanitation facilities. The study states that poor land rights, the

  19. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ

    International Nuclear Information System (INIS)

    Ruiz J, A.

    1999-01-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  20. An Investigation of the Security of Caregiver Attachment during Middle Childhood in Children with High-Functioning Autistic Disorder

    Science.gov (United States)

    Chandler, Felicity; Dissanayake, Cheryl

    2014-01-01

    Previous research has investigated caregiver attachment relationships in children with autism during early childhood, with few differences found from matched control groups. However, little is known of this relationship during middle childhood (ages 8-12 years). In this study, the aim was to establish whether there are differences in the security…

  1. Corrective Action Investigation Plan for Corrective Action Unit 541: Small Boy Nevada National Security Site and Nevada Test and Training Range, Nevada with ROTC 1

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-09-01

    Corrective Action Unit (CAU) 541 is co-located on the boundary of Area 5 of the Nevada National Security Site and Range 65C of the Nevada Test and Training Range, approximately 65 miles northwest of Las Vegas, Nevada. CAU 541 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 541, which comprises the following corrective action sites (CASs): 05-23-04, Atmospheric Tests (6) - BFa Site; 05-45-03, Atmospheric Test Site - Small Boy. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on April 1, 2014, by representatives of the Nevada Division of Environmental Protection; U.S. Air Force; and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 541. The site investigation process also will be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CASs 05-23-04 and 05-45-03 are from nuclear testing activities conducted at the Atmospheric Tests (6) - BFa Site and Atmospheric Test Site - Small Boy sites. The presence and nature of

  2. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  3. Personnel Risks in Ensuring Safety of Medical Activity

    Directory of Open Access Journals (Sweden)

    O. L. Zadvornaya

    2017-01-01

    Full Text Available Purpose: modern strategies of management of the organization require the formation of special management approaches based on the analysis of the mechanisms and processes of the organization of medical activities related to possible risks in activity of medical personnel. Based on international experience and own research the authors have identified features of a system of management of personnel risk in medical activities, examined approaches showing the sequence and contents of the main practical activities of the formation, maintenance and development of the system of management of personnel risks. Emphasized is the need for further research and implementation of the system of management of personnel risk in health care organizations. Study and assessment of personnel risks affecting the security of medical activities aimed at the development of the system of personnel risk management, development of a system of identification and monitoring of HR risk indicators with a purpose to improve institutional management and increase efficiency of activity of medical organizations. Methods: in the present study, the following methods were used: systemic approach, content analysis, methods of social diagnosis (questionnaires, interviews, comparative analysis, method of expert evaluations, method of statistical processing of information. Results: approaches to predict the occurrence and development of personnel risks have been reviewed and proposed. Conclusions and Relevance: patient safety is a global issue affecting countries at all levels of development. Each year, the WHO identifies a number of systemic and technical aspects and trends in the field of patient safety related to actions of medical workers. Existing imbalances in the staffing of the health system of the Russian Federation increase the probability of potential risks in medical practice. The personnel policy of healthcare of the Russian Federation requires further improvement and

  4. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  5. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  6. Corrective Action Investigation Plan for Corrective Action Unit 576: Miscellaneous Radiological Sites and Debris Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro, Las Vegas, NV (United States)

    2016-12-01

    Corrective Action Unit (CAU) 576 is located in Areas 2, 3, 5, 8, and 9 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 576 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 576, which comprises the following corrective action sites (CASs): 00-99-01, Potential Source Material; 02-99-12, U-2af (Kennebec) Surface Rad-Chem Piping; 03-99-20, Area 3 Subsurface Rad-Chem Piping; 05-19-04, Frenchman Flat Rad Waste Dump ; 09-99-08, U-9x (Allegheny) Subsurface Rad-Chem Piping; 09-99-09, U-9its u24 (Avens-Alkermes) Surface Contaminated Flex Line These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document (CADD).

  7. Cyberculture and Personnel Security: Report 1 - Orientation, Concerns, and Needs

    Science.gov (United States)

    2011-05-01

    criteria for Internet addiction. Cyber Psychology and Behavior, 4, 377-383. Bender, B. (2010). Pentagon workers tied to child porn . Retrieved July 30...C. (2007). Virtual child porn riles law enforcement. Retrieved July 29, 2010, from http://abcnews.go.com/TheLaw/story?id=3159871 Frontline. (2009...blackmail girl for porn . PC World. Retrieved February 4, 2011, from http://www.pcworld.com/article/218582/Man_Used_Facebook_to_Try_to_Bl

  8. Ensuring Successful Personnel Management in the Department of Homeland Security

    Science.gov (United States)

    2002-01-01

    of Public- Private Sector Wages Allowing for Endogenous Choices of Both Government and Union Status,” Journal of Labor Economics , Vol. 6, 1988...Differential in the United States,” Journal of Labor Economics , Vol. 8, No. 2, 1990. Rosenthal, Douglas, Margaret Barton, Douglas Reynolds, and Beverly Dugan

  9. Personnel Security during Joint Operations with Foreign Military Forces

    Science.gov (United States)

    2013-08-01

    century society into the twenty-first century encounters a number of obstacles. Illiteracy and innumeracy rates are high, and repressive social values are...force of more than 4,500 British soldiers dispatched by the governor of India . Shortly thereafter, British imperialism prompted two more Anglo-Afghan...socialist change on a traditional society, in part by redistributing land and bringing more women into government. The at- tempt at rapid modernization

  10. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... section of the economy; productivity; competition; jobs; the environment; public health or safety; or..., religion, sex, national origin, disability, or sexual orientation, and no inference may be raised solely on the basis of an individual's sexual orientation. (f) Discretionary judgments that determine...

  11. Some problems of NPP personnel training

    International Nuclear Information System (INIS)

    Vajshnis, P.P.; Kumkov, L.P.; Omel'chuk, V.V.

    1984-01-01

    Shortcomings of NPP personnel training are discussed. Development of full-scale training systems is necessary for qualitative training operative personnel. Primary problems that should be necessarily solved for ensuring effective training NPP personnel are considered

  12. Energy Requirements of Military Personnel

    National Research Council Canada - National Science Library

    Tharion, William J; Lieberman, Harris R; Montain, Scott J; Young, Andrew J; Baker-Fulco, Carol J

    2005-01-01

    ...) have been measured while training under various conditions. Group mean total energy expenditures for 424 male military personnel from various units engaged in diverse missions ranged from 13.0 to 29.8 MJ per day...

  13. Individual protection of NPP personnel

    International Nuclear Information System (INIS)

    Koshcheev, V.S.; Gol'dshtejn, D.S.; Chetverikova, Z.S.

    1983-01-01

    Specific features of NPP personnel individual protection are considered, mainly with respect to maintenance and repair works on various type reactors. The major concern is given to the selection and application reglamentations of the individual protection system (IPS), employment of sanitary locks, the organization of individual protection under the conditions of a heating microclimate. The ways are specified to the development and introduction of the most effective IPS and improvement of the entire NPP personnel individual protection system with respect to providing the necessary protection effect for maintaining high working capability of the personnel and minimizing the IPS impact on human organism functional systems. The accumulated experience in the personnel individual protection can be applied during construction and operation of NPP's in CMEA member-countries [ru

  14. Personnel monitoring in geologic fields

    International Nuclear Information System (INIS)

    Romanova, I.N.; Seredin, Yu.V.

    1981-01-01

    State of radiation safety for the personnel of geologic crews carrying out neutron logging of wells using Po-Be sources has been evaluated. Given are results of development of methods for the evaluation of individual radiation loads for personnel when working with Po-Be neutron sources useful for the application in practice by a geologic logging crew as well as a quantitative evaluation of profissional radiation loads during this kind of work. The following methods are recommended for personnel monitoring: 1) calculation of whole-body irradiation doses and hands from averaged values of radiation dose rate; 2) calculational tabulated determination of irradiation doses during recharging of shanks of well instruments. Personnel monitoring by means of instrumental methods is not necessary in the considered case [ru

  15. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  16. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  17. Personnel external dose monitoring system

    International Nuclear Information System (INIS)

    Zhao Hengyuan

    1989-01-01

    The status and trend of personnel external dose monitoring system are introduced briefly. Their characteristics, functions and TLD bedges of some commercially available automatic TLD system, including UD-710A (Matsushita, Japan), Harshaw-2271, 2276 (Harshaw, USA), Harshaw-8000 (Harshaw/Filtrol), Studsvik-1313 (Sweden) and Pitman-800 (UK) were depicted in detail. Finally, personnel dose management and record keeping system were presented and two examples were given

  18. THEORETICAL BASIS FOR MANAGEMENT OF PERSONNEL RISKS

    OpenAIRE

    Haliashova, Katsiaryna

    2017-01-01

    Necessity of personnel risks management is based on research results. The authors' approaches to the determination of personnel risks and to their management have been explored. The author's definition of the concept of "personnel risks" is proposed. A classification of personnel risks is developed depending on the stage of origin and the tasks of the personnel policy, as well as the methods of management personnel risks in the organization. The article presents a methodical approach to perso...

  19. Do Job Security Guarantees Work?

    OpenAIRE

    Alex Bryson; Lorenzo Cappellari; Claudio Lucifora

    2004-01-01

    We investigate the effect of employer job security guarantees on employee perceptions of job security. Using linked employer-employee data from the 1998 British Workplace Employee Relations Survey, we find job security guarantees reduce employee perceptions of job insecurity. This finding is robust to endogenous selection of job security guarantees by employers engaging in organisational change and workforce reductions. Furthermore, there is no evidence that increased job security through job...

  20. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  1. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  2. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  3. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  4. Stress, Sleep and Depressive Symptoms in Active Duty Military Personnel.

    Science.gov (United States)

    Chou, Han-Wei; Tzeng, Wen-Chii; Chou, Yu-Ching; Yeh, Hui-Wen; Chang, Hsin-An; Kao, Yu-Chen; Huang, San-Yuan; Yeh, Chin-Bin; Chiang, Wei-Shan; Tzeng, Nian-Sheng

    2016-08-01

    The military is a unique occupational group and, because of this, military personnel face different kinds of stress than civilian populations. Sleep problems are an example. The purpose of this study was to investigate the relationship between sleep problems, depression level and coping strategies among military personnel. In this cross-sectional study, military personnel completed the Beck Depression Inventory, the Pittsburgh Sleep Quality Index and the Jalowiec Coping Scale. An evaluation of the test scores showed that officers had better sleep quality and fewer depressive symptoms than enlisted personnel. Military personnel with higher educational levels and less physical illness also had fewer depressive symptoms. Officers and noncommissioned officers preferred problem-focused strategies. Those with higher Beck Depression Inventory and Pittsburgh Sleep Quality Index scores and those who drank alcohol frequently preferred affective-focused strategies. Our results revealed that sleep quality, physical illness and alcohol consumption were associated with the mental health of military personnel. Treating these factors may improve the mental health of military personnel and enhance effective coping strategies. Copyright © 2016 Southern Society for Clinical Investigation. Published by Elsevier Inc. All rights reserved.

  5. The WINS Academy Security Certification Programme: The Route to Demonstrable Competence

    International Nuclear Information System (INIS)

    Howsley, Roger

    2014-01-01

    Key Messages: The Nuclear Sector is a long way behind other sectors in certifying personnel with security accountabilities as being competent; We need to do something about it urgently; Attending security awareness courses is simply not enough

  6. Corrective Action Investigation Plan for Corrective Action Unit 105: Area 2 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-09-01

    Corrective Action Unit (CAU) 105 is located in Area 2 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 105 is a geographical grouping of sites where there has been a suspected release of contamination associated with atmospheric nuclear testing. This document describes the planned investigation of CAU 105, which comprises the following corrective action sites (CASs): • 02-23-04, Atmospheric Test Site - Whitney • 02-23-05, Atmospheric Test Site T-2A • 02-23-06, Atmospheric Test Site T-2B • 02-23-08, Atmospheric Test Site T-2 • 02-23-09, Atmospheric Test Site - Turk These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 105. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with all CAU 105 CASs are from atmospheric nuclear testing activities. The presence and nature of contamination at CAU

  7. Military personnel recognition system using texture, colour, and SURF features

    Science.gov (United States)

    Irhebhude, Martins E.; Edirisinghe, Eran A.

    2014-06-01

    This paper presents an automatic, machine vision based, military personnel identification and classification system. Classification is done using a Support Vector Machine (SVM) on sets of Army, Air Force and Navy camouflage uniform personnel datasets. In the proposed system, the arm of service of personnel is recognised by the camouflage of a persons uniform, type of cap and the type of badge/logo. The detailed analysis done include; camouflage cap and plain cap differentiation using gray level co-occurrence matrix (GLCM) texture feature; classification on Army, Air Force and Navy camouflaged uniforms using GLCM texture and colour histogram bin features; plain cap badge classification into Army, Air Force and Navy using Speed Up Robust Feature (SURF). The proposed method recognised camouflage personnel arm of service on sets of data retrieved from google images and selected military websites. Correlation-based Feature Selection (CFS) was used to improve recognition and reduce dimensionality, thereby speeding the classification process. With this method success rates recorded during the analysis include 93.8% for camouflage appearance category, 100%, 90% and 100% rates of plain cap and camouflage cap categories for Army, Air Force and Navy categories, respectively. Accurate recognition was recorded using SURF for the plain cap badge category. Substantial analysis has been carried out and results prove that the proposed method can correctly classify military personnel into various arms of service. We show that the proposed method can be integrated into a face recognition system, which will recognise personnel in addition to determining the arm of service which the personnel belong. Such a system can be used to enhance the security of a military base or facility.

  8. Review of Private Sector Personnel Screening Practices

    Science.gov (United States)

    2000-10-01

    private sector investigative sources or methods would be useful to the DoD for conducting national security background investigations. The federal government by and large examines more sources and conducts more thorough investigations than industry. In general, private employers (1) have less access to information about applicants...outsource many elements of background checks. It is recommended that the DoD periodically evaluate private sector screening programs and data sources in order to monitor

  9. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  10. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  11. Corrective Action Investigation Plan for Corrective Action Unit 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada, with ROTC 1 Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick K.

    2013-07-01

    Corrective Action Unit (CAU) 567 is located in Areas 1, 3, 5, 20, and 25 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 567 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 567, which comprises the following corrective action sites (CASs): • 01-23-03, Atmospheric Test Site T-1 • 03-23-25, Seaweed E Contamination Area • 05-23-07, A5b RMA • 20-23-08, Colby Mud Spill • 25-23-23, J-11 Soil RMA These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on May 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 567. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 567 releases are nuclear test operations and other NNSS operations. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary

  12. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1994-03-01

    This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately, develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI

  13. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    This Remedial Investigation (RI) Work Plan specifically addresses Chestnut Ridge Operable Unit 1, (OU1) which consists of the Chestnut Ridge Security Pits (CRSP). The CRSP are located {approximately}800 ft southeast of the central portion of the Y-12 Plant atop Chestnut Ridge, which is bounded to the northwest by Bear Creek Valley and to the southeast by Bethel Valley. Operated from 1973 to 1988, the CRSP consisted of a series of trenches used for the disposal of classified hazardous and nonhazardous waste materials. Disposal of hazardous waste materials was discontinued in December 1984, while nonhazardous waste disposal ended on November 8, 1988. An RI is being conducted at this site in response to CERCLA regulations. The overall objectives of the RI are to collect data necessary to evaluate the nature and extent of contaminants of concern (COC), support an ecological risk assessment (ERA) and a human health risk assessment (HHRA), support the evaluation of remedial alternatives, and ultimately develop a Record of Decision for the site. The purpose of this Work Plan is to outline RI activities necessary to define the nature and extent of suspected contaminants at Chestnut Ridge OU1. Potential migration pathways also will be investigated. Data collected during the RI will be used to evaluate the overall risk posed to human health and the environment by OU1.

  14. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    1994-03-01

    This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately, develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI.

  15. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1993-09-01

    This Remedial Investigation (RI) Work Plan specifically addresses Chestnut Ridge Operable Unit 1, (OU1) which consists of the Chestnut Ridge Security Pits (CRSP). The CRSP are located ∼800 ft southeast of the central portion of the Y-12 Plant atop Chestnut Ridge, which is bounded to the northwest by Bear Creek Valley and to the southeast by Bethel Valley. Operated from 1973 to 1988, the CRSP consisted of a series of trenches used for the disposal of classified hazardous and nonhazardous waste materials. Disposal of hazardous waste materials was discontinued in December 1984, while nonhazardous waste disposal ended on November 8, 1988. An RI is being conducted at this site in response to CERCLA regulations. The overall objectives of the RI are to collect data necessary to evaluate the nature and extent of contaminants of concern (COC), support an ecological risk assessment (ERA) and a human health risk assessment (HHRA), support the evaluation of remedial alternatives, and ultimately develop a Record of Decision for the site. The purpose of this Work Plan is to outline RI activities necessary to define the nature and extent of suspected contaminants at Chestnut Ridge OU1. Potential migration pathways also will be investigated. Data collected during the RI will be used to evaluate the overall risk posed to human health and the environment by OU1

  16. Corrective Action Investigation Plan for Corrective Action Unit 571: Area 9 Yucca Flat Plutonium Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Bernadine; Matthews, Patrick

    2013-07-01

    CAU 571 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 571, which comprises the following corrective action sites (CASs): • 09-23-03, Atmospheric Test Site S-9F • 09-23-04, Atmospheric Test Site T9-C • 09-23-12, Atmospheric Test Site S-9E • 09-23-13, Atmospheric Test Site T-9D • 09-45-01, Windrows Crater These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on March 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (now the Nevada Field Office). The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 571. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 571 CASs are from nuclear testing activities. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary exceeds the final action level (FAL) and requires corrective action. The presence and nature of contamination outside the default

  17. Corrective Action Investigation Plan for Corrective Action Unit 569: Area 3 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews; Christy Sloop

    2012-02-01

    Corrective Action Unit (CAU) 569 is located in Area 3 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. Corrective Action Unit 569 comprises the nine numbered corrective action sites (CASs) and one newly identified site listed below: (1) 03-23-09, T-3 Contamination Area (hereafter referred to as Annie, Franklin, George, and Moth); (2) 03-23-10, T-3A Contamination Area (hereafter referred to as Harry and Hornet); (3) 03-23-11, T-3B Contamination Area (hereafter referred to as Fizeau); (4) 03-23-12, T-3S Contamination Area (hereafter referred to as Rio Arriba); (5) 03-23-13, T-3T Contamination Area (hereafter referred to as Catron); (6) 03-23-14, T-3V Contamination Area (hereafter referred to as Humboldt); (7) 03-23-15, S-3G Contamination Area (hereafter referred to as Coulomb-B); (8) 03-23-16, S-3H Contamination Area (hereafter referred to as Coulomb-A); (9) 03-23-21, Pike Contamination Area (hereafter referred to as Pike); and (10) Waste Consolidation Site 3A. Because CAU 569 is a complicated site containing many types of releases, it was agreed during the data quality objectives (DQO) process that these sites will be grouped. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the DQOs developed on September 26, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO

  18. Training of research reactor personnel

    International Nuclear Information System (INIS)

    Cherruau, F.

    1980-01-01

    Research reactor personnel operate the reactor and carry out the experiments. These two types of work entail different activities, and therefore different skills and competence, the number of relevant staff being basically a function of the size, complexity and versatility of the reactor. Training problems are often reactor-specific, but the present paper considers them from three different viewpoints: the training or retraining of new staff or of personnel already employed at an existing facility, and training of personnel responsible for the start-up and operation of a new reactor, according to whether local infrastructure and experience already exist or whether they have to be built up from scratch. On-the-spot experience seems to be an essential basis for sound training, but requires teaching abilities and aids often difficult to bring together, and the availability of instructors that does not always fit in smoothly with current operational and experimental tasks. (author)

  19. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  20. Personnel Management theories and applications

    Institute of Scientific and Technical Information of China (English)

    Yanni Feng

    2010-01-01

    @@ 1.Introduction Many new businesses are opened in the whole world every day.Unfortunately,only a minor part of them has success and continues its activity.There is a variety of reasons which determine the hankruptcy of companies.Most of them are included in running a business,and more and more people come to realize the significance of management,especially personnel management,as personnel represents the relationship between people in the company,which is a key point for the development of enterprise.

  1. Market Reactions to Publicly Announced Privacy and Security Breaches Suffered by Companies Listed on the United States Stock Exchanges: A Comparative Empirical Investigation

    Science.gov (United States)

    Coronado, Adolfo S.

    2012-01-01

    Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.…

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  3. Ethnic Minority Personnel Careers: Hindrances and Hopes

    OpenAIRE

    Ross, Catharine

    2004-01-01

    Personnel departments often have particular responsibility for equal opportunities within their organizations. This paper explores equal opportunities within personnel departments themselves, in relation to the careers of ethnic minority personnel practitioners. Through primary research, it identifies a range of criteria which can affect personnel careers, of which ethnic origin is often one. However, although being categorized as of ethnic minority origin often hinders personnel careers, the...

  4. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  5. Corrective Action Investigation Plan for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-08-01

    CAU 570 comprises the following six corrective action sites (CASs): • 02-23-07, Atmospheric Test Site - Tesla • 09-23-10, Atmospheric Test Site T-9 • 09-23-11, Atmospheric Test Site S-9G • 09-23-14, Atmospheric Test Site - Rushmore • 09-23-15, Eagle Contamination Area • 09-99-01, Atmospheric Test Site B-9A These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 570. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The presence and nature of contamination at CAU 570 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose at sample locations to the dose-based final action level. The total effective dose will be calculated as the total of separate estimates of internal and external dose. Results from the analysis of soil samples will be used to calculate internal radiological

  6. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  7. development of an integrated campus security alerting system

    African Journals Online (AJOL)

    user

    Keywords: Campus Security, Microcontroller, Internet Protocol Camera, Integrated system, Micro-switches. 1. INTRODUCTION .... personnel can fall back to the information captured/stored ...... Adetoba A. O. "Design and Construction of a Car.

  8. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  9. 32 CFR 552.109 - Routine security controls.

    Science.gov (United States)

    2010-07-01

    ..., dependent, or DoD civilian identification cards are authorized unimpeded access to Fort Lewis during periods... who desire to visit unit areas, club facilities and other recreational facilities, security personnel...

  10. ILO Policy Guidelines on the promotion of decent work for early childhood education personnel

    OpenAIRE

    ILO International Labour Office

    2014-01-01

    These Guidelines set out principles for the promotion of decent work for early childhood education (ECE) personnel as a means of ensuring universal access to high-quality ECE services. In this respect they cover conditions of work and employment of ECE personnel and related issues, including ECE financing, curricula and learning practices, social security, professional ethics and ECE governance systems. The Guidelines are meant to serve as a reference tool on principles that should be reflect...

  11. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  12. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Schulte Christopher

    2011-12-01

    Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (cschulte@lucidatainc.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review

  13. Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Simson Garfinkel

    2013-12-01

    Full Text Available Hoog, A., and Strzempka, K. (2011.  iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Syngress, Elsevier, xv + 310 pages; ISBN-10: 1597496596; ISBN-13: 978-1597496599, $69.95Reviewed by Simson Garfinkel, Naval Postgraduate SchoolIn April 2011 news outlets around the world revealed shocking news about Apple’s iPhone: for reasons that were not apparently clear, every iPhone contained a small SQLite database that logged where and when the user had been whenever the phone was turned on, and those records went back for pretty much as long as the user had owned their phone. Apple eventually declared that the data cache was the result of a bug and issued a software update to prune the database (it had previously grown without limit. Privacy activists rejoiced that their beloved iPhones were once again trustworthy. But forensics examiners just shook their heads: many had known about the iPhone’s tracking capabilities for more than a year and had kept quiet. They had made good use of that data. Apple’s pro-privacy patch was actually a setback for law enforcement.(see PDF for full review

  14. Security in the nuclear medicine department

    International Nuclear Information System (INIS)

    Bassingham, S.; Gane, J.; Chan, P.S.; Heenan, S.; Gulliver, N.; McVey, J.

    2005-01-01

    The current threat from terrorism highlights the need for awareness of adequate security of radioactive sources by health bodies to prevent the opportunistic access to, theft of. or accidental loss of sources, together with stringent security measures in place to prevent the international misuse of radioactive sources as a weapon by unauthorised access. This presentation discusses the processes undertaken to ensure the safety and security of radioactive materials within the nuclear medicine department in line with current regulations and guidelines. These include risk assessments, security systems, audit trails, restricted access and personnel background checks

  15. Study of personnel monitoring programs

    International Nuclear Information System (INIS)

    Guerra, Aline B.; Lorenzini, Fabiane; Carlos, Janaina; Bernasiuk, Maria E.B.; Rizzatti, Mara R.; Fuentefria, Jose L.B.

    1996-01-01

    Surveillance of several health institutions who use ionizing radiation sources, as well as data from the state of Rio Grande do Sul (Brazil) are studied concerning the use of personnel dosimeters. The results show that several institutions do not provide them and those which provide do not know how to use them

  16. Rights & Responsibilities. Personnel Management Module.

    Science.gov (United States)

    Barker, Gale; And Others

    This module on rights and responsibilities is intended to introduce the hospitality manager or supervisor to sound personnel management practices that comply with the law. The material is presented in a self-instructional format in seven sections. At the beginning of each section is a statement of the objectives that will be achieved as a result…

  17. Personnel monitoring for beta rays

    International Nuclear Information System (INIS)

    Piesch, E.; Johns, T.F.

    1983-01-01

    The practical considerations which have to be taken into account in the design of personnel monitors intended to measure doses resulting from exposure to beta rays are discussed. These include the measurement of doses in situations involving either fairly uniform or non-uniform irradiation and of doses to the male gonads. (UK)

  18. Project Management Personnel Competencies Evaluation

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2006-01-01

    Full Text Available An important factor for the success management of IT projects is the human resource. People involved in the project management process have to be evaluated. In order to do that, same criteria has to be specified. This paper describes some aspects regarding the personnel evaluation.

  19. Corrective Action Investigation Plan for Corrective Action Unit 366: Area 11 Plutonium Valley Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-09-01

    Corrective Action Unit 366 comprises the six corrective action sites (CASs) listed below: (1) 11-08-01, Contaminated Waste Dump No.1; (2) 11-08-02, Contaminated Waste Dump No.2; (3) 11-23-01, Radioactively Contaminated Area A; (4) 11-23-02, Radioactively Contaminated Area B; (5) 11-23-03, Radioactively Contaminated Area C; and (6) 11-23-04, Radioactively Contaminated Area D. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed July 6, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 366. The presence and nature of contamination at CAU 366 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose (TED) at sample locations to the dose-based final action level (FAL). The TED will be calculated by summing the estimates of internal and external dose. Results from the analysis of soil samples collected from sample plots will be used to calculate internal radiological dose. Thermoluminescent dosimeters placed at each sample location will be used to measure external radiological dose. Based on historical documentation of the releases

  20. 78 FR 37244 - Submission for Review: We Need Important Information About Your Eligibility for Social Security...

    Science.gov (United States)

    2013-06-20

    ... Important Information About Your Eligibility for Social Security Disability Benefits, RI 98-7. As required... Personnel Management. Title: We Need Important Information About Your Eligibility for Social Security... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need Important Information About Your...

  1. Safeguards through secure automated fabrication

    International Nuclear Information System (INIS)

    DeMerschman, A.W.; Carlson, R.L.

    1982-01-01

    Westinghouse Hanford Company, a prime contractor for the U.S. Department of Energy, is constructing the Secure Automated Fabrication (SAF) line for fabrication of mixed oxide breeder fuel pins. Fuel processing by automation, which provides a separation of personnel from fuel handling, will provide a means whereby advanced safeguards concepts will be introduced. Remote operations and the inter-tie between the process computer and the safeguards computer are discussed

  2. Corrective Action Investigation Plan for Corrective Action Unit 104: Area 7 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-08-01

    CAU 104 comprises the 15 CASs listed below: (1) 07-23-03, Atmospheric Test Site T-7C; (2) 07-23-04, Atmospheric Test Site T7-1; (3) 07-23-05, Atmospheric Test Site; (4) 07-23-06, Atmospheric Test Site T7-5a; (5) 07-23-07, Atmospheric Test Site - Dog (T-S); (6) 07-23-08, Atmospheric Test Site - Baker (T-S); (7) 07-23-09, Atmospheric Test Site - Charlie (T-S); (8) 07-23-10, Atmospheric Test Site - Dixie; (9) 07-23-11, Atmospheric Test Site - Dixie; (10) 07-23-12, Atmospheric Test Site - Charlie (Bus); (11) 07-23-13, Atmospheric Test Site - Baker (Buster); (12) 07-23-14, Atmospheric Test Site - Ruth; (13) 07-23-15, Atmospheric Test Site T7-4; (14) 07-23-16, Atmospheric Test Site B7-b; (15) 07-23-17, Atmospheric Test Site - Climax These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 28, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 104. The releases at CAU 104 consist of surface-deposited radionuclides from 30 atmospheric nuclear tests. The presence and nature of contamination at CAU 104 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison

  3. Study on Maintenance Personnel Development Plan For The Exported APR1400 Commissioning

    International Nuclear Information System (INIS)

    Cho, Sungbae; Kim, Jongdae; Jun, Hokwang; Hwang, Inok; Kang, Jaeyuel

    2012-01-01

    This paper indicates ways to develop maintenance personnel for the exported APR1400 commissioning. The exported APR1400 has not been experienced ay maintenance yet, and requirements for maintenance personnel have not been clarified yet. Based on sound maintenance experience, KEPCO Plant Service and Engineering Company (KEPCO KPS) has studied on maintenance training and career requirement to establish a development plan of the maintenance personnel for the exported nuclear power plant. By defining manpower and training requirement, and mobilization plan, we expect to secure reliability of the exported APR1400

  4. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  5. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  6. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  7. Implementation of a personnel reliability program as a facilitator of biosafety and biosecurity culture in BSL-3 and BSL-4 laboratories.

    Science.gov (United States)

    Higgins, Jacki J; Weaver, Patrick; Fitch, J Patrick; Johnson, Barbara; Pearl, R Marene

    2013-06-01

    In late 2010, the National Biodefense Analysis and Countermeasures Center (NBACC) implemented a Personnel Reliability Program (PRP) with the goal of enabling active participation by its staff to drive and improve the biosafety and biosecurity culture at the organization. A philosophical keystone for accomplishment of NBACC's scientific mission is simultaneous excellence in operations and outreach. Its personnel reliability program builds on this approach to: (1) enable and support a culture of responsibility based on human performance principles, (2) maintain compliance with regulations, and (3) address the risk associated with the insider threat. Recently, the Code of Federal Regulations (CFR) governing use and possession of biological select agents and toxins (BSAT) was amended to require a pre-access suitability assessment and ongoing evaluation for staff accessing Tier 1 BSAT. These 2 new requirements are in addition to the already required Federal Bureau of Investigation (FBI) Security Risk Assessment (SRA). Two years prior to the release of these guidelines, NBACC developed its PRP to supplement the SRA requirement as a means to empower personnel and foster an operational environment where any and all work with BSAT is conducted in a safe, secure, and reliable manner.

  8. Essential themes in Personnel economics

    OpenAIRE

    Josheski, Dushko

    2014-01-01

    In this paper are presented essential themes in the subject of personnel economics. In the first part analysis has been conducted on the impact of peer pressure on workplace behaviour. Then again models for compensation structures within firms, and their influence on the utility of work by employees. In the final section of the paper the productivity spillover effect has been analyzed, and the causes of existence of spillovers and their impact on workers’ productivity

  9. Modern methods of personnel dosimetry

    International Nuclear Information System (INIS)

    Kraus, W.; Herrmann, D.; Kiesewetter, W.

    The physical properties of radiation detectors for personnel dosimetry are described and compared. The suitability of different types of dosimeters for operational and central monitoring of normal occupational exposure, for accident and catastrophe dosimetry and for background and space-flight dosimetry is discussed. The difficulties in interpreting the dosimeter reading with respect to the dose in individual body organs are discussed briefly. 430 literature citations (up to Spring 1966) are given

  10. The LHC personnel safety system

    International Nuclear Information System (INIS)

    Ninin, P.; Valentini, F.; Ladzinski, T.

    2011-01-01

    Large particle physics installations such as the CERN Large Hadron Collider require specific Personnel Safety Systems (PSS) to protect the personnel against the radiological and industrial hazards. In order to fulfill the French regulation in matter of nuclear installations, the principles of IEC 61508 and IEC 61513 standard are used as a methodology framework to evaluate the criticality of the installation, to design and to implement the PSS.The LHC PSS deals with the implementation of all physical barriers, access controls and interlock devices around the 27 km of underground tunnel, service zones and experimental caverns of the LHC. The system shall guarantee the absence of personnel in the LHC controlled areas during the machine operations and, on the other hand, ensure the automatic accelerator shutdown in case of any safety condition violation, such as an intrusion during beam circulation. The LHC PSS has been conceived as two separate and independent systems: the LHC Access Control System (LACS) and the LHC Access Safety System (LASS). The LACS, using off the shelf technologies, realizes all physical barriers and regulates all accesses to the underground areas by identifying users and checking their authorizations.The LASS has been designed according to the principles of the IEC 61508 and 61513 standards, starting from a risk analysis conducted on the LHC facility equipped with a standard access control system. It consists in a set of safety functions realized by a dedicated fail-safe and redundant hardware guaranteed to be of SIL3 class. The integration of various technologies combining electronics, sensors, video and operational procedures adopted to establish an efficient personnel safety system for the CERN LHC accelerator is presented in this paper. (authors)

  11. Career path for operations personnel

    International Nuclear Information System (INIS)

    Asher, J.A.

    1985-01-01

    This paper explains how selected personnel can now obtain a Bachelor of Science degree in Physics with a Nuclear Power Operations option. The program went into effect the Fall of 1984. Another program was worked out in 1982 whereby students attending the Nuclear Operators Training Program could obtain an Associates of Science degree in Mechanical Engineering Technology at the end of two years of study. This paper presents tables and charts which describe these programs and outline the career path for operators

  12. Moral distress in nursing personnel

    OpenAIRE

    Barlem,Edison Luiz Devos; Lunardi,Valéria Lerch; Lunardi,Guilherme Lerch; Tomaschewski-Barlem,Jamila Geri; Silveira,Rosemary Silva da; Dalmolin,Graziele de Lima

    2013-01-01

    OBJECTIVE: to analyze the frequency and intensity of moral distress experienced by nursing personnel in southern Brazil, covering elements of their professional practice. METHOD: a survey was undertaken in two hospitals in Rio Grande do Sul, Brazil, with 247 nurses. Data was collected by means of the adapted Moral Distress Scale. RESULTS: the perception of situations that lead to moral distress is enhanced in nurses and in nursing staff working in institutions with greater openness to dialogu...

  13. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-06-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (1) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper will discuss the various types of security applications that are presently being considered for the above areas and will briefly describe a few examples of the application of this technology. Examples will include ground mobile platforms carrying alarm assessment and/or surveillance sensors and operating either autonomously or with telepresence by a remote operator. An airborne platform performing similar functions will also be discussed. An application of a type of robot sentry that would be fixed and incorporate very simple portable displays will also be described. A third type of robot, an interior robot, that could be used in sensitive or hazardous areas to do detection and assessment functions will be reviewed

  14. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  15. Personnel exposures in industrial radiography

    International Nuclear Information System (INIS)

    Shenoy, K.S.; Patel, P.H.

    1979-01-01

    The manifold increase in production, and ease of availability of radioisotopes in India have been responsible for a tremendous increase in use of radioisotopes in industrial radiography during past fifteen years. Among various applications of radioisotopes the industrial radiography involves a large potential risk of occupational radiation exposures. The dose records of past fifteen years in respect of all radiation workers maintained by the Personnel Monitoring Group of Division of Radiological Protection of the Bhabha Atomic Research Centre, Bombay, have been analysed. Analysis of excessive exposure (exceeding 400 mrem/fortnight) reveals that this figure is increasing at an alarming rate among the radiation workers of this category. In spite of various regulatory controls the dose per person per week has remained higher as compared to the same in other categories. This combined with the increase in number of radiation workers every year would soon contribute significantly to the per capita dose for radiation workers. Use of adequately shielded fool-proof remote control equipment and training of all personnel in safe handling of radiation sources seem to be the only solution to arrest the rate of increase in personnel exposures of this category. (auth.)

  16. National Finance Center Personnel/Payroll System

    Data.gov (United States)

    US Agency for International Development — The NFC system is an USDA system used for processing transactions for payroll/personnel systems. Personnel processing is done through EPIC/HCUP, which is web-based....

  17. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  18. Optimisation of the Process of Managing Personnel Security of a Company Оптимизация процесса управления кадровой безопасностью предприятий

    Directory of Open Access Journals (Sweden)

    Mіshin Aleksandr Yu.

    2013-02-01

    Full Text Available The article analyses existing approaches to managing personnel security of business units at a micro level; it considers notional and categorical mechanism, environment of formation of the system of managing personnel security of a company; specifies scientific and theoretical approach to optimisation of the process of managing personnel security of a company by means of identification of stages, subsystems of management, interdependencies and interconnections between them, which, unlike existing approaches, ensures rational combination of system and situation oriented management.Проанализированы существующие подходы к управлению кадровой безопасностью бизнес-единиц на микроуровне; рассмотрен понятийно-категориальный аппарат, среда формирования системы управления кадровой безопасностью предприятия; уточнён научно-теоретический подход к оптимизации процесса управления кадровой безопасностью предприятий за счет определения этапов, подсистем управления, взаимозависимостей и взаимосвязей между ними, что, в отлич��и от существующих подходов, обеспечивает рациональное сочетание системно и ситуационно ориентированного управления.

  19. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  20. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  1. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  2. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  3. 10 CFR 36.55 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 36.55 Section 36.55 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Operation of Irradiators § 36.55 Personnel monitoring. (a) Irradiator operators shall wear a personnel dosimeter that is...

  4. 49 CFR 193.2711 - Personnel health.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Personnel health. 193.2711 Section 193.2711 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2711 Personnel health. Each operator...

  5. Personnel Development Practices in Turkish Education System

    Science.gov (United States)

    Ozdemir, Tuncay Yavuz

    2016-01-01

    Nowadays everything develops and changes very quickly and sustainability of organizational goals will be possible only when personnel can keep up with these changes. From administrative aspect it is important to enhance personnel's potential and prompt them to achieve organizational goals. Personnel development is a process which influences and…

  6. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  7. Current personnel dosimetry practices at DOE facilities

    International Nuclear Information System (INIS)

    Fix, J.J.

    1981-05-01

    Only three parameters were included in the personnel occupational exposure records by all facilities. These are employee name, social security number, and whole body dose. Approximate percentages of some other parameters included in the record systems are sex (50%), birthdate (90%), occupation (26%), previous employer radiation exposure (74%), etc. Statistical analysis of the data for such parameters as sex versus dose distribution, age versus dose distribution, cumulative lifetime dose, etc. was apparently seldom done. Less than 50% of the facilities reported having formal documentation for either the dosimeter, records system, or reader. Slightly greater than 50% of facilities reported having routine procedures in place. These are considered maximum percentages because some respondents considered computer codes as formal documentation. The repository receives data from DOE facilities regarding the (a) distribution of annual whole body doses, (b) significant internal depositions, and (c) individual doses upon termination. It is expected that numerous differences exist in the dose data submitted by the different facilities. Areas of significant differences would likely include the determination of non-measurable doses, the methods used to determine previous employer radiation dose, the methods of determining cumulative radiation dose, and assessment of internal doses. Undoubtedly, the accuracy of the different dosimetry systems, especially at low doses, is very important to the credibility of data summaries (e.g., man-rem) provided by the repository

  8. Certification of Canadian nuclear power plant personnel

    International Nuclear Information System (INIS)

    Newbury, F.

    2014-01-01

    The Canadian Nuclear Safety Commission (CNSC) regulates the use of nuclear energy and materials to protect health, safety, security of Canadians and the environment, and to implement Canada's international commitments on the peaceful use of nuclear energy. As part of its mandate, the CNSC requires certification of those who work in positions with direct impact on the safety of Canadian nuclear power plants (NPPs) and research reactors. Other positions, such as exposure device operators and radiation safety officers at other nuclear facilities, also require CNSC certification. In this paper, the certification process of Canadian NPP personnel will be examined. In keeping with the CNSC's regulatory philosophy and international practice, licensees bear the primary responsibility for the safe operation of their NPPs. They are therefore held entirely responsible for training and testing their workers, in accordance with applicable regulatory requirements, to ensure they are fully qualified to perform their duties. The CNSC obtains assurance that all persons it certifies are qualified to carry out their respective duties. It achieves this by overseeing a regime of licensee training programs and certification examinations, which are based on a combination of appropriate regulatory guidance and compliance activities. Reviews of the knowledge-based certification examination methodology and of lessons learned from Fukushima have generated initiatives to further strengthen the CNSC's certification programs for NPP workers. Two of those initiatives are discussed in this paper. (author)

  9. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  10. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  11. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  12. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  13. A guide for developing an ADP security plan for Navy Finance Center, Cleveland, Ohio

    OpenAIRE

    Barber, Daniel E.; Hodnett, Elwood Thomas, Jr.

    1982-01-01

    Approved for public release; distribution is unlimited This paper is intended to be used as a guide by personnel at the Navy Finance Center (NFC) Cleveland, Ohio in developing an Automatic Data Processing (ADP) Security Plan. An effort has been made to combine the requirements for an ADP security plan established by OPNAVINST5239.1A with pertinent information from other selected readings. The importance of the devotion of personnel, time and funds to ADP security planning has been emphas...

  14. Development of an integrated campus security alerting system ...

    African Journals Online (AJOL)

    This work presents an integrated alerting system which uses both the Internet Protocol (IP) cameras and micro-switches for monitoring security situations thereby providing an immediate alerting signal to the security personnel. The system has the input unit, processing unit, control unit and the power supply unit as its ...

  15. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  16. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  17. Whole body personnel monitoring via ionization detection

    International Nuclear Information System (INIS)

    Koster, J.E.; Bounds, K.A.; Kerr, P.L.; Steadman, P.A.; Whitley, C.R.

    1998-02-01

    A project between Fernald EMP and LANL is to field a monitor for the detection of alpha-emitting contamination on a human body. Traditional personnel monitoring for alpha emitters involves either frisking with a probe or pressing against large detectors in order to overcome the short range of alpha particles. These methods have a low alpha collection efficiency, and can miss contamination on less accessible surfaces. The authors have investigated the sensitivity and practicality of measuring the entire subject simultaneously using the technique of ionization monitoring. The goal is to create a booth that personnel step into quickly during egress from radiological facilities. The detection technique relies on a breeze of air passing over the subject. Alpha emission produces copious ions in the ambient air which are transported by the air current to an ion collector, resulting in a small electrical current proportional to the amount of contamination. Results indicate a conservative sensitivity of 3,000 disintegrations per minute localized to one of five areas of the body in a measurement lasting less than 2 minutes

  18. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  19. Informal caregiving and intimate relationships: the experiences of spouses of UK military personnel

    OpenAIRE

    Thandi, Gursimran; Oram, S.; Verey, A.; Greenberg, N.; Fear, N. T.

    2017-01-01

    Aim Currently, there is no research available on the experiences of spouses providing informal care to wounded, injured or sick (WIS) UK military personnel. The aim of this study was to fill this gap by investigating the relationship experiences of non-military partners caring for WIS UK military personnel.Methods Spouses of WIS military personnel (n=25) completed telephone interviews with the research team. The data were transcribed and analysed using thematic analysis. The transcripts were ...

  20. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  1. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  2. Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals.

    Science.gov (United States)

    Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung

    2018-01-01

    Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.

  3. Special feature article-very urgent nuclear energy personnel training

    International Nuclear Information System (INIS)

    Saito, Shinzo; Tsujikura, Yonezo; Kawahara, Akira

    2007-01-01

    Securing human resources is important for the sustainable development of research, development and utilization of nuclear energy. However, concerns have been raised over the maintenance of human resources due to the decline of public and private investment in research and development of nuclear energy in recent years. To that end, it is essential for the workplace in the field of nuclear energy to be engaging. This special feature article introduced the Government's fund program supporting universities and vocational colleges to develop human resources in the area of nuclear energy. Electric utilities, nuclear industries, nuclear safety regulators and related academia presented respective present status and issues of nuclear energy personnel training with some expectations to the program to secure human resources with professional qualifications. (T. Tanaka)

  4. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  5. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  6. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  7. Radioactive Waste SECURITY

    International Nuclear Information System (INIS)

    Brodowski, R.; Drapalik, M.; Gepp, C.; Gufler, K.; Sholly, S.

    2010-01-01

    The purpose of this work is to investigate the safety requirements for a radioactive waste repository, the fundamental problems involved and the legislative rules and arrangements for doing so. As the title already makes clear, the focus of this work is on aspects that can be assigned to the security sector - ie the security against the influence of third parties - and are to be distinguished from safety measures for the improvement of the technical safety aspects. In this context, mention is made of events such as human intrusion into guarded facilities, whereas e.g. a geological analysis on seismic safety is not discussed. For a variety of reasons, the consideration of security nuclear waste repositories in public discussions is increasingly taking a back seat, as ia. Terrorist threats can be considered as negligible risk or well calculable. Depending on the type of storage, different security aspects still have to be considered. (roessner)

  8. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  9. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  10. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Science.gov (United States)

    2011-10-13

    ... implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and... policies and minimum standards will address all agencies that operate or access classified computer...

  11. R&D Personnel Career Routes: An Exploratory Study

    OpenAIRE

    Barbara Bigliardi; Alberto Ivo Dormio

    2009-01-01

    This study, aiming at investigate the alternative modes of career development for personnel belonging to R&D staff, addresses the extent to which career anchors are applicable to R&D staff and to examine the relationship among career anchors, gender and age, with the final purpose to add elements of discussion to the long-lasting debate about this matter. With this purpose in mind, we developed a questionnaire survey among 309 R&D personnel employed at firms belonging to the food machinery in...

  12. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  13. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  14. Towards a new approach to the labour law applicable to contractors’ personnel

    CERN Multimedia

    Corinne Pralavorio

    2010-01-01

    On 18 October, CERN and its two Host States will sign agreements on the labour law applicable to the personnel of contractors operating on the CERN site. Once they have entered into force, the agreements will facilitate execution of service contracts for both firms and CERN, and will provide the personnel concerned with better security and more stability.   On 18 October 2010, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. A site that straddles the French-Swiss border makes CERN unique among international organizations. Although this unique characteristic is a fine symbol of international collaboration, it also entails some legal and administrative difficulties. On 18 October, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. This agreement will be supplemented by a bilateral agreement between France and Switzerland amending the 1...

  15. Reconsidering relations between nuclear energy and security concepts

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2004-01-01

    Relations between nuclear energy and security concepts can be clarified through investigation into the multivocal nature of security concepts. While military uses of nuclear energy significantly influence national security, peaceful uses of nuclear energy contribute energy security, which is an expanded concept of national security. Military and peaceful uses of nuclear energy have reciprocal actions, thus influencing national security and energy security, respectively. Nuclear security, which means security of nuclear systems themselves, recently attracts the attention of the international society. Nuclear security directly influences national security issues. On the other hand, along with nuclear safety, nuclear security becomes a prerequisite for energy security through peaceful uses of nuclear energy. In investigating into relations between nuclear energy and security concepts, the difficulty of translating the English word of 'nuclear security' into Japanese as well as other languages is found. (author)

  16. Modular robotic system for forensic investigation support

    Science.gov (United States)

    Kowalski, Grzegorz; Główka, Jakub; Maciaś, Mateusz; Puchalski, Sławomir

    2017-10-01

    Forensic investigation on the crime scene is an activity that requires not only knowledge about the ways of searching for evidence, collecting and processing them. In some cases the area of operation might not be properly secured and poses threat to human health or life. Some devices or materials may be left intentionally or not to injure potential investigators. Besides conventional explosives, threats can be in form of CBRN materials, which have not only immediate effect on the exposed personnel, but can contaminate further people, when being transferred for example on clothes or unsecured equipment. In this case a risk evaluation should be performed, that can lead to conclusions that it is too dangerous for investigators to work. In that kind of situation remote devices, which are able to examine the crime scene and secure samples, can be used. In the course of R&D activities PIAP developed a system, which is based on small UGV capable of carrying out inspection of suspicious places and securing evidence, when needed. The system consists of remotely controlled mobile robot, its control console and a set of various inspection and support tools, that enable detection of CBRN threats as well as revelation, documentation and securing of the evidence. This paper will present main features of the system, like mission adjustment possibilities and communication aspects, and also examples of the forensic accessories.

  17. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  18. Eleventh DOE workshop on personnel neutron dosimetry

    International Nuclear Information System (INIS)

    1991-01-01

    Since its formation, the Office of Health (EH-40) has stressed the importance of the exchange of information related to and improvements in neutron dosimetry. This Workshop was the eleventh in the series sponsored by the Department of Energy (DOE). It provided a forum for operational personnel at DOE facilities to discuss current issues related to neutron dosimetry and for leading investigators in the field to discuss promising approaches for future research. A total of 26 papers were presented including the keynote address by Dr. Warren K. Sinclair, who spoke on, ''The 1990 Recommendations of the ICRP and their Biological Background.'' The first several papers discussed difficulties in measuring neutrons of different energies and ways of compensating or deriving correction factors at individual facilities. Presentations were also given by the US Navy and Air Force. Current research in neutron dosimeter development was the subject of the largest number of papers. These included a number on the development of neutron spectrometers

  19. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  20. Investigating Safety, Safeguards and Security (3S) Synergies to Support Infrastructure Development and Risk-Informed Methodologies for 3S by Design

    International Nuclear Information System (INIS)

    Suzuki, M.; Izumi, Y.; Kimoto, T.; Naoi, Y.; Inoue, T.; Hoffheins, B.

    2010-01-01

    In 2008, Japan and other G8 countries pledged to support the Safeguards, Safety, and Security (3S) Initiative to raise awareness of 3S worldwide and to assist countries in setting up nuclear energy infrastructures that are essential cornerstones of a successful nuclear energy program. The goals of the 3S initiative are to ensure that countries already using nuclear energy or those planning to use nuclear energy are supported by strong national programs in safety, security, and safeguards not only for reliability and viability of the programs, but also to prove to the international audience that the programs are purely peaceful and that nuclear material is properly handled, accounted for, and protected. In support of this initiative, Japan Atomic Energy Agency (JAEA) has been conducting detailed analyses of the R and D programs and cultures of each of the 'S' areas to identify overlaps where synergism and efficiencies might be realized, to determine where there are gaps in the development of a mature 3S culture, and to coordinate efforts with other Japanese and international organizations. As an initial outcome of this study, incoming JAEA employees are being introduced to 3S as part of their induction training and the idea of a President's Award program is being evaluated. Furthermore, some overlaps in 3S missions might be exploited to share facility instrumentation as with Joint-Use-Equipment (JUE), in which cameras and radiation detectors, are shared by the State and IAEA. Lessons learned in these activities can be applied to developing more efficient and effective 3S infrastructures for incorporating into Safeguards by Design methodologies. They will also be useful in supporting human resources and technology development projects associated with Japan's planned nuclear security center for Asia, which was announced during the 2010 Nuclear Security Summit. In this presentation, a risk-informed approach regarding integration of 3S will be introduced. An initial

  1. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  2. Security, Violent Events, and Anticipated Surge Capabilities of Emergency Departments in Washington State

    Science.gov (United States)

    Weyand, Jonathan S.; Junck, Emily; Kang, Christopher S.; Heiner, Jason D.

    2017-01-01

    Introduction Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. Methods A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Results Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient’s family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Conclusion Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments. PMID:28435498

  3. The Daresbury personnel safety system

    International Nuclear Information System (INIS)

    Poole, D.E.; Ring, T.

    1989-01-01

    The personnel safety system designed for the SRS at Daresbury is a unified system covering the three accelerators of the source itself, the beamlines and the experimental stations. The system has also been applied to the experimental areas of the Nuclear Structure Facility, and is therefore established as a site standard. A dual guardline interlock module forms a building block for a relay based interlock system completely independent of the machine control system, although comprehensive monitoring of the system status via the control system computer is a feature. An outline of the design criteria adopted for the system is presented together with a more detailed description of the philosophy of the guardline logic and the way this is implemented in a standard modular form. The emphasis is on the design features of a modern microprocessor based variant of the original SRS system. Experience with the original system during build-up and operation of the SRS facility is described. 2 refs., 4 figs

  4. Director general presentation to personnel

    CERN Multimedia

    2016-01-01

    Dear Colleagues, Many important discussions are scheduled for the upcoming Council Week (13-17 June) on topics including the Medium-Term Plan, the Pension Fund and other matters of great relevance to us.   I would therefore like to share the main outcome of the week with you and I invite you to join me and the Directors in the Main Auditorium at 10 a.m. on Thursday 23 June. The meeting will last about one hour and a webcast will also be available. Best regards, Fabiola Gianotti DG presentation to personnel Thursday 23 June at 10 am Main Auditorium Retransmission in Council Chamber, IT Auditorium, Kjell Jonhsen Auditorium, Prevessin 864-1-C02 Webcast on cern.ch/webcast More information on the event page.

  5. Assessment of the Forensic Sciences Profession: A Legal Study Concerning the Forensic Sciences Personnel. Volume III.

    Science.gov (United States)

    Schroeder, Oliver, Jr.

    The place and function of forensic sciences personnel in American criminal law and court procedure, and the criteria used by criminal trial judges and lawyers to assess the value of forensic sciences personnel were investigated. Federal, state, Virgin Island, and Puerto Rican laws were examined, and a search of the medical and legal literature…

  6. Research on Role Sets and Emotional Relationships in Military Personnel Marriage

    Science.gov (United States)

    Murtazina, Elmira I.; Minullina, Aida F.

    2016-01-01

    An urgent demand of society to conduct effective work with the family substantiates the relevance of the research. The article provides the investigation of role sets and emotional relationships in marriage through the study of military personnel and nonmilitary personnel families. Practical implementation of psychological ideas represents one of…

  7. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  8. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  9. 76 FR 39887 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Science.gov (United States)

    2011-07-07

    ... Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... the site visit, TSA personnel complete the CSR form, which asks security-related questions. This...

  10. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  11. Technical guidelines for personnel dosimetry calibrations

    International Nuclear Information System (INIS)

    Roberson, P.L.; Fox, R.A.; Hadley, R.T.; Holbrook, K.L.; Hooker, C.D.; McDonald, J.C.

    1983-01-01

    A base of technical information has been acquire and used to evaluate the calibration, design, and performance of selected personnel systems in use at Department of Energy (DOE) facilites. A technical document was prepared to guide DOE and DOE contractors in selecting and evaluating personnel dosimetry systems and calibration. A parallel effort was initiated to intercompare the adiological calibrations standards used to calibrate DOE personnel dosimeters

  12. Department of Defense Civilian Personnel Manual

    National Research Council Canada - National Science Library

    1996-01-01

    .... It implements policy, establishes uniform DoD-wide procedures, provides guidelines and model programs, delegates authority, and assigns responsibilities regarding civilian personnel management within...

  13. Khmelnitsky NPP personnel training system improvement

    International Nuclear Information System (INIS)

    Sapronov, V.G.; Issupov, V.I.

    1996-01-01

    Khmelnitsky nuclear power plant personnel training system improvement is described, including creation of Training center, development of training courses based on SAT methodology, development of training hardware

  14. Sources of personnel for multinuclear companies

    International Nuclear Information System (INIS)

    Guppy, W.H.

    1975-01-01

    Included are comments and statistics on current employment levels, projected requirements for future stations, sources of personnel for current and projected stations, and methods of employee selection

  15. Educating personnel for nuclear technology in Czechoslovakia

    International Nuclear Information System (INIS)

    Otcenasek, P.

    1980-01-01

    The basic preconditions are discussed of educating personnel for nuclear power and nuclear technology in Czechoslovakia. In educating specialists, the high societal significance of nuclear power and the need to obtain qualified personnel for safeguarding safety and reliability of nuclear facilities operation should primarily be borne in mind. The system of training applies not only to operating and maintenance personnel of nuclear power plants but also to fuel and power generation, transport, engineering, building industry, health care, education and other personnel. (J.B.)

  16. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  17. A passive automated personnel accountability system for reactor emergency preparedness

    International Nuclear Information System (INIS)

    Zimmerman, R.O.; DeLisle, G.V.; Hickey, E.E.

    1988-04-01

    In 1985 a project was undertaken at the N Reactor on the Hanford Site to develop an automated personnel accountability system to ensure accountability of all personnel within 30 minutes of a site evacuation. The decision to develop such a system was made after a full-scale evacuation drill showed that the manual accountability system in use at the time was inadequate to meet the 30-minute requirement. Accountability systems at commercial nuclear power plants were evaluated, but found to be unsuitable because they were not passive, that is, they required action on part of the user for the system to work. Approximately 2500 people could be required to evacuate the 100-N Area. Therefore, a card key system or badge exchange system was judged not to be feasible. A passive accountability system was desired for N Reactor to allow personnel to enter and leave the site in a more timely manner. To meet the need for an automated accountability system at N Reactor, a special Evacuation Accountability System (EVACS) was designed and developed. The EVACS system has three basic components: the transponder, a credit card-sized device worn with the security badge; portal monitors, which are electronically activated by the transponder; and a computer information system that contains the personnel data base. Each person wearing a transponder is accounted for automatically by walking through a portal. In this paper, a description of the hardware and software will be presented, together with problems encountered and lessons learned while adapting an existing technology to this particular use. The system is currently installed and requires acceptance testing before becoming operational

  18. National programs for the development and development of the culture of Security in the nuclear activities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Arnau Fernandez, A.

    2003-01-01

    From their appearance, as a result of the investigations of the accident in the Nuclear Power station of Chernobyl, the term Culture of Security has been considered a key element to achieve a elevated level of security in the nuclear facilities, becoming a basic principle of security, grateful internationally. The Organ Cuban Regulator understood from very early the importance of to promote and to develop attitudes and characteristic in the organizations and the personnel linked to the nuclear sector that you/they reflected a high culture of security, for to propitiate a bigger involvement of all in the topics of security and in that way to contribute significantly to the prevention of accidents in the nuclear facilities. Although the Program Nuclear Cuban suffered serious reductions in the decade of the years 90, the Organ Regulator has continuous working in this address, assimilating all the international experience for its application in their strategies of development of the culture of security in the nuclear activities that today they are executed in the country. The present work picks up the Cuban experience in the conformation of a National Program for the development and development of the Culture of Security

  19. Perceived effect of deployment on families of UK military personnel.

    Science.gov (United States)

    Thandi, G; Greenberg, N; Fear, N T; Jones, N

    2017-10-01

    In the UK, little is known about the perceived effects of deployment, on military families, from military personnel in theatre. To investigate military personnel's perceptions of the impact of deployment on intimate relationships and children. Deployed service personnel who were in a relationship, and who had children, completed a survey while deployed on combat operations. Data were taken from four mental health surveys carried out in Iraq in 2009 and Afghanistan in 2010, 2011 and 2014. Among 4265 participants, after adjusting for military and social-demographic covariates, perceiving that deployment had a negative impact on intimate relationships and children was associated with psychological distress, and traumatic stress symptoms. Military personnel who reported being in danger of being injured or killed during deployment, were more likely to report a perceived negative effect of deployment on their intimate relationships. Reservists were less likely to report a perceived negative impact of deployment on their children compared with regulars. Military personnel who themselves planned to separate from their partner were more likely to report psychological distress, and stressors at home. Perceived insufficient support from the Ministry of Defence was associated with poor mental health, and holding a junior rank. Deployed UK military personnel with symptoms of psychological distress, who experienced stressors at home, were especially likely to perceive that their family were inadequately supported by the military. Those planning to separate from their partner were at increased risk of suffering with mental health problems while deployed. © The Author 2017. Published by Oxford University Press on behalf of the Society of Occupational Medicine. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  20. Causes and prevention of violence toward emergency personnel by patients and their relatives in a province in Turkey.

    Science.gov (United States)

    Cebeci, Fatma; Sucu, Gülten; Karazeybek, Ebru

    2009-03-23

    STUDY OBJECTIVE: This research was conducted to determine the opinions of the emergency department's personnel about the causes and prevention of violence directed at them by patients and their relatives. METHODS: This research was conducted between 3 February and 15 June, 2006, in Antalya, a province in southern Turkey, with a total of 216 emergency department personnel who work in the emergency departments of three hospitals. A questionnaire developed by researchers was used to collect data for the purpose of determining what kind of violence is directed at emergency personnel by patients and their relatives and the personnel's socio-demographic characteristics and opinions. Pearson's chi and Fisher's exact test were used in the analysis of the data. RESULTS: Almost all (94.4%) of the participating emergency personnel had been exposed to verbal violence and 59.7% to physical violence. Only 24.5% of those exposed to violence reported the violence. The majority of the personnel (72.5%) thought that individuals' personality tendencies are the primary cause of violence. Their primary recommendation for preventing violence was to increase security measures. Statistically significant differences were found between emergency personnel's place of work and physical violence, between gender and physical violence, and between level of education and reporting violence. CONCLUSION: On the basis of the research results, it is recommended that emergency personnel be trained on the subject of violence, a documentation system be developed for recording and reporting violence, and corrections be made to prevent violence based on the personnel's opinions.

  1. INVESTIGATION OF THE RISK FACTORS FOR CORONARY ARTERY DISEASES IN EMPLOYEES AND THEIR SPOUSES OF THE ELAZIG SECURITY DEPARTMENT WHO ADMITTED TO MEDICAL DEPARTMENT OF THIS HEADQUARTER

    Directory of Open Access Journals (Sweden)

    Suleyman Erhan DEVECI

    2006-08-01

    Full Text Available This study was carried out with the aim of identifying risk factors coronary artery disease (CAD in the employees of Elazig Security Department. Questionnaires were applied to members and/or spouses (313 individuals of Elazig Security Department admitting to the Health Office for any reason in November-December 2003. Measurements for fasting blood sugar, serum cholesterol levels and blood pressure values were carried out. Of the individuals participating in this study, 1.9% reported having diabetes, 2.9% heart disease and 5.4% hypertension. Mean blood pressure measurements were; systolic 114.1±15.9 and diastolic 74.6±10.3 mmHg, mean fasting blood glucose values were reported as 90.9±16.6 mg/dl. 8.9% had high systolic and 7.7% had high diastolic blood pressure measurements, 16.0% had elevated total cholesterol and 3.5% had elevated fasting blood sugar levels. 36.7% reported to be current smokers, 20.8% reported having regular physical activity. 65.5% reported skipping meals and 47.3% reported eating snacks between the meals. In the group that was analyzed, the rates of smoking, sedentary life style and irregular eating habits that are considered as risk factors for CAD were high. [TAF Prev Med Bull 2006; 5(4.000: 235-243

  2. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The IT Security Specialist takes a strategic role in the delivery of Infrastructure ... on IT Security to project managers, business clients and senior management. ... as a team member or a team leader by undertaking research, investigations, ...

  3. Optimal Aide Security Information Search (OASIS)

    National Research Council Canada - National Science Library

    Kapadia, Chetna

    2005-01-01

    The purpose of the Optimal AIDE Security Information Search (OASIS) effort was to investigate and prototype a tool that can assist the network security analyst in collecting useful information to defend the networks they manage...

  4. Theoretical foundations of information security investment security companies

    Directory of Open Access Journals (Sweden)

    G.V. Berlyak

    2015-03-01

    Full Text Available Methodological problems related to the lack of guidance in the provisions (standards of accounting on the reflection in the accounting and financial reporting of the research object. In this connection, it is proposed to amend the provisions (standards of accounting. This will allow to come to the consistency of accounting methods of operations with elements of investment activity. Based on analysis of the information needs of users suggested indicators identikativnye blocks (block corporate finance unit assess the relationship with financial institutions, block the fulfillment of obligations according to the calculations, the investment unit, a science and innovation, investment security and developed forms of internal accounting controls and improvements to existing forms financial statements for the investment activities of the enterprise. Using enterprise data reporting forms provide timely and reliable information on the identity and structure of investment security and enable the company to effectively plan and develop personnel policies for enterprise management.

  5. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  6. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  7. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  8. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  9. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  10. Return to work: Police personnel and PTSD

    NARCIS (Netherlands)

    Plat, Marie-Christine J.; Westerveld, Gre J.; Hutter, Renée C.; Olff, Miranda; Frings-Dresen, Monique H. W.; Sluiter, Judith K.

    2013-01-01

    This study i) describes the number of police personnel with PTSD who are working and those who are on sick leave before and after an out-patient-clinic treatment program and ii) examines which factors are related to return to work. Police personnel treated for PTSD (n=121). In this retrospective

  11. 10 CFR 26.155 - Laboratory personnel.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Laboratory personnel. 26.155 Section 26.155 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Laboratories Certified by the Department of Health and Human... ensure the continued competency of laboratory personnel by documenting their in-service training...

  12. Personnel radiation safety in nuclear power plants

    International Nuclear Information System (INIS)

    Elkert, J.

    1979-05-01

    The principal contributions to the radiation doses of the Swedish power reactor personnel are identified. The possi bilities to reduce these doses are examined. The radiation doses are analyzed according to different personnel categories, specific maintenance operations or inspections and to different radiation activities. Suggestions are given for reducing the radiation doses. (L.E.)

  13. Maintenance Personnel Performance Simulation (MAPPS) model

    International Nuclear Information System (INIS)

    Siegel, A.I.; Bartter, W.D.; Wolf, J.J.; Knee, H.E.; Haas, P.M.

    1984-01-01

    A stochastic computer model for simulating the actions and behavior of nuclear power plant maintenance personnel is described. The model considers personnel, environmental, and motivational variables to yield predictions of maintenance performance quality and time to perform. The mode has been fully developed and sensitivity tested. Additional evaluation of the model is now taking place

  14. 10 CFR 39.65 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 39.65 Section 39.65 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Radiation Safety Requirements § 39.65 Personnel monitoring. (a) The licensee may not permit an individual to act as a logging...

  15. 10 CFR 34.47 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 34.47 Section 34.47 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Radiation Safety Requirements § 34.47 Personnel monitoring. (a) The licensee may not...

  16. 21 CFR 211.28 - Personnel responsibilities.

    Science.gov (United States)

    2010-04-01

    ... apparel, such as head, face, hand, and arm coverings, shall be worn as necessary to protect drug products... observation) to have an apparent illness or open lesions that may adversely affect the safety or quality of... medical personnel not to jeopardize the safety or quality of drug products. All personnel shall be...

  17. Health-physics personnel: a need unfulfilled

    International Nuclear Information System (INIS)

    Kathren, R.E.

    1983-06-01

    Current trends and conditions in the health physics profession are discussed. The need for health physics personnel in academia, nuclear power plants, other nuclear industry, national laboratories, and other sectors and the shortfall in qualified personnel to fill the available positions is described. Reasons for the present situation and recommendations for alleviating it are presented

  18. Innovative activity of personnel of organization

    Directory of Open Access Journals (Sweden)

    V. N.Belkin

    2010-09-01

    Full Text Available This article deals with transition way of economic of the Russian Federation on an innovative way of development. The special attention is given the internal social and economic environment of the organizations which, as a rule, counteracts development of innovative activity of the personnel. Ways of increase of innovative activity of the personnel are offered.

  19. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  20. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  1. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  2. Investigation of productivity in a south Indian Malabari goat herd shows opportunities for planned animal health management to improve food security.

    Science.gov (United States)

    Sargison, N D; Ivil, S A J; Abraham, J; Abubaker, S P S; Hopker, A M; Mazeri, S; Otter, I A; Otter, N

    2017-03-18

    Here the authors report the objective veterinary clinical measurement of productivity in a representative south Indian Malabari goat herd. The authors show failure to meet pragmatic production targets that are commensurate with the animals' genetic potential or adequate to meet the demands of global food security. The authors suggest that this situation may have arisen as a consequence of animal husbandry constraints and protein undernutrition and imply the involvement of nematode parasitism. Benzimidazole resistance was detected in Haemonchus species, showing the need for better understanding of the principles of sustainable helminth parasite control within the southern Indian context. This study highlights the need to understand the true costs of goat production in seasonally resource-poor environments, while also considering its impact on the overall ecosystem in which the animals are placed. They conclude that pragmatic opportunities for improvements in goat production efficiency lie in the development of problem-focused planned animal health and nutrition management. British Veterinary Association.

  3. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  4. Personal health record systems and their security protection.

    Science.gov (United States)

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  5. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  6. [Stress: diagnosis of military police personnel in a Brazilian city].

    Science.gov (United States)

    Costa, Marcos; Júnior, Horácio Accioly; Oliveira, José; Maia, Eulália

    2007-04-01

    To diagnose the occurrence and stage of stress among military police enlisted personnel and officers in the city of Natal (the capital of the state of Rio Grande do Norte, Brazil), and to determine the prevalence of physical and mental symptoms. This cross-sectional descriptive study investigated a sample of 264 individuals from a population of 3,193 military personnel from the Natal police command. The data were collected between June 2004 and January 2005 using Lipp's Adult Stress Symptoms Inventory (Inventário de Sintomas de Stress para Adultos de Lipp). The research assessed: (1) presence of stress, (2) the stage of stress (alert, resistance, near-burnout, and burnout), (3) the prevalence of physical and mental symptoms, and (4) the relationship between stress and police unit, rank, gender, drinking, smoking, educational level, marital status, age, years of police service, and salary. No stress symptoms were found in 52.6% of the sample; 47.4% had symptoms. Of the 47.4% of the police personnel with stress symptoms, they were distributed as: 3.4% in the alert stage, 39.8% in the resistance stage, 3.8% in the near-burnout stage, and 0.4% in the burnout stage. Psychological symptoms were recorded in 76.0% of the police personnel with stress, and physical symptoms in 24.0% of them. Of the variables investigated, only gender was related to stress (P = 0.0337), with the female police personnel being more likely to suffer from stress. The levels of stress and symptoms do not indicate a critical situation of fatigue. However, it is recommended that the police take preventive actions, including implementing an effective program for the diagnosis of, training on, and control of stress.

  7. Using Trust for Secure Collaboration in Uncertain Environments

    DEFF Research Database (Denmark)

    Cahill, Vinny; Gray, Elizabeth; Seigneur, Jean-Marc

    2003-01-01

    The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.......The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration....

  8. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ; Dosimetria del Personal Ocupacionalmente Expuesto (POE) y no expuesto del INNSZ

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz J, A [Departamento de Medicina Nuclear, Instituto nacional de la nutricion Salvador Zubiran, Mexico D.F. C.P. 14100 (Mexico)

    1999-07-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  9. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  10. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  11. Risk perception among nuclear power plant personnel: A survey

    International Nuclear Information System (INIS)

    Kivimaeki, M.; Kalimo, R.

    1993-01-01

    This study investigated risk perception, well-being, and organizational commitment among nuclear power plant personnel. The study group, 428 employees from a nuclear power plant, completed a questionnaire which included the same questions as those in previous surveys on risk perception of lay persons and industrial workers. Hazards at work were not seen as a sizable problem by nuclear power plant personnel. The study group estimated the safety of nuclear power plants better and the possibility of a serious nuclear accident as more unlikely than the general public. Compared to employees in other industrial companies, the overall perceived risks at work among plant personnel did not exceed the respective perceptions of the reference groups. Risk-related attitudes did not explain well-being among plant personnel, but the relationship between the perceived probability of a serious nuclear accident at work and organizational commitment yielded to a significant correlation: Those plant workers who estimated the likelihood of an accident higher were less committed to the organization. 21 refs., 2 tabs

  12. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  13. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  14. Investigating the Respiratory Health of Deployed Military Personnel

    Science.gov (United States)

    2011-10-01

    as the majority lack evidence of airway obstruction on spirom- etry or chest imaging. The epidemiologic report by the Army concluded: “This...characterized by acute illness (ɚ weeks of symptoms), respiratory failure, bilateral pulmonary infi ltrates, hypoxia, and predominant eosinophilia on... World Scientifi c Hackensack , August 19–24, 2009 . 12. Wilfong ER , Lyles M , Tietcheck R , et al : The acute and long term effects of

  15. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  16. 34 CFR 361.18 - Comprehensive system of personnel development.

    Science.gov (United States)

    2010-07-01

    ... implementation of a plan to address the current and projected needs for personnel who are qualified in accordance... accordance with paragraph (c) of this section, including personnel from minority backgrounds and personnel... retraining, recruiting, and hiring personnel; (B) The specific time period by which all State unit personnel...

  17. An investigation of the challenges of the strategic human resources management in the safety and security sector education training authority (SASSETA) / Stephina Pulane Molefi

    OpenAIRE

    Molefi, Stephina Pulane

    2011-01-01

    The purpose of th1e study was to investigate the challenges in the implementation of the strategic human resource management functions and practices in SASSETA. The study investigated the impact of organisational structure, the positioning and reporting lines on the ability of the Human Resource Professionals to become strategic business partners. The study further investigated whether the Human Resource Practitioners possess the relevant competencies that contribute towards th...

  18. On the security of two remote user authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  19. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer K; Schwartz, Moshe; Nakamura, Kennon H

    2008-01-01

    .... In Iraq, private firms known as Private Security Contractors (PSCs) serve to protect individuals, transport convoys, forward operating bases, buildings, and other economic infrastructure, and are training Iraqi police and military personnel...

  20. The Swedish police as a part of the security systems of nuclear material and other radioactive materials

    International Nuclear Information System (INIS)

    Nylen, L.

    2001-01-01

    Full text: In Sweden a special transport system has been developed for transport of nuclear substances and nuclear waste. This system in itself includes a high security level. Extraordinary circumstances can give cause for protective police measures and intervention. In concerned provinces an incident and emergency response planning take place of the police actions that may be needed at the following types of event: a) bomb threat; b) attack or threat of attack on transport vehicle; c) demonstrations. If a Swedish nuclear power plant is the subject of a bomb threat or other criminal assault, it is in Sweden, according to the Police Act, the task of the police to intervene, interrupt criminal acts and to restore order and security. The role of the Swedish police as regards the physical protection is, among other things, to carry out a certain control within protected area by special trained police personnel before a reactor is put into operation or restarted after revision or repair. Police authorities that have a nuclear power station within its jurisdiction should establish a plan for police actions at the nuclear power station in consultation with legal owner or management of the plant, the Swedish Nuclear Power Administration and the county administration. Special training and frequent practice of response personnel is crucial as well as co-training with key personnel at nuclear power stations. The National Criminal Investigation Department coordinates and commands police measures concerning different types of nuclear transports. Close co-operation with security and operational personnel at the nuclear power stations, operators of the transport system, the Swedish Nuclear Power Administration and the Swedish Radiation Protection Institute is very important. (author)

  1. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-01-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur

  2. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-07-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur. 2 refs

  3. Occupational exposure of nuclear medicine personnel

    International Nuclear Information System (INIS)

    Roessler, M.

    1982-01-01

    The results are given of measurements of the radiation burden of personnel in departments of nuclear medicine in the years 1979 to 1981 using film dosemeters and ring thermoluminescence dosemeters evaluated by the national personnel dosemeter service. The relations are examined of the exposure of hands and the preparation of radiopharmaceuticals and especially their use for examinations. Certain organizational measures are indicated for reducina radiation burden in a laboratory for the preparation of radiopharmaceuticals. The results of measurements and evaluations of radiation burden of personnel of nuclear medicine departments are confronted with conclusions published in the literature. (author)

  4. Monitoring of overalls and personnel skin contamination

    International Nuclear Information System (INIS)

    Turkin, N.F.

    1980-01-01

    Organization of monitoring of overalls and personnel skin contamination wastes is considered. The devices used for this purpose are enumerated. In sanitary sluices through which the personnel leaving the repair zone it is recommended to particularly thoroughly control hand skin contamination and most contaminated parts of overalls (sleeves, breeches lower parts, pockets, stomack region). In sanitary check points during personnel leaving the operator zone monitoring of overalls and skin contamination is performed. The overalls and other individual protective clothing are subjected to control in a special loundry before and after washing (decontamination) [ru

  5. Corrective Action Investigation Plan for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2014-01-01

    CAU 568 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 568, which comprises the following corrective action sites (CASs): • 03-23-17, S-3I Contamination Area • 03-23-19, T-3U Contamination Area • 03-23-20, Otero Contamination Area • 03-23-22, Platypus Contamination Area • 03-23-23, San Juan Contamination Area • 03-23-26, Shrew/Wolverine Contamination Area These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report.

  6. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  7. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  8. Surgical nurse: his leadership style with nursing auxiliary personnel

    OpenAIRE

    Galvão, Cristina Maria; Trevizan, Maria Auxiliadora; Okino Sawada, Namie

    2008-01-01

    This investigation as carried out in order to promote follow-up in the studies concerning nurse`s leadership in the hospital context. Emphasys is given to the nurses that works in surgical ward unities. As a theoretical framework, authors utilized the model of leadership proposed by Hersey na Blanchard, named Situational Leadership. The objective was to analyze the correspondence of opinion between nurses and nursing auxiliary personnel about the leadership style of nurse should adopt in acco...

  9. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  10. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  11. Food allergy knowledge and attitude of restaurant personnel in Turkey.

    Science.gov (United States)

    Sogut, Ayhan; Kavut, Ayşe Baççıoğlu; Kartal, İbrahim; Beyhun, Ercument Nazim; Çayır, Atilla; Mutlu, Mehmet; Özkan, Behzat

    2015-02-01

    The incidence of food-induced allergic reactions is gradually increasing. Most of these allergic reactions occur in restaurants. Therefore, this study aims to investigate the awareness of restaurant personnel about food allergy. The training, knowledge levels on food allergy, and comfort level in providing safe food of 351 restaurant personnel in Erzurum Province, Turkey, were assessed through a face-to-face survey. Among the participants, 81.5% were male (mean age 28.5 ± 8.5 years). Among them, 17.1% were chefs, 11.1% managers, 5.7% owners, and 66.1% waiters. Food allergy training was reported by 17.1% of the participants. The rates of restaurant personnel who gave the correct answers to the 4 questionnaire items, "Customers with food allergies can safely consume a small amount of that food/Food allergic reaction can cause death/If a customer is having an allergic reaction, it is appropriate to immediately serve them water to 'dilute' the allergen/Removing an allergen from a finished meal (eg, taking off nuts) may be all that is necessary to provide a safe meal for an allergic customer," which measure food allergy knowledge levels, were 46.4%, 65.7%, 55.0%, and 65.7%, respectively. According to our study, there are gaps in the food allergy knowledge of restaurant personnel. Because preparing and serving safe meals to patients with food allergy in restaurants is important, the training of restaurant personnel in food allergy is necessary. © 2014 ARS-AAOA, LLC.

  12. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  13. Psychiatric legal investigation for sickness benefits due to disability at the Brazilian Federal Social Security Special Court in Florianópolis, capital city of the State of Santa Catarina, southern Brazil.

    Science.gov (United States)

    Figueredo, Roberto; Damas, Fernando Balvedi

    2015-01-01

    To describe the profile of insured individuals that filed claims for sickness benefits and compare the results of the administrative and legal investigations. This case series included 114 insured persons that filed lawsuits against the Brazilian National Institute of Social Security (Instituto Nacional de Seguridade Social, INSS). They underwent psychiatric examinations required by the Brazilian Federal Social Security Special Court in Florianópolis from August to December 2010. Mean age was 47 years, and participant age ranged from 24 to 64 years. Most insured individuals were women (79%), and most were employed (67.5%) and self-employed (26.5%) workers. Mean contribution time was 99.9 months, ranging from 8 to 352 months. Mean benefit duration was 20.4 months, ranging from 2 to 97 months. The most prevalent category of workers was service workers, store and supermarket salespeople (54.4%), followed by administrative workers (19.3%). Only 17 participants were found to be unable to work after benefit cessation, a 14.9% mismatch between administrative and legal investigations. The most frequent diagnoses were mood disorders (59.6%) and anxiety disorders (17.5%).

  14. Psychiatric legal investigation for sickness benefits due to disability at the Brazilian Federal Social Security Special Court in Florianópolis, capital city of the State of Santa Catarina, southern Brazil

    Directory of Open Access Journals (Sweden)

    Roberto Figueredo

    2015-06-01

    Full Text Available Objective: To describe the profile of insured individuals that filed claims for sickness benefits and compare the results of the administrative and legal investigations.Method: This case series included 114 insured persons that filed lawsuits against the Brazilian National Institute of Social Security (Instituto Nacional de Seguridade Social, INSS. They underwent psychiatric examinations required by the Brazilian Federal Social Security Special Court in Florianópolis from August to December 2010.Results: Mean age was 47 years, and participant age ranged from 24 to 64 years. Most insured individuals were women (79%, and most were employed (67.5% and self-employed (26.5% workers. Mean contribution time was 99.9 months, ranging from 8 to 352 months. Mean benefit duration was 20.4 months, ranging from 2 to 97 months. The most prevalent category of workers was service workers, store and supermarket salespeople (54.4%, followed by administrative workers (19.3%.Conclusions: Only 17 participants were found to be unable to work after benefit cessation, a 14.9% mismatch between administrative and legal investigations. The most frequent diagnoses were mood disorders (59.6% and anxiety disorders (17.5%.

  15. Asbestos exposure of building maintenance personnel.

    Science.gov (United States)

    Mlynarek, S; Corn, M; Blake, C

    1996-06-01

    The exposures of building maintenance personnel and occupants to airborne asbestos fibers, and the effects of operations and maintenance programs on those exposures, continue to be an important public health issue. The subject of this investigation was a large metropolitan county with numerous public buildings which routinely conducted air sampling for asbestos. A total of 302 personal air samples in nine task categories collected during maintenance worker activities in proximity to asbestos-containing materials were analyzed; 102 environmental air samples in four task categories were also analyzed. The arithmetic means of the 8-hr time weighted average exposures for personal sampling for each task category were all below the Occupational Safety and Health Administration permissible exposure level of 0.1 fibers (f)/cc > 5 microm. The highest mean 8-hr time weighted average exposure was 0.030 f/cc > 5 microm for ceiling tile replacement. The maximum asbestos concentration during sample collection for environmental samples was 0.027 f/cc > 5 microm. All asbestos-related maintenance work was done within the framework of an Operations and Maintenance Program (OMP) which utilized both personal protective equipment and controls against fiber release/dispersion. Results are presented in association with specific OMP procedures or controls. These results support the effectiveness of using Operations and Maintenance Programs to manage asbestos in buildings without incurring unacceptable risk to maintenance workers performing maintenance tasks.

  16. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  17. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  18. 42 CFR 484.4 - Personnel qualifications.

    Science.gov (United States)

    2010-10-01

    ... (CONTINUED) STANDARDS AND CERTIFICATION HOME HEALTH SERVICES General Provisions § 484.4 Personnel... baccalaureate degree in social work, psychology, sociology, or other field related to social work, and has had...

  19. WebPASS Explorer (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPass Explorer (WebPASS Framework): USAID is partnering with DoS in the implementation of their WebPass Post Personnel (PS) Module. WebPassPS does not replace...

  20. Central Personnel Data File (CPDF) Status Data

    Data.gov (United States)

    Office of Personnel Management — Precursor to the Enterprise Human Resources Integration-Statistical Data Mart (EHRI-SDM). It contains data about the employee and their position, along with various...

  1. Guidelines for the calibration of personnel dosimeters

    International Nuclear Information System (INIS)

    Roberson, P.L.; Holbrook, K.L.

    1984-01-01

    This guide describes minimum acceptable performance levels for personnel dosimetry systems used at Department of Energy (DOE) facilities. The goal is to improve both the quality of radiological calibrations and the methods of comparing reported occupational doses between DOE facilities. Reference calibration techniques are defined. A standard for evaluation of personnel dosimetry systems and recommended design parameters for personnel dosimeters are also included. Approximate intervals for the radiation energies for which these guidelines are appropriate are 15 keV to 2 MeV for photons; above 0.3 MeV for beta particles; and 1 keV to 2 MeV for neutrons. An analysis of ANSI N13.11 was completed using performance evaluations of selected personnel dosimetry systems in use at DOE facilities. The results of this analysis are incorporated in the guidelines

  2. New ISO standard - personnel photographic film dosemeters

    International Nuclear Information System (INIS)

    Brabec, D.

    1980-01-01

    The ISO Standard 1757 ''Personnel Photographic Film Dosemeters'', issued in June 1980, is briefly described. UVVVR's own dosemeter developed for use in the national film dosimetry service in Czechoslovakia is evaluated in relation to this ISO Standard. (author)

  3. Personality, personnel selection, and job performance

    OpenAIRE

    Linden, Dimitri; Pelt, Dirk; Dunkel, Curtis; Born, Marise

    2017-01-01

    markdownabstractJob Performance: The term job performance can either refer to the objective or subjective outcomes one achieves in a specific job (e.g., the profit of a sales persons, the number of publications of a scientist, the number of successful operations of a surgeon) or to work-related activities (e.g., writing an article, conducting specific surgical acts). In the majority of research on this topic, job performance as an outcome is used. Personnel selection: Personnel selection refe...

  4. Personnel Audit Using a Forensic Mining Technique

    OpenAIRE

    Adesesan B. Adeyemo; Oluwafemi Oriola

    2010-01-01

    This paper applies forensic data mining to determine the true status of employees and thereafter provide useful evidences for proper administration of administrative rules in a Typical Nigerian Teaching Service. The conventional technique of personnel audit was studied and a new technique for personnel audit was modeled using Artificial Neural Networks and Decision Tree algorithms. Atwo-layer classifier architecture was modeled. The outcome of the experiment proved that Radial Basis Function ...

  5. Personnel monitoring of radiations with thermoluminescent dosemeters

    International Nuclear Information System (INIS)

    Miano, S.C.

    1987-01-01

    The basics of personnel dosimetry technics, used by the Radiologic Protetion and Assessorie Service (SAPRA) are presented, consisting on use of thermoluminescent and CaSO 4 :Dy monitors in aggregated pellets by Teflon. The characteristics of this dosemeters, relating to the sensitivity, energetic dependence, spike temperature, characteristic emission curve, decay and light effect are shown. The thermoluminescent dosemeter measure system and the personnel monitoring system are also described. (C.G.C.) [pt

  6. Technical obstacles to nuclear security - Russian perspective

    International Nuclear Information System (INIS)

    Pshakin, G.

    2005-01-01

    Full text: Present political, economical and social development the world - wide and in particular countries and regions facilitate number of serious and dangerous challenges for people responsible for security of materials and facilities, which could be used as a threat to the humankind in case of unauthorized approach. A number of factors have impact on the security including political, social, financial and technical nature. The security of nuclear materials and facilities where nuclear materials located and under processing is facing a number of problems such as control of the personnel who is handling the materials, access to the materials and the facilities, accounting and control of the materials storage, transportation, transactions, processing, physical protection of the materials. Each aspect of those problems must be taken into account for establishing most efficient way to keep the nuclear materials out of hands of the terrorists. Technical aspects which require serious and intent relation from political and technical communities in Russia (as example) are the following: legal base for nuclear materials protection, control and accounting and export control; personnel for nuclear materials control and accounting - skill, reliability, responsibility, training and new generation education; personnel for physical protection - skill, reliability, responsibility, training; structure of the system and equipment for materials control, verification, accountability; structure of the system and equipment for physical protection; regulatory supervision of the MPC+A system effectiveness. (author)

  7. Preventive medical programmes to personnel exposed to ionizing radiation

    International Nuclear Information System (INIS)

    Estrada F, E.

    1996-01-01

    The increasing use of ionizing radiation in the medical field as well as in industry and research grants has special importance to the security aspects related to the individual as well as his surroundings, reason for which the implementation of effective Occupational Radiation Protection Programmes constitutes a priority. Presently, in Guatemala, an Occupational Medicine Programme, directed to the Radiosanitary watch over of occupationally exposed personnel does not exist. It is the goal in this project to organize and establish such programme, based on protective and training actions focused toward the employee as the main entity, his specific activities and his work surroundings. Medical watch over together with Radiation Protection will permit the reduction of the occurrence probability of accidents or incidents, as well as the limitation of stochastic effects to the undermost values. The application scope of the present project is, in the first place, directed to the occupationally exposed personnel of the Direcci[n General de Energ[a Nuclear, as regulatory entity of these activities, and afterwards, its application in the different institutions which work with ionizing radiations. All the previously exposed is based on the Nuclear Legislation prevailing in Guatemala as well as the recommendations of international organizations. (author)

  8. Determination of nature of enterprise economic security

    OpenAIRE

    Dmitriev, I.; Fedotova, K.

    2010-01-01

    The topicality of economic security management under conditions of the global crisis has been proved, the necessity of enterprise economic security investigation on the micro-level considering all sides, means and aims of its achievement has been disclosed. For this purpose the definition of enterprise economic security with the use of different approaches has been done, their advantages and disadvantages have been determined. The definition of the enterprise economic security based on genera...

  9. Security risks arising from portable storage devices

    CSIR Research Space (South Africa)

    Molotsi, K

    2012-10-01

    Full Text Available of the security risks arising from the use of PSDs, and further provides possible security countermeasures to help organisations and users to protect their digital assets. APPROACH Literature review: ? To investigate security risks posed by PSDs... technology in the workplace. International Journal of Electronic Security and Digital Forensics. 3(1): 73?81 [3] Kim, K., Kim, E. & Hong S. (2009). Privacy information protection in portable device. Proceedings of International Conference on Convergence...

  10. The Financing and Personnel of the Lithuanian Army

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2015-12-01

    Full Text Available In 2014, at the beginning of the crisis in Ukraine and Russia‘s aggression against this neighboring country, Lithuania became concerned about the strengthening of its military capabilities, augmenting the National Defense System (NDS budget by almost 50% in two years. This may be considered unprecedented, if seen against the background of the presidential elections and those to the European Parliament, the fiscal discipline, the introduction of euro, as well as Russia‘s economic sanctions, the political decision in the course of 2014 on increasing the defense assignation by 130 million litas and in 2015 the increase by planned additional 356 million litas. This article analyzes two closely related problems of the Lithuanian NDS capabilities. First of all, changes in the NDS financing are explored in the context of permanent agreements of Lithuanian political parties concerning the allocation of 2% of the GDP for defense. This is followed by the discussion of the issues of military personnel staffing and training of the reserve as well as future challenges. This research contributes to the assessment of the critical NDS financing and staffing not only within academic circles but particularly among politicians and society in general. Additionally, it contributes to the awareness of the problems the army encountered in seeking to implement the objective set for it: to ensure the military security of the state. In the presence of the emerging threats in the region, this is of particularly great significance to the demilitarized and pacifist society of Lithuania. The article aims at identifying financing and personnel planning problems throughout a quarter of the century, ranging from the restoration of the Army of the Republic of Lithuania to 2014 inclusively. At the same time, the study encourages a discussion by the academic community on issues of the military security of the Lithuanian State and provides analyses as well as possible

  11. Improving human performance in maintenance personnel

    International Nuclear Information System (INIS)

    Gonzalez Anez, Francisco; Agueero Agueero, Jorge

    2010-01-01

    The continuous evolution and improvement of safety-related processes has included the analysis, design and development of training plans for the qualification of maintenance nuclear power plant personnel. In this respect, the international references in this area recommend the establishment of systematic qualification programmes for personnel performing functions or carrying out safety related tasks. Maintenance personnel qualification processes have improved significantly, and training plans have been designed and developed based on Systematic Approach to Training methodology to each job position. These improvements have been clearly reflected in recent training programmes with new training material and training facilities focused not only on developing technical knowledge and skills but also on improving attitudes and safety culture. The objectives of maintenance training facilities such as laboratories, mock-ups real an virtual, hydraulic loops, field simulators and other training material to be used in the maintenance training centre are to cover training necessities for initial and continuous qualification. Evidently, all these improvements made in the qualification of plant personnel should be extended to include supplemental personnel (external or contracted) performing safety-related tasks. The supplemental personnel constitute a very spread group, covering the performance of multiple activities entailing different levels of responsibility. Some of these activities are performed permanently at the plant, while others are occasional or sporadic. In order to establish qualification requirements for these supplemental workers, it is recommended to establish a rigorous analysis of job positions and tasks. The objective will be to identify the qualification requirements to assure competence and safety. (authors)

  12. Occupational stress among police personnel in India

    Directory of Open Access Journals (Sweden)

    G Ragesh

    2017-06-01

    Full Text Available Background: Occupational stress and associated physical and mental health related issues are not addressed in Indian police personnel with adequate importance. Methods: Cross-sectional survey was conducted among police personnel (both male and female in Calicut urban police district, Kerala state, India. Police personnel from all designations (ranks, except from the all India services (Indian Police Service were included in the study. Data were collected using a specifically designed datasheet covering socio-demographic profile, physical and mental health related details which was prepared by researchers. Occupational stress was measured using Operational Police Stress Questionnaire (PSQ-OP and Organisational Police Stress Questionnaire (PSQ-ORG. Result: The study found that both operational and organisational stress was significant among the police officers. Organisational stress was experienced in moderate level by 68% and in high level by 14%. Operational stress scores were in the moderate range in 67% and in high range in 16.5%. The younger age group (21-35 years and lower level rank police personnel had higher stress. Stress was higher among female police personnel compared to males. While 23% of them had been diagnosed with physical illnesses, a significant four per cent of them with mental illness, and 29% of them reported substance abuse. Conclusion: The results point to the high level of stress among Indian police personnel and the need for urgent interventions from the government to address the occupational stress.

  13. Assessing the Personal Financial Problems of Junior Enlisted Personnel

    National Research Council Canada - National Science Library

    Buddin, Richard

    2002-01-01

    .... Surveys of military personnel show that, particularly for junior personnel, financial problems constitute a major source of stress, subordinate only to increased workload and family separation...

  14. Nanotechnology in the Security

    CERN Document Server

    Kruchinin, Sergei

    2015-01-01

    The topics discussed at the NATO Advanced Research Workshop "Nanotechnology in the Security Systems" included nanophysics,   nanotechnology,  nanomaterials, sensors, biosensors security systems, explosive  detection . There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent advances in nanoscience have demonstrated that fundamentally new physical phenomena  are found when systems are reduced in size with  dimensions, comparable to the fundamental microscopic  length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nanodevices. This work will be of interest to researchers working in spintronics, molecular electronics and quantum information processing.

  15. The tracking and locating system of the mining personnel based on the Zigbee wireless network platform

    Energy Technology Data Exchange (ETDEWEB)

    Xiao-jia, Xie; Li-jun, Cheng; Yong, Wang [Chongqing University, Chongqing (China). College of Resources and Environmental Science

    2007-08-15

    By comparing the advanced Zigbee wireless network system with active RFID, the Zigbee wireless network technology was introduced into the system for tracking and locating of coal miners. The system structure and function characteristics were also introduced. This system makes it convenient to mine administrators, control room personnel and security inspectors to obtain information on the working hours and location of mine workers in the mine. 6 refs., 2 figs., 3 tabs.

  16. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  17. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  18. Burnout syndrome indices in Greek intensive care nursing personnel.

    Science.gov (United States)

    Karanikola, Maria N K; Papathanassoglou, Elizabeth D E; Mpouzika, Meropi; Lemonidou, Chrysoula

    2012-01-01

    Burnout symptoms in Greek intensive care unit (ICU) nurses have not been explored adequately. The aim of this descriptive, correlational study was to investigate the prevalence and intensity of burnout symptoms in Greek ICU nursing personnel and any potential associations with professional satisfaction, as well as with demographic, educational, and vocational characteristics. Findings showed that the overall burnout level reported by Greek ICU nursing personnel was at a moderate to high degree. The most pronounced symptom of burnout was depersonalization, whereas emotional exhaustion was found to be a strong predictor of job satisfaction. This is a factor connected with the nurses' intention to quit the job. It appears that work factors have a more powerful influence over the development of burnout in comparison to personality traits.

  19. R&D Personnel Career Routes: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Barbara Bigliardi

    2009-05-01

    Full Text Available This study, aiming at investigate the alternative modes of career development for personnel belonging to R&D staff, addresses the extent to which career anchors are applicable to R&D staff and to examine the relationship among career anchors, gender and age, with the final purpose to add elements of discussion to the long-lasting debate about this matter. With this purpose in mind, we developed a questionnaire survey among 309 R&D personnel employed at firms belonging to the food machinery industry in a Northern Italy district. The results obtained from the statistical analysis indicate that the R&D personnel’s career orientations is a predictor of their career routes preferences, confirming three possible career routes in R&D labs that were highlighted in previous studies.

  20. Vitamin D status in female military personnel during combat training

    Directory of Open Access Journals (Sweden)

    Young Andrew J

    2010-12-01

    Full Text Available Abstract Vitamin D is an essential nutrient for maintaining bone health. Recent data suggest that vitamin D and calcium supplementation might affect stress fracture incidence in military personnel. Although stress fracture is a health risk for military personnel during training, no study has investigated changes in vitamin D status in Soldiers during United States (US Army basic combat training (BCT. This longitudinal study aimed to determine the effects of BCT on 25-hydroxyvitamin D (25(OHD and parathyroid hormone (PTH levels in female Soldiers. Serum 25(OHD and PTH were assessed in 74 fasted Soldier volunteers before and after an 8-week BCT course conducted between August and October in Columbia, South Carolina. In the total study population, 25(OHD levels decreased (mean ± SD from 72.9 ± 30.0 to 63.3 ± 19.8 nmol/L (P P P P

  1. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  2. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  3. The European Union’s Aviation Security Mission in South Sudan

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Rodt, Annemarie Peen

    of the security situation in the country, all EU personnel were evacuated in January 2014, and the mission was (informally) terminated after fulfilling its mandated deployment period. Even though the mission had succeeded in training 350 personnel prior to the evacuation, its contribution to the overall security......When South Sudan gained independence in 2011, the new country needed assistance from external actors during the transition to prevent the security situation from deteriorating. In 2012 the EU launched its Aviation Security Mission (EUAVSEC) in South Sudan as part of its Common Security and Defence...... Policy. This came in response to a South Sudanese request for EU support and assistance in strengthening the security in Juba International Airport, as it had proven difficult for South Sudan to establish a fully operational transport hub. The EU estimated that an improvement of the airport security...

  4. Relation of management, supervision, and personnel practices to nuclear power plant safety

    International Nuclear Information System (INIS)

    Layton, W.L.; Turnage, J.J.

    1980-01-01

    The knowledge base of industrial/organization psychology suggests three major areas of research with important implications for nuclear power plant safety. These areas are: Management and Supervision: Personnel Selection, Training and Placement; and Organizational Climate. Evidence drawn from several Three Mile Island investigations confirms that organizational structure of plants and supervisory practices, the selection and training of personnel, and organizational climate are important factors. Difficulties in decision making and coordination of personnel are pinpointed. Deficiencies in training are highlighted and the climate of working atmosphere is discussed. These matters are related to nuclear power plant safety. Future research directions are presented

  5. About Security in Contemporary World

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2015-06-01

    Full Text Available The task to ensure security in contemporary world is a complicated political, scientific-technological and socio-economic problem. As the security itself is complicated, multifactor and hierarchized phenomen also its investigation has to be of an interdisciplinary character. The character of security environment, the character of security risks and threats and also the character of tools for their elimination are essentially changing. The basis to security of social subject consisted in arrangement of the conditions for their existence, to surviving in the present time and advancement into the future. Assurance of this condition means it provided ability to the social subjects to eliminated threats that are defined. In situations of asymmetrical security, the threats are not always clearly defined. They often consist of their own structure systems, in relationships and status the subjects of internationals relations. Asymmetrical of security, by our opinion, presents a discrepancy, unbalance, non-parity between subjects of the international security environment. The unbalance, discrepancy, non-parity has political, military, economic, law, social and societal dimensions.

  6. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  7. Work stress and health effects among university personnel.

    Science.gov (United States)

    Donders, N C G M; van der Gulden, J W J; Furer, J W; Tax, B; Roscam Abbing, E W

    2003-10-01

    (1) To investigate the contribution of job characteristics and personal characteristics to the explanation of health effects among university personnel; (2) to investigate the differences between scientific personnel (SP) and non-scientific personnel (NSP); (3) to investigate whether health effects occurred one after another. The well being at work of employees at a Dutch university (n=2,522) was investigated by means of a questionnaire. A model was constructed in which several job and personal characteristics were set out against health effects. The latter were assumed to occur in phases: decreased "job satisfaction" as an early effect, followed by increased "tension" and "emotional exhaustion", and possibly also by increased "perceived health complaints". The contribution of job and personal characteristics to the explanation of health effects was investigated by means of linear regression analysis, with separate analyses for SP and NSP. Positive job characteristics, especially professional expertise and work variety, contributed to the explanation of "job satisfaction". The major contributors to "tension" and "emotional exhaustion" were negative characteristics, such as work pressure. Besides the negative aspects, the major contributors to the explanation of "perceived health complaints" were sex, age and other health effects. In NSP, social support contributed to the explanation of "tension" and "emotional exhaustion", but not in SP. The explained variance of "job satisfaction" by the positive job characteristics in NSP was much higher than that in SP. To investigate whether health effects occurred one after another, we considered explained variance. Explained variance in "job satisfaction" was much higher than in "perceived health complaints". "Emotional exhaustion" and "tension" were in between. Contrary to expectations, decision latitude and social support played only minor roles. Also, the differences between SP and NSP were smaller than expected. As

  8. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  9. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  10. Scanning personnel for internal deposition of radioactive material with personnel contamination whole body friskers and portal monitors

    International Nuclear Information System (INIS)

    Lobdell, J.L.

    1996-01-01

    The potential for using personnel contamination devices such as whole body friskers and portal monitors for internal contamination monitoring was evaluated. Internally deposited radioactive material is typically determined with whole body counting systems. Whole body counts have traditionally been performed on personnel when they report for work, on a periodic basis (i.e., annually), when an uptake is suspected, and on termination. These counts incur significant expense. The monitored personnel pass through whole body friskers and portal monitors daily. This investigation was performed to determine if the external contamination monitors could provide an alternative to the more Costly whole body counting. The ability to detect 1% of a DAC for critical radioisotopes was applied as a detection criteria for this investigation. The results of whole body counts were used to identify the typical internal contamination radionuclides. From this list, the radioisotopes that would be the most difficult to measure were identified. From this review, 60 Co and 131 I were determined to be the critical radionuclides. One percent of a DAC for each isotope was placed, one at a time, in a humanoid phantom. The phantom was placed in the whole body frisker and open-quotes countedclose quotes. The phantom was carried through the portal monitor at a speed equivalent to a person walking through the monitor. Frequency of detection was derived for both systems. Practical aspects of integrating this screening system with traditional internal dosimetry programs are discussed

  11. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  12. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  13. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  14. Prototype system of secure VOD

    Science.gov (United States)

    Minemura, Harumi; Yamaguchi, Tomohisa

    1997-12-01

    Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.

  15. Social security and firm performance

    DEFF Research Database (Denmark)

    Lee, Sangheon; Torm, Nina

    2017-01-01

    This article investigates how social security provision - a key determinant of formality - impacts on small and medium-sized firm performance in Viet Nam. Based on enterprise census data covering all registered firms from 2006 to 2011, the authors find that firms which increase their social...... security coverage by 10 per cent experience a revenue gain of 1.4-2.0 per cent per worker and a profit gain of up to 1.8 per cent, depending on the survival time of the firm. However, given the time lag between 'investment' (in social security contributions) and returns (enhanced firm performance...

  16. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  17. Nuclear security culture: a generic model for universal application

    International Nuclear Information System (INIS)

    Khripunov, I.

    2005-01-01

    Full text: Nuclear security culture found its way into professional parlance several years ago, but still lacks an agreed-upon definition and description. The February 2005 U.S.-Russian Joint Statement, issued at the presidential summit meeting in Bratislava, referred specifically to security culture, focusing renewed attention on the concept. Numerous speakers at the March 2005 International Atomic Energy Agency's (IAEA) international conference on nuclear security referred to security culture, but their visions and interpretations were often at odds with one another. Clearly, there is a need for a generic model of nuclear security culture with universal applicability. Internationally acceptable standards in this area would be invaluable for evaluation, comparison, cooperation, and assistance. They would also help international bodies better manage their relations with the nuclear sectors in various countries. This paper will develop such a model. It will use the IAEA definition of nuclear security, and then apply Edgar Schein's model of organizational culture to security culture at a generic nuclear facility. A cultural approach to physical protection involves determining what attitudes and beliefs need to be established in an organization, how these attitudes and beliefs manifest themselves in the behavior of assigned personnel, and how desirable attitudes and beliefs can be transcribed into formal working methods to produce good outcomes, i.e., effective protection. The security-culture mechanism I will propose is broken into four major units: facility leadership, proactive policies and procedures, personnel performance, and learning and professional improvement. The paper will amplify on the specific traits characteristic of each of these units. Security culture is not a panacea. In a time of mounting terrorist threats, it should nonetheless be looked upon as a necessary organizational tool that enhances the skills of nuclear personnel and ensures that

  18. iPhone and iOS Forensics Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    CERN Document Server

    Hoog, Andrew

    2011-01-01

    As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.  iPhone market share has increased to 50% of worldwide mobile phone usageEmployment in digital fo

  19. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  20. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  1. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  2. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  3. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  4. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  5. 32 CFR 720.20 - Service of process upon personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Service of process upon personnel. 720.20... DELIVERY OF PERSONNEL; SERVICE OF PROCESS AND SUBPOENAS; PRODUCTION OF OFFICIAL RECORDS Service of Process and Subpoenas Upon Personnel § 720.20 Service of process upon personnel. (a) General. Commanding...

  6. Nuclear power plant personnel training and its evaluation. A guidebook

    International Nuclear Information System (INIS)

    1996-01-01

    The Guidebook will prove especially useful for, and is addressed primarily to: nuclear power operating organizations establishing or upgrading their NPP personnel training systems; regulatory personnel responsible for setting requirements and/or evaluating NPP personnel training; and organizations (within or outside the operating organization) responsible for the development, implementation and evaluation of training programmes for NPP personnel. Figs, tabs

  7. Systematic approach to personnel neutron monitoring

    International Nuclear Information System (INIS)

    Griffith, R.V.; Hankins, D.E.

    1980-01-01

    NTA film and albedo detectors represent the major portion of personnel dosimeters now used for occupational neutron monitoring. However, recent attention to the spectral response of these systems has demonstrated the need for detectors that have a better match to the fields being monitored. Recent developments in direct recoil track etch dosimeters present some intriguing alternatives, and careful use of 237 Np fission fragment detectors offers the advantage of a good dose equivalent spectral match. Work continues on a number of other new detector mechanisms, but problems with sensitivity, energy response, gamma interference, etc., continue to prevent development of most mechanisms into viable personnel dosimeters. Current dosimeter limitations make a systematic approach to personnel neutron monitoring particularly important. Techniques have been developed and tested, using available portable survey instruments, that significantly improve the quality of dosimeter interpretation. Even simple spectrometry can be done with modest effort, significantly improving the health physicists ability to provide accurate neutron monitoring

  8. Principles for enhancing professionalism of nuclear personnel

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1989-03-01

    The management principles in this publication were developed by a committee of senior utility officials with assistance by the staff of the Institute of Nuclear Power Operations (INPO) and with input from virtually all U.S. nuclear utilities. The principles are aimed at creating an environment within a nuclear power plant that promotes a healthy respect for the unique technology that nuclear electric power represents and, thus, to promote great care and conservative, thoughtful decision-making by the nuclear plant staff. The scope of the principles includes all nuclear personnel and gives guidance in the selection and development of management and supervisory personnel and other key individuals in the areas of operations, maintenance, technical support and engineering. Utility managers are encouraged to make in-depth comparisons between these principles and their day-to-day policies and practices, and to use such efforts as opportunities to communicate their organization's management philosophy to all nuclear personnel.

  9. Health physics personnel: a need unfulfilled

    International Nuclear Information System (INIS)

    Kathren, R.L.

    1983-01-01

    For the past decade, the demand for health physics personnel, at both the professional and technical levels, has been increasing, and indeed has become quite acute in recent years. The need for health physics personnel is demonstrated by a summary of projected requirements and potential candidates by the year 1991. Suggestions made for ensuring the availability of qualified health physics personnel includes: 1) a characterization study of health physicists should be conducted, with emphasis on industry, to determine qualifications, job satisfaction factors, and other data pertinent to entry and retention in the field; 2) the curricula currently offered by post-secondary schools should be evaluated for quality and relevance; and 3) an industry standard or protocol for qualification and training of health physics should be developed and implemented

  10. Principles for enhancing professionalism of nuclear personnel

    International Nuclear Information System (INIS)

    1989-01-01

    The management principles in this publication were developed by a committee of senior utility officials with assistance by the staff of the Institute of Nuclear Power Operations (INPO) and with input from virtually all U.S. nuclear utilities. The principles are aimed at creating an environment within a nuclear power plant that promotes a healthy respect for the unique technology that nuclear electric power represents and, thus, to promote great care and conservative, thoughtful decision-making by the nuclear plant staff. The scope of the principles includes all nuclear personnel and gives guidance in the selection and development of management and supervisory personnel and other key individuals in the areas of operations, maintenance, technical support and engineering. Utility managers are encouraged to make in-depth comparisons between these principles and their day-to-day policies and practices, and to use such efforts as opportunities to communicate their organization's management philosophy to all nuclear personnel

  11. Caffeine Use among Active Duty Navy and Marine Corps Personnel

    Science.gov (United States)

    Knapik, Joseph J.; Trone, Daniel W.; McGraw, Susan; Steelman, Ryan A.; Austin, Krista G.; Lieberman, Harris R.

    2016-01-01

    Data from the National Health and Nutrition Examination Survey (NHANES) indicate 89% of Americans regularly consume caffeine, but these data do not include military personnel. This cross-sectional study examined caffeine use in Navy and Marine Corps personnel, including prevalence, amount of daily consumption, and factors associated with use. A random sample of Navy and Marine Corps personnel was contacted and asked to complete a detailed questionnaire describing their use of caffeine-containing substances, in addition to their demographic, military, and lifestyle characteristics. A total of 1708 service members (SMs) completed the questionnaire. Overall, 87% reported using caffeinated beverages ≥1 time/week, with caffeine users consuming a mean ± standard error of 226 ± 5 mg/day (242 ± 7 mg/day for men, 183 ± 8 mg/day for women). The most commonly consumed caffeinated beverages (% users) were coffee (65%), colas (54%), teas (40%), and energy drinks (28%). Multivariable logistic regression modeling indicated that characteristics independently associated with caffeine use (≥1 time/week) included older age, white race/ethnicity, higher alcohol consumption, and participating in less resistance training. Prevalence of caffeine use in these SMs was similar to that reported in civilian investigations, but daily consumption (mg/day) was higher. PMID:27735834

  12. Caffeine Use among Active Duty Navy and Marine Corps Personnel

    Directory of Open Access Journals (Sweden)

    Joseph J. Knapik

    2016-10-01

    Full Text Available Data from the National Health and Nutrition Examination Survey (NHANES indicate 89% of Americans regularly consume caffeine, but these data do not include military personnel. This cross-sectional study examined caffeine use in Navy and Marine Corps personnel, including prevalence, amount of daily consumption, and factors associated with use. A random sample of Navy and Marine Corps personnel was contacted and asked to complete a detailed questionnaire describing their use of caffeine-containing substances, in addition to their demographic, military, and lifestyle characteristics. A total of 1708 service members (SMs completed the questionnaire. Overall, 87% reported using caffeinated beverages ≥1 time/week, with caffeine users consuming a mean ± standard error of 226 ± 5 mg/day (242 ± 7 mg/day for men, 183 ± 8 mg/day for women. The most commonly consumed caffeinated beverages (% users were coffee (65%, colas (54%, teas (40%, and energy drinks (28%. Multivariable logistic regression modeling indicated that characteristics independently associated with caffeine use (≥1 time/week included older age, white race/ethnicity, higher alcohol consumption, and participating in less resistance training. Prevalence of caffeine use in these SMs was similar to that reported in civilian investigations, but daily consumption (mg/day was higher.

  13. Pakistan: Can the United States Secure an Insecure State?

    Science.gov (United States)

    2010-01-01

    do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure

  14. Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.

    Science.gov (United States)

    Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru

    2016-01-01

    The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.

  15. Secure Storage Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  16. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Science.gov (United States)

    2012-07-23

    ... expatriate security company (the source is 32 CFR 159.3, section (3) of the definition of ``covered contract.... Such firms are, by definition, not small businesses because they are not U.S. firms. In the small... unpredictable high-threat environment where personnel performing security functions may be called upon to use...

  17. From personnel dose to personal dose

    International Nuclear Information System (INIS)

    Hoefert, M.; Raffnsoe, R.C.; Tuyn, J.W.N.; Wittekind, D.

    1985-01-01

    From following the development of personnel doses at CERN over the past six years it has become evident that work in areas of induced radioactivity is the principal cause of exposure. The results of photon dose measurements free-in-air and around a phantom are presented and discussed in the light of new quantities in individual monitoring. The importance of these results, with respect to the practical situation, is discussed and the problem of phantom size is mentioned. Finally, the results of dose measurements in the phantom are presented, since such information is important in cases where it becomes necessary to transform personnel doses into personal doses. (author)

  18. Qualification of nuclear power plant operations personnel

    International Nuclear Information System (INIS)

    1984-01-01

    With the ultimate aim of reducing the possibility of human error in nuclear power plant operations, the Guidebook discusses the organizational aspects, the staffing requirements, the educational systems and qualifications, the competence requirements, the ways to establish, preserve and verify competence, the specific aspects of personnel management and training for nuclear power plant operations, and finally the particular situations and difficulties to be overcome by utilities starting their first nuclear power plant. An important aspect presented in the Guidebook is the experience in training and qualification of nuclear power plant personnel in various countries: Argentina, Belgium, Canada, Czechoslovakia, France, Federal Republic of Germany, Spain, Sweden, United Kingdom and United States of America

  19. The training of the operation personnel

    International Nuclear Information System (INIS)

    Martin, H.D.

    1975-01-01

    A survey about training places and the volume of the training program for reactor personnel in the Federal Republic of Germany is given. Paragraph 7 of the atomic energy act, which imposes on the operators of nuclear energy plants the qualifired training of the personnel, is refered to. Positive experiences with the use of simulation equipment for training have led to the planning of a simulator-centre which is expected to be ready for operation in 1977. The versatile program of this centre is briefly reported. (ORU) [de

  20. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems