WorldWideScience

Sample records for policy frames security

  1. News framing and public support for a common foreign and security policy

    NARCIS (Netherlands)

    de Vreese, C.H.; Kandyla, A.

    2009-01-01

    Abstract A common EU foreign and security policy (CFSP) can be framed by elites and media as a risk or as an opportunity. This article examines the effects of framing in terms of ‘risk’ and ‘opportunity’ on public support. Moreover, we examine first whether the effect of framing CFSP as a ‘risk for

  2. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  3. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  4. Framing health and foreign policy: lessons for global health diplomacy.

    Science.gov (United States)

    Labonté, Ronald; Gagnon, Michelle L

    2010-08-22

    Global health financing has increased dramatically in recent years, indicative of a rise in health as a foreign policy issue. Several governments have issued specific foreign policy statements on global health and a new term, global health diplomacy, has been coined to describe the processes by which state and non-state actors engage to position health issues more prominently in foreign policy decision-making. Their ability to do so is important to advancing international cooperation in health. In this paper we review the arguments for health in foreign policy that inform global health diplomacy. These are organized into six policy frames: security, development, global public goods, trade, human rights and ethical/moral reasoning. Each of these frames has implications for how global health as a foreign policy issue is conceptualized. Differing arguments within and between these policy frames, while overlapping, can also be contradictory. This raises an important question about which arguments prevail in actual state decision-making. This question is addressed through an analysis of policy or policy-related documents and academic literature pertinent to each policy framing with some assessment of policy practice. The reference point for this analysis is the explicit goal of improving global health equity. This goal has increasing national traction within national public health discourse and decision-making and, through the Millennium Development Goals and other multilateral reports and declarations, is entering global health policy discussion. Initial findings support conventional international relations theory that most states, even when committed to health as a foreign policy goal, still make decisions primarily on the basis of the 'high politics' of national security and economic material interests. Development, human rights and ethical/moral arguments for global health assistance, the traditional 'low politics' of foreign policy, are present in discourse but do

  5. Framing health and foreign policy: lessons for global health diplomacy

    Directory of Open Access Journals (Sweden)

    Labonté Ronald

    2010-08-01

    Full Text Available Abstract Global health financing has increased dramatically in recent years, indicative of a rise in health as a foreign policy issue. Several governments have issued specific foreign policy statements on global health and a new term, global health diplomacy, has been coined to describe the processes by which state and non-state actors engage to position health issues more prominently in foreign policy decision-making. Their ability to do so is important to advancing international cooperation in health. In this paper we review the arguments for health in foreign policy that inform global health diplomacy. These are organized into six policy frames: security, development, global public goods, trade, human rights and ethical/moral reasoning. Each of these frames has implications for how global health as a foreign policy issue is conceptualized. Differing arguments within and between these policy frames, while overlapping, can also be contradictory. This raises an important question about which arguments prevail in actual state decision-making. This question is addressed through an analysis of policy or policy-related documents and academic literature pertinent to each policy framing with some assessment of policy practice. The reference point for this analysis is the explicit goal of improving global health equity. This goal has increasing national traction within national public health discourse and decision-making and, through the Millennium Development Goals and other multilateral reports and declarations, is entering global health policy discussion. Initial findings support conventional international relations theory that most states, even when committed to health as a foreign policy goal, still make decisions primarily on the basis of the 'high politics' of national security and economic material interests. Development, human rights and ethical/moral arguments for global health assistance, the traditional 'low politics' of foreign policy, are

  6. District Leaders' Framing of Educator Evaluation Policy

    Science.gov (United States)

    Woulfin, Sarah L.; Donaldson, Morgaen L.; Gonzales, Richard

    2016-01-01

    Purpose: Educator evaluation systems have recently undergone scrutiny and reform, and district and school leaders play a key role in interpreting and enacting these systems. This article uses framing theory to understand district leaders' interpretation and advancement of a state's new educator evaluation policy. Research Methods: The article…

  7. "Choice Set" for health behavior in choice-constrained settings to frame research and inform policy: examples of food consumption, obesity and food security.

    Science.gov (United States)

    Dover, Robert V H; Lambert, Estelle V

    2016-03-16

    Using the nexus between food consumption, food security and obesity, this paper addresses the complexity of health behavior decision-making moments that reflect relational social dynamics in context-specific dialogues, often in choice-constrained conditions. A pragmatic review of literature regarding social determinants of health in relation to food consumption, food security and obesity was used to advance this theoretical model. We suggest that health choice, such as food consumption, is based on more than the capacity and volition of individuals to make "healthy" choices, but is dialogic and adaptive. In terms of food consumption, there will always be choice-constrained conditions, along a continuum representing factors over which the individual has little or no control, to those for which they have greater agency. These range from food store geographies and inventories and food availability, logistical considerations such as transportation, food distribution, the structure of equity in food systems, state and non-government food and nutrition programs, to factors where the individual exercises a greater degree of autonomy, such as sociocultural foodways, family and neighborhood shopping strategies, and personal and family food preferences. At any given food decision-making moment, many factors of the continuum are present consciously or unconsciously when the individual makes a decision. These health behavior decision-making moments are mutable, whether from an individual perspective, or within a broader social or policy context. We review the construct of "choice set", the confluence of factors that are temporally weighted by the differentiated and relationally-contextualized importance of certain factors over others in that moment. The choice transition represents an essential shift of the choice set based on the conscious and unconscious weighting of accumulated evidence, such that people can project certain outcomes. Policies and interventions should avoid

  8. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  9. ?Choice Set? for health behavior in choice-constrained settings to frame research and inform policy: examples of food consumption, obesity and food security

    OpenAIRE

    Dover, Robert V. H.; Lambert, Estelle V.

    2016-01-01

    Objectives Using the nexus between food consumption, food security and obesity, this paper addresses the complexity of health behavior decision-making moments that reflect relational social dynamics in context-specific dialogues, often in choice-constrained conditions. Methods A pragmatic review of literature regarding social determinants of health in relation to food consumption, food security and obesity was used to advance this theoretical model. Results and discussion We suggest that heal...

  10. Cyber security policy guidebook

    CERN Document Server

    Bayuk, nifer L; Rohmeyer, l; Sachs, cus; Schmidt, frey; Weiss, eph

    2012-01-01

    This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue. It documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. Without using technical jargon, the book emphasizes the importance of critical and analytical thinking when making policy decisions.  It also equips the reader with descriptions of the impact of specific policy ch

  11. Framing and the health policy process: a scoping review.

    Science.gov (United States)

    Koon, Adam D; Hawkins, Benjamin; Mayhew, Susannah H

    2016-07-01

    Framing research seeks to understand the forces that shape human behaviour in the policy process. It assumes that policy is a social construct and can be cast in a variety of ways to imply multiple legitimate value considerations. Frames provide the cognitive means of making sense of the social world, but discordance among them forms the basis of policy contestation. Framing, as both theory and method, has proven to generate considerable insight into the nature of policy debates in a variety of disciplines. Despite its salience for understanding health policy debates; however, little is known about the ways frames influence the health policy process. A scoping review using the Arksey and O'Malley framework was conducted. The literature on framing in the health sector was reviewed using nine health and social science databases. Articles were included that explicitly reported theory and methods used, data source(s), at least one frame, frame sponsor and evidence of a given frame's effect on the health policy process. A total of 52 articles, from 1996 to 2014, and representing 12 countries, were identified. Much of the research came from the policy studies/political science literature (n = 17) and used a constructivist epistemology. The term 'frame' was used as a label to describe a variety of ideas, packaged as values, social problems, metaphors or arguments. Frames were characterized at various levels of abstraction ranging from general ideological orientations to specific policy positions. Most articles presented multiple frames and showed how actors advocated for them in a highly contested political process. Framing is increasingly an important, yet overlooked aspect of the policy process. Further analysis on frames, framing processes and frame conflict can help researchers and policymakers to understand opaque and highly charged policy issues, which may facilitate the resolution of protracted policy controversies. © The Author 2016. Published by Oxford

  12. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  13. Framing risk in pandemic influenza policy and control.

    Science.gov (United States)

    Seetoh, Theresa; Liverani, Marco; Coker, Richard

    2012-01-01

    This article explores differing understandings of 'risk' in relation to pandemic influenza policy and control. After a preliminary overview of methodological and practical problems in risk analysis, ways in which risk was framed and managed in three historical cases were examined. The interdependence between scientific empiricism and political decision-making led to the mismanagement of the 1976 swine influenza scare in the USA. The 2004 H5N1 avian influenza outbreak in Thailand, on the other hand, was undermined by questions of national economic interest and concerns over global health security. Finally, the recent global emergency of pandemic influenza H1N1 in 2009 demonstrated the difficulties of risk management under a context of pre-established perceptions about the characteristics and inevitability of a pandemic. Following the analysis of these cases, a conceptual framework is presented to illustrate ways in which changing relationships between risk assessment, risk perception and risk management can result in differing policy strategies.

  14. Analyzing Security-Enhanced Linux Policy Specifications

    National Research Council Canada - National Science Library

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  15. Framing and Claiming: How Information-Framing Affects Expected Social Security Claiming Behavior

    Science.gov (United States)

    Brown, Jeffrey R.; Kapteyn, Arie; Mitchell, Olivia S.

    2017-01-01

    This paper provides evidence that Social Security benefit claiming decisions are strongly affected by framing and are thus inconsistent with expected utility theory. Using a randomized experiment that controls for both observable and unobservable differences across individuals, we find that the use of a “breakeven analysis” encourages early claiming. Respondents are more likely to delay when later claiming is framed as a gain, and the claiming age is anchored at older ages. Additionally, the financially less literate, individuals with credit card debt, and those with lower earnings are more influenced by framing than others. PMID:28579641

  16. Framing and Claiming: How Information-Framing Affects Expected Social Security Claiming Behavior.

    Science.gov (United States)

    Brown, Jeffrey R; Kapteyn, Arie; Mitchell, Olivia S

    2016-03-01

    This paper provides evidence that Social Security benefit claiming decisions are strongly affected by framing and are thus inconsistent with expected utility theory. Using a randomized experiment that controls for both observable and unobservable differences across individuals, we find that the use of a "breakeven analysis" encourages early claiming. Respondents are more likely to delay when later claiming is framed as a gain, and the claiming age is anchored at older ages. Additionally, the financially less literate, individuals with credit card debt, and those with lower earnings are more influenced by framing than others.

  17. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...... AFRICOM and US actions in Africa could be seen as a true (newfound) American interest in Africa or whether actions that are considered low-key and low-budget in Washington are to be regarded as a true asymmetry because African states regard US action as important and significant. The paper will explain...

  18. Security Economics and European Policy

    Science.gov (United States)

    Anderson, Ross; Böhme, Rainer; Clayton, Richard; Moor, Tyler

    In September 2007, we were awarded a contract by the European Network and Information Security Agency (ENISA) to investigate failures in the market for secure electronic communications within the European Union, and come up with policy recommendations. In the process, we spoke to a large number of stakeholders, and held a consultative meeting in December 2007 in Brussels to present draft proposals, which established most had wide stakeholder support. The formal outcome of our work was a detailed report, “Security Economics and the Internal Market”, published by ENISA in March 2008. This paper presents a much abridged version: in it, we present the recommendations we made, along with a summary of our reasoning.

  19. Development and analysis of security policies in security enhanced Android

    OpenAIRE

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  20. Education Policy: Explaining, Framing and Forming

    Science.gov (United States)

    Adams, Paul

    2016-01-01

    This paper presents a new heuristic device for the analysis of educational policy. Through an examination of the Evaluative State and the work of Brian Fay, the paper considers the way in which educational policy is subject to rational and linear forms of policy action and implementation. To counter this, positioning theory is deployed to consider…

  1. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  2. Security Policy Alignment: A Formal Approach

    NARCIS (Netherlands)

    Pieters, Wolter; Dimkov, T.; Pavlovic, Dusko

    2013-01-01

    Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks,

  3. Contrasting frames in policy debates on climate change adaptation

    NARCIS (Netherlands)

    Dewulf, A.

    2013-01-01

    The process by which issues, decisions, or events acquire different meanings from different perspectives has been studied as framing. In policy debates about climate change adaptation, framing the adaptation issue is a challenge with potentially farreaching implications for the shape and success of

  4. Food Security Framings within the UK and the Integration of Local Food Systems

    Science.gov (United States)

    Kirwan, James; Maye, Damian

    2013-01-01

    This paper provides a critical interpretation of food security politics in the UK. It applies the notion of food security collective action frames to assess how specific action frames are maintained and contested. The interdependency between scale and framing in food security discourse is also scrutinised. It does this through an examination of…

  5. Obstacles in energy security: An analysis of congressional and presidential framing in the United States

    International Nuclear Information System (INIS)

    Below, Amy

    2013-01-01

    Despite decades of policymaking, the U.S. has only recently made significant strides in becoming a more energy secure nation. With a focus on the executive and legislative branches, this paper investigates two possible political obstacles to achieve this policy goal. The first question it asks is whether or not the two branches have been defining energy security in the same way. As the concept itself has no universal definition, it is possible that the branches have been focusing on different aspects of the term. Results from a content analysis of presidential speeches and congressional hearings suggest that no such division has occurred. The subsequent question asks whether or not the two branches, in tandem, are providing the foundation for sound policy. Results suggest that Congress and presidents have defined and discussed energy security in a generally balanced, comprehensive and internally non-conflictual way. What policy emerges from these discussions should be the subject of future research. -- Highlights: •A content-analysis of congressional hearings and presidential speeches was conducted. •Executive and legislative branches have been generally unified in how they frame the issue of energy security. •Both have avoided overreliance on sensationalized frames. •Both do not focus enough attention on energy efficiency and intensity

  6. Staffing Policy for Solving the Information Security

    Directory of Open Access Journals (Sweden)

    A. I. Tolstoy

    2012-06-01

    Full Text Available Determining staffing policy implementation of information security tasks is given. The basic requirements that must be taken into account when developing policies are defined. The policy framework is determined and recommendations for the design of such policies are formulated. Requirements for the implementation of the policy are defined.

  7. Iran's Security Policy in the Post-Revolutionary Era

    National Research Council Canada - National Science Library

    Byman, Daniel

    2001-01-01

    This report assesses Iran's security policy. It examines broad drivers of Iran's security policy, describes important security institutions, explores decisionmaking, and reviews Iran's relations with key countries...

  8. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  9. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  10. Framing the policy debate over spirits excise tax in Poland.

    Science.gov (United States)

    Zatonski, Mateusz; Hawkins, Benjamin; McKee, Martin

    2018-06-01

    Industry lobbying remains an obstacle to effective health-oriented alcohol policy. In 2013, an increase in excise tax on spirits was announced by the Polish government. This article presents a qualitative analysis of the public debate that ensued on the potential economic, health and social effects of the policy. It focuses on how competing groups, including industry actors, framed their position and sought to dominate the debate. Online archives of five Polish national newspapers, two spirits trade associations, and parliamentary and ministerial archives were searched. A thematic content analysis of the identified sources was conducted. The overall findings were compared with existing research on the framing of the Minimum Unit Pricing (MUP) debate in the UK. A total of 155 sources were analysed. Two main frames were identified: health, and economic. The spirits industry successfully promoted the economic frame in their own publications and in the media. The debate was dominated by arguments about potential growth of the grey market and losses in tax revenue that might result from the excise tax increase. The framing of the debate in Poland differed from the framing of the MUP debate in the United Kingdom. The Polish public health community was unsuccessful in making health considerations a significant element of the alcohol policy debate. The strategies pursued by UK health advocates offer lessons for how to make a more substantial impact on media coverage and promote health-oriented legislation.

  11. Securitizing Moves To Nowhere? The Framing of the European Union’s Energy Policy

    Directory of Open Access Journals (Sweden)

    Michal Natorski

    2008-07-01

    Full Text Available In 2006, debates about ‘energy security’ reached the top of the EU’s political agenda. A conjunction of political and economic factors seemed to be critically affecting the security of supply in most EU member states. A wide range of actors called for the establishment of a ‘Common Energy Policy,’ based on a fully operational Internal Energy Market and equipped with an external dimension enabling the EU to speak with one voice in the world. The results of this heated debate, however, fell short of these objectives. Informed by securitisation approaches, this article explores the debate over energy security that unfolded between 2005 and 2007. It aims to provide an understanding about why the framing of energy as a security issue did not mobilise enough support in favour of ground-breaking measures to tackle what was unanimously presented as a unique and especially hazardous situation. Specifically, the article will argue that those attempts to frame energy as a security issue in order to gain support for a Common Energy Policy have been of limited effect, precisely because the security framing contributed to the further legitimisation of EU member states’ reluctance to cede sovereignty in the energy domain.

  12. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  13. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  14. A frame-critical policy analysis of Canada's response to the World Food Summit 1998-2008.

    Science.gov (United States)

    Mah, Catherine L; Hamill, Catherine; Rondeau, Krista; McIntyre, Lynn

    2014-01-01

    The 2012 visit to Canada of Olivier De Schutter, the United Nations Special Rapporteur on the Right to Food, led to a public rebuff by Canadian governmental officials. This paper adapts the frame-critical policy analysis of Schön and Rein (1994), to explore the rhetorical basis for this conflict. This examination is offered as an illustrative example of how food insecurity is framed as a public policy problem in a high-income nation and how this framing has changed over time. We analyze Canada's decade of sequential responses to the 1996 World Food Summit, spanning 1998-2008, in the form of Canada's Action Plan on Food Security, and its subsequent Progress Reports. We conducted a qualitative policy analysis, adapting the frame-critical approach first delineated by Schön and Rein (1994). This analysis uses a social constructionist approach to map out the relationships between tacit understanding of policy by particular actors, explicit rhetoric in the public domain, and action in this policy area over time. We identify three key ways in which competing rhetorical frames arise over time: frame shifts (e.g., a shift away from language highlighting the right to food and health); frame blending (e.g., discussion about poverty becomes obscured by complexity discourse); and within-frame incongruence (e.g., monitoring for health indicators that are unrelated to policy solutions). Together, these frames illustrate how the conflict embodied in the UN Special Rapporteur's visit has been deeply woven into the policy discourse on food insecurity in Canada over time. Frame-critical analysis is instructive for exposing and also predicting tensions that impede forward progress on difficult policy issues. Accordingly, such analyses may be helpful in not only dissecting how policy can become 'stuck' in the process of change but in active reframing towards new policy solutions.

  15. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  16. European Security Organizations in the Post-Cold-War Security Environment. The New Frame of European Security

    National Research Council Canada - National Science Library

    Bugai, Veaceslav

    2006-01-01

    .... In particular, it gives an over view of the transformations that occurred within NATO and OSCE in the post-Cold War period, which have created and developed new security mechanisms and policies for dealing with crises...

  17. Information security policy development for compliance

    CERN Document Server

    Williams, Barry L

    2013-01-01

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will he

  18. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2006-01-01

    .... but provides the strong security guarantees of modern languages such as Java. A second avenue of language-based work explored a general class of policy enforcement mechanism based on in-line reference monitors (IRM...

  19. Guide to National Security Policy and Strategy

    National Research Council Canada - National Science Library

    Bartholomees, Jr, J. B

    2006-01-01

    ...: Theory of War and Strategy and National Security Policy and Strategy. The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues...

  20. Japan's National Security: Structures, norms, and policies

    International Nuclear Information System (INIS)

    Katzenstein, P.J.; Okawara, N.

    1993-01-01

    Japan's national security policy has two distinctive aspects that deserve analysis. First, Japan's definition of national security goes far beyond traditional military notions. National security is viewed in comprehensive terms that also include economic and political dimensions. The second feature of Japan's security policy worth explanation is a distinctive mixture of flexibility and rigidity in the process of policy adaptation to change: flexibility on issues of economic security, rigidity on issues of military security, and flexibility combined with rigidity on issues of political security. With the end of the Cold War and changes in the structure of the international system, it is only natural that we ask whether and how Japan's national security policy will change as well. Optimists insist that the Asian balance of power and the US-Japan relationship will make Japan aspire to be a competitive, noninterventionist trading state that heeds the universal interest of peace and profit rather than narrow aspirations for national power. Pessimists warn us instead that the new international system will finally confirm Herman Kahn's prediction of 1970: Japan will quickly change to the status of a nuclear superpower, spurred perhaps by what some see as a dangerous rise of Japanese militarism in the 1970s and 1980s

  1. The rise and fall of GO trading in European renewable energy policy. The role of advocacy and policy framing

    Energy Technology Data Exchange (ETDEWEB)

    Nilsson, Maans [Stockholm Environment Institute (SEI), Kraeftriket 2B, SE 10691 Stockholm (Sweden); Nilsson, Lars J.; Ericsson, Karin [Environmental and Energy Systems Studies, Lund University, Box 118, SE 22100 Lund (Sweden)

    2009-11-15

    This paper examines policy processes surrounding the rise and fall of the proposed EU-wide policy instrument designed to help achieve the EU's renewable energy targets - the trading of Guarantees of Origin (GO). It discusses its origins and examines factors in the policy processes over time leading first to its development and then to its abandonment. A first analysis looks at the near-term policy-making process before and after the proposal on GO trading in January 2008, focusing on the European policy-making institutions and influences of interest groups and member state governments. It then takes a step back and looks over a longer time period at how competing policy frames have shaped the agendas underlying the debate. Results show how a strong internal market frame acted as a primary driving force in the Commission to promote the GO trading instrument. The rejection of the GO trading proposal in the Council and Parliament can be largely attributed to the lack of a strong lobby in favour of GO, the accumulated experience with and institutionalisation of national RES support policies such as feed-in tariffs, and growing general political concerns for supply security, innovation and competitiveness. (author)

  2. The rise and fall of GO trading in European renewable energy policy: The role of advocacy and policy framing

    Energy Technology Data Exchange (ETDEWEB)

    Nilsson, Mans, E-mail: mans.nilsson@sei.s [Stockholm Environment Institute (SEI), Kraeftriket 2B, SE 10691 Stockholm (Sweden); Nilsson, Lars J.; Ericsson, Karin [Environmental and Energy Systems Studies, Lund University, Box 118, SE 22100 Lund (Sweden)

    2009-11-15

    This paper examines policy processes surrounding the rise and fall of the proposed EU-wide policy instrument designed to help achieve the EU's renewable energy targets-the trading of Guarantees of Origin (GO). It discusses its origins and examines factors in the policy processes over time leading first to its development and then to its abandonment. A first analysis looks at the near-term policy-making process before and after the proposal on GO trading in January 2008, focusing on the European policy-making institutions and influences of interest groups and member state governments. It then takes a step back and looks over a longer time period at how competing policy frames have shaped the agendas underlying the debate. Results show how a strong internal market frame acted as a primary driving force in the Commission to promote the GO trading instrument. The rejection of the GO trading proposal in the Council and Parliament can be largely attributed to the lack of a strong lobby in favour of GO, the accumulated experience with and institutionalisation of national RES support policies such as feed-in tariffs, and growing general political concerns for supply security, innovation and competitiveness.

  3. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  4. Energy supply security and foreign policy

    International Nuclear Information System (INIS)

    2006-05-01

    The title memo has been sent to the Dutch Lower House. This memo reflects the response of the cabinet to the advice on Energetic Foreign Policy of the Dutch Advisory Council on International Affairs (AIV) and the Dutch Energy Council (AER). Moreover, the development of foreign policy with respect to energy supply security is depicted. [mk] [nl

  5. Food Security: The Elaboration of Contested Claims to a Consensus Frame

    Science.gov (United States)

    Mooney, Patrick H.; Hunt, Scott A.

    2009-01-01

    This article demonstrates Gamson's claim that behind the apparent agreement implied by "consensus frames" lies considerable dissensus. Ironically, the very potency of consensus frames may generate contested claims to the ownership of a social problem. Food security is a potent consensus frame that has generated at least three distinct collective…

  6. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    The European Security and Defence Policy (ESDP), which is the operational military and civilian dimension of the Common Foreign and Security Policy (CFSP), is today one of the most dynamic areas of the European Union. However, it is only recently that the EU has acquired explicit military decision....... The Union is thus gradually emerging as an important player on the international scene, with a strategic vision, as well as diplomatic, civilian and military crisis-management instruments that complement the existing economic, commercial, humanitarian and development policies on which the EU has hitherto...... built its reputation as a ‘soft power'. Despite its rapid development, many still regard the EU as weak and ineffi cient when it comes to security and defence policy. Moreover, the EU struggles with internal divisions and has a strained relationship with NATO. Nonetheless, there are good reasons...

  7. Public values for energy futures: Framing, indeterminacy and policy making

    International Nuclear Information System (INIS)

    Butler, C.; Demski, C.; Parkhill, K.; Pidgeon, N.; Spence, A.

    2015-01-01

    In the UK there are strong policy imperatives to transition toward low carbon energy systems but how and in what ways such transitional processes might be realised remains highly uncertain. One key area of uncertainty pertains to public attitudes and acceptability. Though there is wide-ranging research relevant to public acceptability, very little work has unpacked the multiple questions concerning how policy-makers can grapple with and mitigate related uncertainties in efforts to enact energy systems change. In this paper, public acceptability is identified as an indeterminate form of uncertainty that presents particular challenges for policy making. We build on our existing research into public values for energy system change to explore how the outcomes of the project can be applied in thinking through the uncertainties associated with public acceptability. Notably, we illustrate how the public values identified through our research bring into view alternative and quite different problem and solution framings to those currently evident within UK policy. We argue that engagement with a wide range of different framings can offer a basis for better understanding and anticipating public responses to energy system change, ultimately aiding in managing the complex set of uncertainties associated with public acceptability. - Highlights: • We argue that public acceptability represents an indeterminate form of uncertainty. • This means alternative approaches to decision-making are required. • We introduce a public value set for energy system change. • We use this as a basis for interrogating current UK policy approaches to transitions. • Incorporating public values in policy can help tackle uncertainty about acceptability.

  8. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  9. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  10. US oil policy and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-05-01

    Although the energy dependence reached its historical maximum and will continue to increase for the next 20 years, the USA keep their oil policy. For the economist this policy is reasonable because of the poor room for the US imports reduction costs. To explain these conclusions the author discusses on the following topics: the links between the oil dependence and the energy security, the oil policy after Reagan, the oil policy evolution - or no evolution - facing the increasing dependency and the Cheney report. (A.L.B.)

  11. Food security policies in India and China

    DEFF Research Database (Denmark)

    Yu, Wusheng; Elleby, Christian; Zobbe, Henrik

    2015-01-01

    dependence on price-based measures causes relatively larger and more volatile fiscal burdens, thereby likely making it more vulnerable in dealing with similar events in the future. These findings have important implications for food policy and food security in the two countries in the future.......Food insecurity is a much more serious concern in India than China. In addition to income and poverty differences, we argue in this paper that differences in food policies can further explain the different food security outcomes across the two countries. First, India mostly uses price-based input...

  12. European Energy Policy and Its Effects on Gas Security

    Science.gov (United States)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  13. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  14. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  15. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. The role of discourse and linguistic framing effects in sustaining high carbon energy policy-An accessible introduction

    International Nuclear Information System (INIS)

    Scrase, J. Ivan; Ockwell, David G.

    2010-01-01

    This paper seeks to provide an accessible introduction to the relevance to energy policy of a fundamental insight from the policy sciences. This concerns the role that the linguistic framing of policy problems and solutions can play in sustaining the dominance of existing policy positions. The paper introduces a discourse perspective to understanding the policy process and uses it to analyse four central goals pursued in energy policy: access, security, efficiency and environmental acceptability, drawing on examples from UK policy documents. It introduces readers to how, as well as requiring technical and economic solutions, a transition to a low carbon energy system will also require a 'reframing' of energy policy problems and solutions in a way that either connects with, or overrides the powerful discourses that shape energy policy today.

  17. Modelling mobility aspects of security policies

    NARCIS (Netherlands)

    Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.; Barthe, G.; Burdy, L.; Huisman, Marieke; Lanet, J.-L.; Muntean, T.

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of

  18. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  19. The Flask Security Architecture: System Support for Diverse Security Policies

    Science.gov (United States)

    2006-01-01

    Flask microkernel -based operating sys­ tem, that successfully overcomes these obstacles to pol- icy flexibility. The cleaner separation of mechanism and...other object managers in the system to en- force those access control decisions. Although the pro­ totype system is microkernel -based, the security...mecha­ nisms do not depend on a microkernel architecture and will easily generalize beyond it. The resulting system provides policy flexibility. It sup

  20. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  1. Framing GM Crops as a Food Security Solution

    Science.gov (United States)

    Dibden, Jacqui; Gibbs, David; Cocklin, Chris

    2013-01-01

    The spectre of a food security crisis has raised important questions about future directions for agriculture and given fresh impetus to a long-standing debate about the potential contribution of agricultural biotechnology to food security. This paper considers the discursive foundations for promotion of agricultural biotechnology, arguing that…

  2. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  3. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    National Research Council Canada - National Science Library

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  4. Alignment of Organizational Security Policies -- Theory and Practice

    NARCIS (Netherlands)

    Dimkov, T.

    2012-01-01

    To address information security threats, an organization defines security policies that state how to deal with sensitive information. These policies are high-level policies that apply for the whole organization and span the three security domains: physical, digital and social. One example of a

  5. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  6. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  7. Three Modes of Thinking and Policy Orientation of Cultural Security

    Institute of Scientific and Technical Information of China (English)

    LIU Yuejin; Wang Xuege

    2016-01-01

    Three types of relations are entangled nowadays in dealing with issues conceming national cultural security on both the theoretical and practical levels:(1) the relation between one's own culture and that of other ethnic groups;(2) the relation between advanced and underdeveloped parts of culture;(3) the relation between one's ethnic culture and so-called foreign advanced culture as related to the previous two.Accordingly,three modes of thinking are likely adopted in handling issues concerning national cultural security:to antagonize one's own culture with that of other ethnic groups,that is,taking the "me or you" attitude;to dualize cultures as the "advanced" and the "underdeveloped",that is,believing things to be good if not bad,or vice versa;and to assert that the ethnic are the advanced,that is,taking the "only-megood" stance.It is a very demanding job to maintain national culture and to pursue cultural development at the same time.Only when cultures are grouped into those without distinction between the advanced and the underdeveloped and those with such distinction can the relation between the ethnic and the advanced be properly handled.With the former,it is essential to maintain the ethnicity of one's own culture before the cultural security is safeguarded.With the latter,however,the pursuit of advanced cultures and the advocacy of the advanced part of a particular culture is a key to ensuring and safeguarding the national cultural security.Hence,it is important to enhance the public awareness of cultural security,and more essentially for the government to offer scientifically appropriate orientation towards cultural security and to frame related policies.

  8. Protest Movements and the Security Policy of the Federal Republic of Germany Since 1950.

    Science.gov (United States)

    1983-12-01

    to rearmament. The state of mind that framed a majority of the members, however, remained one of 33 semi- abstentionism where German labor remained on...I 0D A132 201 PROTEST MOVEMENTS AND THE SECURI Y POLICY 0 THE FEDERAL REPUBLIC OF GERMANY SINCE 1950( U) NAVAL\\ POSTGRADUATE SCHOOL MONEREY CA A N...1 THESIS PROTEST MOVEMENTS AND THE SECURITY POLICY OF THE FEDERAL REPUBLIC OF GERMANY SINCE 1950 by Arthur Neil Black 0. December 1983 C-) LIJ Thesis

  9. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  10. Nuclear Cyber Security Issues and Policy Recommendations

    International Nuclear Information System (INIS)

    Lee, Cheol-Kwon; Lee, Dong-Young; Lee, Na-Young; Hwang, Young-Soo

    2015-01-01

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities

  11. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  12. Differential Effects of Message Framing on Obesity Policy Support Between Democrats and Republicans.

    Science.gov (United States)

    Lee, Tae Kyoung; Kim, Hye Kyung

    2017-12-01

    This study tests whether gain- and loss-framed messages about establishing obesity-reducing policies have different persuasive effects on Republicans and Democrats. In a randomized between-subject experiment, participants (N = 384) read a message emphasizing either benefits to a society by establishing policies aimed to reduce obesity (i.e., gain-framed message) or costs to a society that fails to establish those policies (i.e., loss-framed message). Results indicated that Democrats perceived the gain-framed message as more persuasive than the loss-framed message and the perceived argument strength fully mediated the framing effect on Democrats' policy support; however, there was no framing effect on perceived argument strength among Republicans. On the other hand, the gain-framed message led Republicans to attribute the cause of obesity less to the individual level compared to the loss-framed message and the no-message condition. We observed no framing difference among Democrats on causal attributions. Theoretical and practical implications of these findings are discussed.

  13. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  14. Economics of international energy security policy

    International Nuclear Information System (INIS)

    Paik, I.K.

    1992-01-01

    Because there is no inexpensive substitute for crude oil and petroleum products at the present time, an oil supply disruption inevitably leads to higher oil prices and economic losses. Wealth transfer to oil producing nations, reduced output increased unemployment and inflation. For these reasons, major oil-consuming countries currently have in place various oil emergency response measures to protect themselves from adverse economic consequences of oil supply disruptions: stockpiling emergency oil reserves to augment supplies, if necessary, in an emergency; and lowering oil demand through non-price mechanisms. The main purpose of this paper is to show that while, supply enhancement and demand reduction could have the same effect on oil prices in the event of an oil supply shortfall, they may have significantly different effects on the economies. Section I discusses the principal oil emergency response measures of the members of the International Energy Agency (IEA) -- emergency oil stockpiles and demand restraint -- and their policies for implementing the measures. Section II describes the analytical method used to perform comparative economic analysis of releasing emergency stocks and restraining demand in an oil emergency. Section III presents quantitative results of the analysis, and Section IV, conclusions of the analytical results and their energy security policy implications

  15. Frame contestation in the news: national identity, cultural resonance, and U.S. drone policy

    NARCIS (Netherlands)

    Rowling, C.M.; Sheets, P.; Jones, T.M.

    2013-01-01

    Scholarship suggests that disagreement among political officials significantly impacts how the press covers a particular policy issue and how the public perceives and comes to understand it. An unexplored area of research in the framing effects literature asks to what extent frame contestation

  16. Frames of Reference: A Metaphor for Analyzing and Interpreting Attitudes of Environmental Policy Makers and Policy Influencers

    Science.gov (United States)

    Swaffield

    1998-07-01

    / The concept of frame of reference offers a potentially useful analytical metaphor in environmental management. This is illustrated by a case study in which attitudes of individuals involved in the management of trees in the New Zealand high country are classified into seven distinctive frames of reference. Some practical and theoretical implications of the use of the frame metaphor are explored, including its potential contribution to the emerg- ing field of communicative planning. KEY WORDS: Frames of reference; Environmental policy analysis; Metaphor; New Zealand high country

  17. Energy policy of the EU and the role of Turkey in Energy Supply Security

    Directory of Open Access Journals (Sweden)

    MEHTER AYKIN Sibel

    2018-01-01

    Full Text Available All the nations define strategies and develop policies on national and international levels to eliminate risks against energy security. The aim of this paper is to define the energy policy of the European Union and identify the potential of Turkey in securing energy supply to the European Union. To achieve this end, after explaining the policy frame of the European Union and that of Turkey in energy related matters, the existing and planned energy routes expanding from the Russian Federation, Caspian Sea and the Middle East to the European Continent are mapped, and the role assigned to Turkey as an energy hub is exemplified with reference to its accession process. It is concluded that Turkey’s membership is to enrich the European Union and contribute to its energy supply security.

  18. European security and defense policy and its implications for Turkey

    OpenAIRE

    Özköse, Ö Faruk

    2002-01-01

    Cataloged from PDF version of article. The “European Security and Defense Policy” is an evolving process. Since the Maastricht Treaty (1991), the European Union members have been trying to constitute a common security and defense policy within the framework of Common Foreign and Security Policy, second pillar of the European Union. The efforts to create “separable but not separate” European forces within NATO have increased speed in the last years and changed direction towar...

  19. Challenges and opportunities for more integrated regional food security policy in the Caribbean Community

    Directory of Open Access Journals (Sweden)

    Kristen Lowitt

    2016-01-01

    Full Text Available The Caribbean Community (CARICOM has recognized regional integration as an important development strategy for addressing the unique vulnerabilities of its member small island developing states (SIDS. Food security in the Caribbean is a fundamental social and ecological challenge in which the dynamics of regional integration are increasingly playing out. CARICOM members have subsequently identified a number of shared food security problems and have endorsed regional goals and approaches to address them; however, progress towards solutions has been slow. Recognizing that evidence-based studies on the potential factors limiting sustained progress are lacking, we undertook a comparative policy analysis to understand better the various approaches and framings of food security at national and regional levels with a view to assessing coherence. We identify considerable divergence in how regional and local policy institutions frame and approach food security problems in CARICOM and then identify ways through which the policy integration objectives for enhanced regional food security might be progressed, with a particular focus on social learning.

  20. Between Accommodating and Activating: Framing Policy Reforms in Response to Workforce Aging across Europe.

    Science.gov (United States)

    Kroon, Anne C; Vliegenthart, Rens; van Selm, Martine

    2017-07-01

    In the past decade, European governments have implemented activating policy reforms to maximize older workers' employment and employability, representing a paradigmatic change in approaches to work and retirement. This study isolates the factors that explain the relative success and failure of competitive frames that are either in favor of or against activating policies in European news coverage, by applying time-series analysis (ordinary least squares with panel-corrected standard errors) to monthly aggregated news coverage in the Netherlands, the United Kingdom, Denmark, and Spain over the timespan 2006-2013. The results show that pro-activating and counteractivating frames generally coincide in competitive framing environments. The pro-activating frame proliferated in times of high employment protection, whereas the counteractivating frame prevailed stronger in conservative compared with progressive newspapers, and gained momentum during the aftermath of the financial crisis and in times governments on the economic left were in power. The study advances knowledge of competitive issue framing by demonstrating how the economic, policy, and political context matters for the emergence and evolvement of competing frames. In addition, the findings contribute to the understanding of the factors that contribute to news representations that promote active aging in European news, which may foster support for policy reforms that sustain older workers' employability.

  1. Information security policies and procedures a practitioner's reference

    CERN Document Server

    Peltier, Thomas R

    2004-01-01

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction First Things First: Identify the Sponsor Defining the Scope of Work Time Management Cost Management Planning for Quality Managing Human Resources Creating a Communications Plan Summary Planning and Preparation Introduction Objectives of Policies, Stand

  2. Framing the ecosystem concept through a longitudinal study of developments in science and policy.

    Science.gov (United States)

    Aggestam, Filip

    2015-08-01

    This paper examines how scientific literature and policy documents frame the ecosystem concept and how these frames have shaped scientific dialogue and policy making over time. This was achieved by developing a frame typology, as a basis for organizing relevant value expressions, to assess how different frames have altered perspectives of the ecosystem concept. The frame typology and analysis is based on a semi-grounded and longitudinal document analysis of scientific literature and policy documents using the ecosystem concept. Despite changing discourses and public priorities (e.g., cultural constructs of biodiversity) both science and policy documents are characterized by stable value systems that have not changed substantially since the 1930s. These value systems were defined based on ethical principles that delineate 6 core frames: humans first, dual systems, eco-science, eco-holism, animals first, and multicentrism. Specific crises (e.g., climate change) and cross-disciplinary uptake and re-uptake of, for example, the ecosystem services concept, have brought new perspectives to the forefront of public discourse. These developments triggered changes in the core frames that, rather than being value based, are based on how the ecosystem is conceptualized under fixed value systems and over time. Fourteen subframes were developed to reflect these longitudinal changes. There are as such clear framing effects in both scientific literature and in policy. Ecosystem research is for instance often characterized by unstated value judgments even though the scientific community does not make these explicit. In contrast, policy documents are characterized by clear value expressions but are principally management driven and human centered. © 2015 Society for Conservation Biology.

  3. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  4. Staying above the Fray: Framing and Conflict in the Coverage of Education Policy Debates

    Science.gov (United States)

    Tamir, Eran; Davidson, Roei

    2011-01-01

    This article examines the mass media's role in shaping education policy debates in light of pluralist theory and Bourdieu's social fields theory. We content analyzed the coverage of New Jersey education policy debates during 1985, when the governor moved to consolidate his power in the education field. We used quantitative framing and conflict…

  5. Adaptive governance, uncertainty, and risk: policy framing and responses to climate change, drought, and flood

    NARCIS (Netherlands)

    Hurlbert, M.; Gupta, J.

    2016-01-01

    As climate change impacts result in more extreme events (such as droughts and floods), the need to understand which policies facilitate effective climate change adaptation becomes crucial. Hence, this article answers the question: How do governments and policymakers frame policy in relation to

  6. Framing Teacher Education: Conceptions of Teaching, Teacher Education, and Justice in Chilean National Policies

    Science.gov (United States)

    Fernández, M. Beatriz

    2018-01-01

    Chile shows high inequity and socioeconomic stratification in both K-12 education and teacher preparation. Drawing on the notion of frames, this critical policy analysis examines how teaching, teacher education, and justice were conceptualized in Chile's teacher preparation policies between 2008-2015. It also analyzes the narrative stories…

  7. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  8. Framing mechanisms : the interpretive policy entrepreneur’s toolbox

    NARCIS (Netherlands)

    Aukes, Ewert; Lulofs, Kristiaan R.D.; Bressers, Johannes T.A.

    2017-01-01

    Policy entrepreneurs were, originally, neither conceived to be active meaning-makers nor did they interact with other actors. They invested other resources such as time, energy, reputation and money in coupling problems, solutions and politics. Adding the interpretive dimension of interactional

  9. Framing the Framework: Discourses in Australia's National Values Education Policy

    Science.gov (United States)

    Jones, Tiffany Mary

    2009-01-01

    In the past, many Australian state schools avoided teaching about values explicitly. However, the Australian government released Australia's first official values education policy in 2005: the "National Framework for Values Education in Australian Schools" (NFVEAS). This framework represents a local manifestation of the recent…

  10. ESCAPE. Energy Security and ClimAte Policy Evaluation

    International Nuclear Information System (INIS)

    Kessels, J.R.; Bakker, S.J.A.

    2005-05-01

    Climate change and energy supply security policy are currently not integrated in most countries, despite possible synergies. The ESCAPE approach suggests that linking climate change policy with security of energy supply could improve climate change policy at both a national and international level. The report explores the interaction between policies of energy security and climate change and the options of inclusion of energy security issues into national and international post-2012 climate negotiations. It emphasises the importance of the US in this regard and takes a close look at US energy policy documents. It appears that current US energy policy is not directed towards reducing its reliance on imported fossil fuel, even though the government has a strong preference for this. This study shows that measures to reduce import dependency are mostly synergetic with climate policy and gives some options that can be implemented. On an international level, linkages of energy security into post-2012 climate policy may be possible in sectoral bottom-up approaches or technology frameworks. As well, inclusion of a security of supply criterion in international emission trading instruments may provide potential benefits

  11. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  12. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  13. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  14. Economics, ethics, and climate policy: framing the debate

    Science.gov (United States)

    Howarth, Richard B.; Monahan, Patricia A.

    1996-04-01

    This paper examines the economic and ethical dimensions of climate policy in light of existing knowledge of the impacts of global warming and the costs of greenhouse gas emissions abatement. We find that the criterion of economic efficiency, operationalized through cost-benefit analysis, is ill-equipped to cope with the pervasive uncertainties and issues of intergenerational fairness that characterize climate change. In contrast, the concept of sustainable development—that today's policies should ensure that future generations enjoy life opportunities undiminished relative to the present—is a normative criterion that explicitly addresses the uncertainties and distributional aspects of global environmental change. If one interprets the sustainability criterion to imply that it is morally wrong to impose catastrophic risks on unborn generations when reducing those risks would not noticeably diminish the quality of life of existing persons, a case can be made for significant steps to reduce greenhouse gas emissions.

  15. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  16. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  17. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ...) and the North Atlantic Treaty Organization (NATO). Polish security policy and strategy is shaped by its geographical location, which places Poland in NATO's main strategic area opposite the Russian Federation and Belarus...

  18. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  19. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  20. Using the social security system to deliver housing policy

    OpenAIRE

    Cheung, Louise, Gee Wing

    2016-01-01

    This thesis examines the interaction between housing policy and the social security benefits that support housing costs. Analysis concerns the extent and type of State intervention in housing, thus explaining the dynamic between State and individual responsibility in housing policy. This thesis involves an exploration of the different treatment of the owner-occupied and the rented housing sectors, with reference to the social security benefits which fund ongoing housing costs. This thesis see...

  1. Agriculture development and food security policy in Eritrea - An ...

    African Journals Online (AJOL)

    Agriculture development and food security policy in Eritrea - An analysis. ... per cent of its total food needs and in poor years, it produces no more than 25 per cent. ... food security by introducing modern technology, irrigation, terracing, soil and ...

  2. Past Fame, Present Frames and Future Flagship? An Exploration of How Health is Positioned in Canadian Foreign Policy

    Science.gov (United States)

    Labonté, Ronald; Runnels, Vivien; Gagnon, Michelle

    2014-01-01

    Canada has been regarded as a model global citizen with firm commitments to multilateralism. It has also played important roles in several international health treaties and conventions in recent years. There are now concerns that its interests in health as a foreign policy goal may be diminishing. This article reports on a thematic analysis of key Canadian foreign policy statements issued over the past decade, and interviews with key informants knowledgeable of, or experienced in the interstices of Canadian health and foreign policy. It finds that health is primarily and increasingly framed in relation to national security and economic interests. Little attention has been given to human rights obligations relevant to health as a foreign policy issue, and global health is not seen as a priority of the present government. Global health is nonetheless regarded as something with which Canadian foreign policy must engage, if only because of Canada’s membership in many United Nations and other multilateral fora. Development of a single global health strategy or framework is seen as important to improve intersectoral cooperation on health issues, and foreign policy coherence. There remains a cautious optimism that health could become the base from which Canada reasserts its internationalist status. PMID:24977037

  3. Past Fame, Present Frames and Future Flagship? An Exploration of How Health is Positioned in Canadian Foreign Policy.

    Science.gov (United States)

    Labonté, Ronald; Runnels, Vivien; Gagnon, Michelle

    2012-06-01

    Canada has been regarded as a model global citizen with firm commitments to multilateralism. It has also played important roles in several international health treaties and conventions in recent years. There are now concerns that its interests in health as a foreign policy goal may be diminishing. This article reports on a thematic analysis of key Canadian foreign policy statements issued over the past decade, and interviews with key informants knowledgeable of, or experienced in the interstices of Canadian health and foreign policy. It finds that health is primarily and increasingly framed in relation to national security and economic interests. Little attention has been given to human rights obligations relevant to health as a foreign policy issue, and global health is not seen as a priority of the present government. Global health is nonetheless regarded as something with which Canadian foreign policy must engage, if only because of Canada's membership in many United Nations and other multilateral fora. Development of a single global health strategy or framework is seen as important to improve intersectoral cooperation on health issues, and foreign policy coherence. There remains a cautious optimism that health could become the base from which Canada reasserts its internationalist status.

  4. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2005-01-01

    .... One avenue of language-based work produced Cyclone, a type-safe variant of C. The Cyclone language retains the familiar syntax and semantics of C code, but provides the strong security guarantees of modem languages such as Java...

  5. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  6. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  7. Considerations When Including Students with Disabilities in Test Security Policies. NCEO Policy Directions. Number 23

    Science.gov (United States)

    Lazarus, Sheryl; Thurlow, Martha

    2015-01-01

    Sound test security policies and procedures are needed to ensure test security and confidentiality, and to help prevent cheating. In this era when cheating on tests draws regular media attention, there is a need for thoughtful consideration of the ways in which possible test security measures may affect accessibility for some students with…

  8. Rapid turns in European renewable energy policy: advocacy and framing of the proposed trading of guarantees of origin

    Energy Technology Data Exchange (ETDEWEB)

    Nilsson, Maans; Nilsson, Lars J.; Ericsson, Karin

    2008-10-15

    The EU has assumed ambitious targets and strategies for the promotion of renewable sources of energy (RES) binding to all its member states. This report sets out to examine the proposed EU-wide policy instrument designed to help achieve the targets on renewable electricity and heat - the trading of Guarantees of Origin (GO). It analyses the fate of the GO trading proposal in the European policy-making machinery during 2007 and 2008. It first discusses its origins, key components and points of contention, and then examines key factors behind the policy development leading first to its development and subsequently to its abandonment in 2008. Addressing these factors, the report explores first the near-term policy-making process before and after the proposal on GO trading was tabled in January 2008, focusing on processes in the European bureaucracy and how they were influenced by different interest groups and member state governments. It then takes a step back and looks at how competing policy frames over time have shaped the GO instrument debate. Results show how a strong internal market frame acted as a primary driving force in the Commission throughout the 2000s to promote the GO trading instrument. The subsequent collapse of the GO trading proposal can be largely attributed to a) the lack of a strong lobby in favour of GO, b) the accumulated experience with and institutionalisation of national RES support policy, and c) growing general political concerns for supply security, innovation and competitiveness. In the end, the fall of the GO trading instrument is indicative of how the underlying political battle line between advocates of the European internal market and guardians of national interests has moved in favour of the latter in recent years. (author). refs

  9. Position paper: A generic approach for security policies composition

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming

    2012-01-01

    When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic, that abst...

  10. Globally reasoning about localised security policies in distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    In this report, we aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax......, defined in detail in this report, and their behaviour is clearly established by the Semantics, also defined in detail in this report. The systems include the formal attachment of security policies into their locations, whose intended interactions are trapped by the policies, aiming at taking access...... control decisions of the system, and the Semantics also takes care of this. Using the Semantics, a Labelled Transition System (LTS) can be induced for every particular system, and over this LTS some model checking tasks could be done. We identify how this LTS is indeed obtained, and propose an alternative...

  11. The Political Economy of Carbon Securities and Environmental Policy

    DEFF Research Database (Denmark)

    Polborn, Sarah

    The costs of the current suboptimal carbon abatement policy are likely in the range of 3 to 6 trillion 2005 US dollars. Using methods from the political economy of environmental policy, the paper develops a new carbon abatement policy instrument, carbon securities. A carbon security entitles its...... owner to a ?xed proportion of ex ante unknown total emissions. This creates an additional group of stakeholders on the side of the issue that has traditionally been underrepresented. The advantages over existing systems include an equilibrium carbon price closer to the social optimum, a more predictable...

  12. Family Economic Security Policies and Child and Family Health.

    Science.gov (United States)

    Spencer, Rachael A; Komro, Kelli A

    2017-03-01

    In this review, we examine the effects of family economic security policies (i.e., minimum wage, earned income tax credit, unemployment insurance, Temporary Assistance to Needy Families) on child and family health outcomes, summarize policy generosity across states in the USA, and discuss directions and possibilities for future research. This manuscript is an update to a review article that was published in 2014. Millions of Americans are affected by family economic security policies each year, many of whom are the most vulnerable in society. There is increasing evidence that these policies impact health outcomes and behaviors of adults and children. Further, research indicates that, overall, policies which are more restrictive are associated with poorer health behaviors and outcomes; however, the strength of the evidence differs across each of the four policies. There is significant diversity in state-level policies, and it is plausible that these policy variations are contributing to health disparities across and within states. Despite increasing evidence of the relationship between economic policies and health, there continues to be limited attention to this issue. State policy variations offer a valuable opportunity for scientists to conduct natural experiments and contribute to evidence linking social policy effects to family and child well-being. The mounting evidence will help to guide future research and policy making for evolving toward a more nurturing society for family and child health and well-being.

  13. Development and Analysis of Security Policies in Security Enhanced Android

    Science.gov (United States)

    2012-12-01

    by Tresys Technology [32]. The suite contains tools for SE policy creation, management, and analysis. Apol provides a graphical interface for...runs under a predefined platform user: system, nfc , radio, etc. The third and fourth checks simply deal with different user strings, with fixed...system user id to the system domain and their application directories to system_data_file. Similarly, applications under the nfc and radio user id

  14. Energy security of supply under EU climate policies

    International Nuclear Information System (INIS)

    Groenenberg, H.; Wetzelaer, B.J.H.W.

    2006-12-01

    The implications of various climate policies for the security of supply in the EU-25 were investigated. The security of supply was quantified using the Supply/Demand (S/D) Index. This index aggregates quantitative information on a country's energy system into one single figure. It takes a value between 0 and 100, with higher values indicating a more secure energy system. The S/D Index was calculated for the year 2020 based on the information in a series of policy scenarios, including a baseline (S/D Index 50.7), an energy efficiency scenario (53.8), two renewable energy scenarios (52.6 and 53.3) and two scenarios with combined policies (55.9 and 55.6).The S/D Index proved a useful indicator for assessing the implications of climate policies for the security of supply. As climate policies become more stringent, CO2 index fall, and the S/D index increases. The magnitude of the changes in the two indices is not always similar however. Major falls in CO2 indices in the order of 20% for two scenarios with combined energy efficiency and renewable energy polices lead to less noteworthy improvements in the associated S/D indices. Nevertheless, this combination of policies leads to the greatest improvements in the security of supply

  15. Beyond policy networks: policy framing and the politics of expertise in the 2001 Foot and Mouth Disease crisis.

    Science.gov (United States)

    Wilkinson, Katy; Lowe, Philip; Donaldson, Andrew

    2010-01-01

    For the past decade, the policy community/issue network typology of pressure group interaction has been used to explain policy outcomes and the policy-making process. To re-examine the validity of this typology, the paper focuses on the UK government's response to the 2001 Foot and Mouth Disease (FMD) crisis, and in particular the decision to pursue contiguous culling rather than vaccination to overcome the epidemic. Rather than illustrating the emergence of an issue network in agricultural policy, the decision-making process of the FMD outbreak demonstrates continuity with prior crises. In addition, the politicization of scientific expertise is identified as an emerging trend in crisis management. Policy framing is used to explain the impetus behind the contiguous cull decision, concluding that the legacy of previous policy choices conditioned the crisis response to a far greater degree than contemporaneous pressure group action.

  16. Elements of ESA's policy on space and security

    Science.gov (United States)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  17. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  18. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  19. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  20. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  1. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  2. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  3. Renewable energy policy design and framing influence public support in the United States

    Science.gov (United States)

    Stokes, Leah C.; Warshaw, Christopher

    2017-08-01

    The United States has often led the world in supporting renewable energy technologies at both the state and federal level. However, since 2011 several states have weakened their renewable energy policies. Public opinion will probably be crucial for determining whether states expand or contract their renewable energy policies in the future. Here we show that a majority of the public in most states supports renewable portfolio standards, which require a portion of the electricity mix to come from renewables. However, policy design and framing can strongly influence public support. Using a survey experiment, we show that effects of renewable portfolio standards bills on residential electricity costs, jobs and pollution, as well as bipartisan elite support, are all important drivers of public support. In many states, these bills' design and framing can push public opinion above or below majority support.

  4. Communicating Inequalities to Enhance Support for Obesity-Prevention Policies: The Role of Social Comparisons, Age Frames, and Emotion.

    Science.gov (United States)

    Skurka, Chris

    2017-11-28

    With certain populations in the United States at higher risk for obesity than other populations, public health advocates have attempted to draw attention to these inequalities to galvanize support for obesity-mitigation policies. Yet research comparing different messages about social inequalities indicates that not all social comparisons are persuasive. Drawing on Weiner's (1986) theory of perceived responsibility and social motivation, I experimentally tested promising message frames about obesity disparities. Participants (N = 653) read one of six messages following a 3 (social comparison frame: geographic vs. racial vs. no-comparison) × 2 (age frame: child vs. adult) between-subjects design. Unexpectedly, geographic frames (rural/urban) indirectly decreased policy support relative to the control frame by way of increased counterarguing. Compared to adult frames about obesity inequalities, childhood frames evoked more sympathy and less internal attribution, which in turn positively predicted support for obesity-prevention policies. Practical and theoretical implications of these findings are discussed.

  5. Desire or Disease? Framing Obesity to Influence Attributions of Responsibility and Policy Support.

    Science.gov (United States)

    McGlynn, Joseph; McGlone, Matthew S

    2018-02-01

    The way we describe health threats affects perceptions of severity and preferred solutions to reduce risk. Most people agree obesity is a problem, but differ in how they attribute responsibility for development and decline of the disease. We explored effects of message framing on attributions of responsibility and support for public obesity policies using a 3 × 2 factorial design. Participants read one of six versions of a health message describing the negative effects of obesity. Message frames influenced respondent attributions and their support for policies to reduce obesity. Those who read a message that assigned agency to the disease (e.g., Obesity causes health problems) endorsed genetics as the cause to a greater degree than those who read a semantically equivalent message that instead assigned agency to people (e.g., Obese people develop health problems). In contrast, assigning agency to people rather than to the disease prompted higher attributions of individual responsibility and support for public policies. Explicit message frames that directly connected responsibility for obesity to either individual or societal factors had no effect on respondent perceptions. Findings suggest explicit arguments may be less effective in shifting perceptions of health threats than arguments embedded in agentic message frames. The results demonstrate specific message features that influence how people attribute responsibility for the onset and solution of obesity.

  6. National Security Implications of Global Warming Policy

    Science.gov (United States)

    2010-03-01

    Although numerous historical examples demonstrate how actual climate change has contributed to the rise and fall of powers, global warming , in and of...become convinced that global warming is universally bad and humans are the primary cause, political leaders may develop ill-advised policies restricting

  7. Group Policy Fundamentals, Security, and the Managed Desktop

    CERN Document Server

    Moskowitz, Jeremy

    2010-01-01

    The ultimate Group Policy guide-now updated for Windows 7 and Server 2008 R2!. IT and network administrators can streamline their Windows Server management tasks by using Group Policy tools to automate or implement rules, processes, or new security across the enterprise. In this comprehensive guide, Microsoft Group Policy MVP Jeremy Moskowitz thoroughly explores Group Policy across all Windows platforms, including the latest on Windows 7 and Server 2008 R2. If you're a Windows network administrator managing scores of users and computers, you need this essential reference on your desk.: Covers

  8. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  9. Household Food Security Policy Analysis A System Dynamics Perspective

    Directory of Open Access Journals (Sweden)

    Isdore Paterson Guma

    2015-08-01

    Full Text Available Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodology questionnaires and interview guide were used to unearth food security challenges faced by households. A causal loop diagram was drawn. The model demonstrates a balance between food stock seeds preserved seeds for sale and consumption from crop harvest throughout the food cycles. This research makes contribution to the literature by evaluating dynamic synthesis methodology and FS policy discussions from a feedback point of view.

  10. Security Policy for a Generic Space Exploration Communication Network Architecture

    Science.gov (United States)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  11. The Evolution of the European Security Policy

    Directory of Open Access Journals (Sweden)

    Vasilica Negrut

    2010-06-01

    Full Text Available The process of development of the European Union’s security dimension has known a spectacular evolution in the past years, passing from political consultation to establishing objectives, then commonactions and positions; at a practical level, the Petersburg measures, carried on initially by the Western European Union as an armed branch of the European Union, have been replaced by actions of implication ofthe Union in managing some conflicts. The Lisbon Treaty confirms the commitments of the member states and mentions the fact that the European Union will dispose of the necessary measures for the defense of its objectives and to contribute to world peace and stability.

  12. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  13. Adaptive Governance, Uncertainty, and Risk: Policy Framing and Responses to Climate Change, Drought, and Flood.

    Science.gov (United States)

    Hurlbert, Margot; Gupta, Joyeeta

    2016-02-01

    As climate change impacts result in more extreme events (such as droughts and floods), the need to understand which policies facilitate effective climate change adaptation becomes crucial. Hence, this article answers the question: How do governments and policymakers frame policy in relation to climate change, droughts, and floods and what governance structures facilitate adaptation? This research interrogates and analyzes through content analysis, supplemented by semi-structured qualitative interviews, the policy response to climate change, drought, and flood in relation to agricultural producers in four case studies in river basins in Chile, Argentina, and Canada. First, an epistemological explanation of risk and uncertainty underscores a brief literature review of adaptive governance, followed by policy framing in relation to risk and uncertainty, and an analytical model is developed. Pertinent findings of the four cases are recounted, followed by a comparative analysis. In conclusion, recommendations are made to improve policies and expand adaptive governance to better account for uncertainty and risk. This article is innovative in that it proposes an expanded model of adaptive governance in relation to "risk" that can help bridge the barrier of uncertainty in science and policy. © 2015 Society for Risk Analysis.

  14. Effect of Steel Framing for Securing Drywall Panels on Thermal and Humidity Parameters of the Outer Walls

    Science.gov (United States)

    Major, Maciej; Kosiń, Mariusz

    2017-12-01

    The paper analyses the effect of steel framing used to secure drywall panels on thermal and humidity properties of outer walls. In the practice of building a light structure, the most popular components are steel and wood studs. They are used to obtain framing for building a wall (an outer wall in this study). Analysis presented in this study concerned the corner of the outer wall build using the technology of light steel framing. Computer simulation was used to perform thermal and humidity analysis for the joint of the outer wall.

  15. Effect of Steel Framing for Securing Drywall Panels on Thermal and Humidity Parameters of the Outer Walls

    Directory of Open Access Journals (Sweden)

    Major Maciej

    2017-12-01

    Full Text Available The paper analyses the effect of steel framing used to secure drywall panels on thermal and humidity properties of outer walls. In the practice of building a light structure, the most popular components are steel and wood studs. They are used to obtain framing for building a wall (an outer wall in this study. Analysis presented in this study concerned the corner of the outer wall build using the technology of light steel framing. Computer simulation was used to perform thermal and humidity analysis for the joint of the outer wall.

  16. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  17. Youth, Privacy and Online Media: Framing the right to privacy in public policy-making

    DEFF Research Database (Denmark)

    Hasselbalch, Gry; Jørgensen, Rikke Frank

    2015-01-01

    debate. It presents the results of a qualitative study amongst 68 Danish high school students concerning how they perceive, negotiate and control their private sphere when using social media and builds a case for utilizing the results of studies as this to inform the ongoing policy discourses concerning...... policy making that the right to privacy is challenged in new ways in a structurally transformed online public sphere, the way in which it has been framed does not seem to acknowledge this transformation. This paper therefore argues for a reformulation of “online privacy” in the current global policy......The right to privacy is a fundamental human right defined in international and regional human rights instruments. As such it has been included as a core component of key legislature and policy proceedings throughout the brief history of the World Wide Web. While it is generally recognized in public...

  18. Features of modern security policy UK political parties

    Directory of Open Access Journals (Sweden)

    A. V. Stalovierova

    2015-12-01

    Full Text Available The security policy of the British coalition government of D. Cameron (2010-2015 is summarized; it’s been proved that political forces of Tory and Liberal Democrat should have compromised to carry out unanimous course in the scope of national security, and the problems of the security strategy on parliamentary elections in 2015 are analyzed, particularly the comparative analysis of the modern safety strategy of leading British parties is exercised. Under conditions of the appearance of new challenges and threats, transformation of international safety system, the questions of safety policy often become the object of attention of the British community and experts. The absence of cross-party consensus on most terms of safety strategy of the United Kingdom during the election campaign in 2015 makes the discussion about perspectives of the British safety policy still more urgent. During the election campaign there was no unity on any aspect of security subject between parties. First of all, Labourists, Liberal Democrats, Scottish National Party and Green Party made a statement about readiness to develop cooperation with the EU and the Conservatives and the UK Independence Party were on the side of the Eurosceptics. The opinions of the parties were also divided on military operations abroad, financing and force level. In terms of one-party government and presence of majority in the House of Commons, the Conservatives have opportunities to realize their own vision of British safety policy.

  19. Reviewing and reforming policy in health enterprise information security

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2001-08-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.

  20. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  1. Information security policy: contributions from internal marketing for its effectiveness

    Directory of Open Access Journals (Sweden)

    Cristiane Ellwanger

    2012-06-01

    Full Text Available Protecting sources of information has become a great challenge to the organizations, due to the advance of the information technologies, the integration between them and the constant stream of information that flows through the communication networks. The establishment of an Information Security Policy – PSI may resolve a part of the problems related to security, but it cannot totally solve them, since the human resources present in the internal environment of the organizations may spoil the effectiveness of the PSI. Given the importance of the human aspects in the context of the information security, the present work discusses the use of internal marketing as a management strategy in order to obtain or reestablish the commitment of the users to the principles defined in the PSI, and demonstrates, through an experimental research, the impact of using internal marketing techniques to the effectiveness of that policy. The results of this experiment make quantitatively evident how relevant the use of these techniques may be in order to have the procedures described in the PSI actually carried out by the users, and demonstrates a 402,4% increase in the support to the information security policy, considering the procedures indicated in the PSI that were totally executed.

  2. The Faroe Islands’ Security Policy in a Process of Devolution

    Directory of Open Access Journals (Sweden)

    Beinta í Jákobsstovu

    2012-12-01

    Full Text Available Since the late 1990s there has been a remarkable change in the institutional context of safety and security policies for the Faroes. The end of the Cold War led to a reduction in the strategic importance of, and military presence in, the islands. However, today Faroese sea and air space is increasingly exposed to heavy civilian traffic due to expected oil production as well as new sailing routes from the High North. The Faroese government is in a process, nearly completed, of taking over the full responsibility for societal security policy, a field it used to share with the Danish state authorities. In April 2002, the Faroese authorities took over the responsibility for SAR in Faroese sea territory and established a MRCC Center in Tórshavn. A new civic security law was passed by Løgtingið (the parliament in May 2012. This article discusses micro-states’ options in the international arena; provides a brief overview of the history of Faroese security policy; and discusses the present and future challenges involved in assuring protection and rescue services for the Faroese region of the North Atlantic.

  3. The French nuclear policy. A model for security policy in North-East Asia

    International Nuclear Information System (INIS)

    Choe, K.

    1998-01-01

    Between the end of the second world war and the collapse of the Berlin wall, the French diplomacy was based on the nuclear policy in a solid and coherent way. This nuclear policy was an 'incarnation' of the national security conception, allowing France to recover its political, military and economical rank on the international scene. The most important characteristic of the French nuclear policy concerns the commercialization of the nuclear energy which aims to ensuring the national security through the building up of a financial, technological and political 'reserve'. In front of the domination of the USA and USSR during the cold war era, NE Asia had a similar geostrategic configuration as Western Europe. It concerns in particular the massive application of nuclear energy for both military and industrial purposes. The bases of the security policy in this region refers to the real use of the nuclear weapon by the USA against Japan in 1945. The French nuclear policy may be considered as a model for the building of the security policy of NE Asia, in particular through the commercialization of the nuclear technology between the countries in concern. This nuclear approach would allow the countries of these region to change their present day national defense policy into an economical and military cooperation. (J.S.)

  4. STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA

    Directory of Open Access Journals (Sweden)

    CRISTINA-MARIA RĂDULESCU

    2015-12-01

    Full Text Available The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc.

  5. BASES OF PUBLIC POLICY FORMATION DIRECTED AT ENSURING BUDGET SECURITY

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2015-03-01

    Full Text Available In the article the priorities and public policies that can improve the safety level of the budget of Ukraine have been grounded. Attention on the problems of imbalance and deficiency trends accumulation of public debt has been focused. The detailed analysis of the budget deficit of the European community to further research the main problems of fiscal security has been carried out. The formation of the concept of budget policy should include long-term and medium-term priorities of the state priorities areas have been concluded. Budget policy on public debt must deal with interrelated issues of debt bondage and effective use of public credit, promote economic growth with respect safe level and structure of public debt have been emphasized by author. Debt policy as part of fiscal policy under certain conditions can be a powerful tool to intensify investment and innovation processes in society, promote economic and social development. The reorientation of fiscal policy to address current problems through debt and use it as the basis of investment and innovation development provides an effective public debt management is designed to reduce state budget expenditures on its servicing and repayment, optimizing the scope and structure of debt according to economic growth. The role of debt policy in modern terms increases is clearly subordinate to and consistent with long-term goals and priorities of fiscal policy. There is an urgent development and implementation of effective mechanisms for investing borrowed resources, increasing the efficiency of public investment, including the improvement of organizational, financial, legal and controls. Strategically budget security guarantees only competitive economy, which can be constructed only by recovery and accelerated development of promising sectors of the national economy in the presence of a balanced budget policy. Now there is a tendency to implement only measures to stabilize the political and socio

  6. Visa Security Policy: Roles of the Departments of State and Homeland Security

    Science.gov (United States)

    2011-06-30

    Cong., 2nd sess., April 20, 1950. 13 8 U.S.C. 1104 . 14 8 U.S.C. 1201. AILA InfoNet Doc. No. 11071267. (Posted 07/12/11) Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS automated

  7. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  8. Information security policies for governmental organisations, the minimum criteria

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2009-07-01

    Full Text Available and retention of documents. 18) Incident response. The policy discusses issues concerning how an organisation responds quickly and effectively to a system or network security breach [13]. 19) Contingency planning. The policy needs to address contingency... _ 17. Document destruction and retention X _ X X 18. Incident response X X X X 19. Contingency planning X _ X X 20. Telecommuting and mobile computing _ _ X _ 21. Intrusion Detection Systems X X X X From Table 1 it can be detained that not all...

  9. Analysing "Migrant" Membership Frames through Education Policy Discourse: An Example of Restrictive "Integration" Policy within Europe

    Science.gov (United States)

    Dubois-Shaik, Farah

    2014-01-01

    This article proposes combining discourse theory and perspectives on political membership developments in Western European societies. It combines theories and examples of policy discourses about "migrant integration" in the Swiss national context in the sphere of education. This examination aims to deconstruct specific membership framing…

  10. The Effect of Framing and Normative Messages in Building Support for Climate Policies

    Science.gov (United States)

    Hurlstone, Mark J.; Lewandowsky, Stephan; Newell, Ben R.; Sewell, Brittany

    2014-01-01

    Deep cuts in greenhouse gas emissions are required to mitigate climate change. However, there is low willingness amongst the public to prioritise climate policies for reducing emissions. Here we show that the extent to which Australians are prepared to reduce their country's CO2 emissions is greater when the costs to future national income are framed as a “foregone-gain”—incomes rise in the future but not by as much as in the absence of emission cuts—rather than as a “loss”—incomes decrease relative to the baseline expected future levels (Studies 1 & 2). The provision of a normative message identifying Australia as one of the world's largest CO2 emitters did not increase the amount by which individuals were prepared to reduce emissions (Study 1), whereas a normative message revealing the emission policy preferences of other Australians did (Study 2). The results suggest that framing the costs of reducing emissions as a smaller increase in future income and communicating normative information about others' emission policy preferences are effective methods for leveraging public support for emission cuts. PMID:25501009

  11. The effect of framing and normative messages in building support for climate policies.

    Directory of Open Access Journals (Sweden)

    Mark J Hurlstone

    Full Text Available Deep cuts in greenhouse gas emissions are required to mitigate climate change. However, there is low willingness amongst the public to prioritise climate policies for reducing emissions. Here we show that the extent to which Australians are prepared to reduce their country's CO2 emissions is greater when the costs to future national income are framed as a "foregone-gain"--incomes rise in the future but not by as much as in the absence of emission cuts--rather than as a "loss"--incomes decrease relative to the baseline expected future levels (Studies 1 & 2. The provision of a normative message identifying Australia as one of the world's largest CO2 emitters did not increase the amount by which individuals were prepared to reduce emissions (Study 1, whereas a normative message revealing the emission policy preferences of other Australians did (Study 2. The results suggest that framing the costs of reducing emissions as a smaller increase in future income and communicating normative information about others' emission policy preferences are effective methods for leveraging public support for emission cuts.

  12. The effect of framing and normative messages in building support for climate policies.

    Science.gov (United States)

    Hurlstone, Mark J; Lewandowsky, Stephan; Newell, Ben R; Sewell, Brittany

    2014-01-01

    Deep cuts in greenhouse gas emissions are required to mitigate climate change. However, there is low willingness amongst the public to prioritise climate policies for reducing emissions. Here we show that the extent to which Australians are prepared to reduce their country's CO2 emissions is greater when the costs to future national income are framed as a "foregone-gain"--incomes rise in the future but not by as much as in the absence of emission cuts--rather than as a "loss"--incomes decrease relative to the baseline expected future levels (Studies 1 & 2). The provision of a normative message identifying Australia as one of the world's largest CO2 emitters did not increase the amount by which individuals were prepared to reduce emissions (Study 1), whereas a normative message revealing the emission policy preferences of other Australians did (Study 2). The results suggest that framing the costs of reducing emissions as a smaller increase in future income and communicating normative information about others' emission policy preferences are effective methods for leveraging public support for emission cuts.

  13. Security Policies from a Spatial Perspective: the Case of Honduras

    Directory of Open Access Journals (Sweden)

    Lirio del Carmen Gutiérrez Rivera

    2014-06-01

    Full Text Available Public insecurity became a central issue for many Hondurans in the late 1990s, as crime, delinquency and homicide increased significantly in the isthmus. Honduras had the second highest homicide rate (35.1 per 100,000 in the region after El Salvador (50.2. per 100,000 . This social violence triggered insecurity and fear, which was further accompanied by the overall perception that the state was unable of relieving or protecting the population. This article looks at the failed attempts of the Honduran state to stop social violence and to control youth gang expansion by focusing on the security policies Cero Tolerancia (Zero Tolerance, Mano Dura (Iron Fist and the Ley Antimaras (Anti-Gang Law. It understands security policies as territorial strategies that attempt to reduce social violence and impose control.

  14. A View of Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    Member States “Food and nutrition security exists when all people at all times have physical, social and economic access to food, which is safe and consumed in sufficient quantity and quality to meet their dietary needs and food preferences, and is supported by an environment of adequate sanitation...... by increasing availability, affordability and consumption of biodiverse, safe, nutritious foods aligned with dietary recommendations and environmental sustainability.  Given that the number of chronically undernourished (stunted) could double over next 15 years, the Post-2015 Agenda and its Poverty Reduction......The term “food and nutrition security” reflects the multisector collaboration needed between those working with food security and nutrition security. The term expresses an integrated development goal to help guide implementation of policy and cost-effective programmatic action: As agreed by FAO...

  15. WRR-Policy Brief 6 : Big data and security policies: serving security, protecting freedom

    NARCIS (Netherlands)

    Broeders, Dennis; Schrijvers, Erik; Hirsch Ballin, Ernst

    2017-01-01

    Big Data analytics in national security, law enforcement and the fight against fraud can reap great benefits for states, citizens and society but require extra safeguards to protect citizens’ fundamental rights. This requires new frameworks: a crucial shift is necessary from regulating the phase of

  16. Bending Priorities: a Study in Policy Framing. State of Michigan’s Brownfield Initiative

    Directory of Open Access Journals (Sweden)

    Richard HULA

    2009-10-01

    Full Text Available This paper explores the political process bywhich the state of Michigan successfully crafted andimplemented such a brownfield initiative. Althoughthe primary focus here is on the experience of asingle state, the lessons to be learned from thiscase have national and international implicationsbecause Michigan is a leader in brownfieldprograms. The paper begins with a review of thegeneral policy context in which state brownfieldpolicy is made. Particular attention is given tothe widespread dissatisfaction of a variety ofstakeholders with long dominant federal programsin the area of environmental cleanups. The secondsection outlines a number of fundamental legislativeand administrative changes that have beenimplemented in Michigan environmental policyover the past decade. Section three reviews thebroad literature on issue framing and considershow it might help identify the specific mechanismsby which the innovative brownfield program wasadopted. The final section provides an informal testof elements of the issue-framing model by exploringin some detail the convergence of public opinionwith key elements of the innovative policy, andwhether there was any significant shift in publicopinion over time.

  17. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    Science.gov (United States)

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  18. China's Quest for Energy; Impact upon Foreign and Security Policy

    International Nuclear Information System (INIS)

    Kiesow, Ingolf

    2004-11-01

    Contrary to Chinese intentions, the proportion of China's imports coming from potentially unstable countries is steadily increasing. As a response, China tries to diversify its sources of import and to own the oil when loaded in an export harbour. In spite of very high costs and political problems, China tries to import oil and gas from owned fields in Central Asia through pipelines. In the case of China, the competition is evident on the highest international level. Especially with Japan, this tends to make already previously sensitive relations deteriorate. China has territorial disputes with several neighbouring countries that are becoming more complicated by the fact that there is oil and gas on the bottom of the sea in the disputed area. Relations with Russia have been complicated. Since the 1990s they are on their way of being steadily improved, but they become strained, when Japan is given priority access to oil fields in Siberia. The sensitive relations with the U.S. tend to be impaired by China's ways of getting access to more secure supply of oil and gas. Chinese efforts to get a more attractive foreign policy profile is on the other hand alleviating but does not eliminate the potential of the energy issue to complicate. China's foreign and security policy relations. The European Union seems to be on its way to introduce energy questions as a field of common policy. This is a reason for Sweden to study the development. It is a matter of special interest that China has proposed an 'Energy Dialogue between Asia and Europe' about the resources and the Eurasian continent. The Chinese example illustrates the need for a Swedish energy security policy and plans for energy crisis preparedness

  19. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  20. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  1. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives as well...

  2. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  3. THE FOREIGN AND SECURITY POLICIES OF THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Anand Menon

    2003-09-01

    Full Text Available In only a decade the European Union has moved from being a new kid on the block in terms of foreign and security policies to being a high profile and surprisingly effective international actor. Certainly, it has failed to match the ambitions of some of its most enthusiastic proponents. Certainly, too, European publics know next to nothing about what the Union does in the international realm. It is because of this that, despite their potential and their effectiveness to date, EU policies in this sphere were widely derided as failures following the moment when the attacks of 11 September 2001 shook the western world to its core. The Convention on the Future of Europe and subsequent intergovernmental conference look set to make significant institutional changes to the Union’s foreign and security policy systems. In undertaking these reforms, Convention members, and national governments are doubtless motivated by the laudable objective of enabling the Union to do more on the international stage. One can only hope that these motives notwithstanding, they do not simply propose reforms for their own sake and, in the process, undermine a system that, to the surprise of many, has continued to function respectably in an ever more complex and ever more dangerous world.

  4. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  5. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  6. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  7. Debating food security policy in two different ideational settings

    DEFF Research Database (Denmark)

    Farsund, Arild Aurvåg; Daugbjerg, Carsten

    2017-01-01

    in Australia and Norway is compared. In Australia, agricultural normalism (agricultural markets and production are considered to be similar to those of other economic sectors) has been dominant since the mid-1980s, while Norwegian agricultural policy making has been dominated by agricultural exceptionalism...... (agriculture is considered a unique economic sector with special market and production conditions). It is demonstrated in the article how these two opposing institutionalised ideational foundations have influenced the nature of the food security debate in the two countries. In Australia, the debate emphasises...... the positive role of the market and trade in providing global food security. In Norway, the debate highlights the need to regulate market forces and restrict trade in order to allow countries to develop their own agricultural sectors....

  8. U.S. energy security: problems and policies

    Energy Technology Data Exchange (ETDEWEB)

    Toman, M.A

    2002-12-15

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  9. U.S. energy security: problems and policies

    International Nuclear Information System (INIS)

    Toman, M.A.

    2002-12-01

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  10. Energy policy seesaw between security and protecting the environment

    International Nuclear Information System (INIS)

    Finon, D.

    1994-01-01

    It is just the price of oil that causes the energy policies of importing countries to vacillate. Changing perceptions of energy supply factors has had as much to do with transfiguring government action modes since 1973 as has the idea of the legitimacy of that action. The present paper thus draws a parallel between the goal of energy security twenty years ago and that of global environmental protection today, which explains the critical reversion to a view of minimum government action in the energy field - a view that marked the eighties. (author). 20 refs

  11. Science and Security Policy: The Case of Advanced Pathogens

    International Nuclear Information System (INIS)

    Harris, E. D.

    2007-01-01

    The revolution in biotechnology presents unprecedented opportunities and dangers for the health and well being of mankind. Today, one can plausibly imagine the eradication of many historic diseases. One can also envisage the creation of new diseases that would endanger a substantial proportion of the entire human species. As powerful applications for biotechnology research are identified, appropriate arrangements for managing their extraordinary consequences will inevitably become necessary. This presentation will explore recent efforts to balance science and security policy in the area of advanced biotechnology research. Key developments on the dual-use issue will be discussed, together with a variety of governance options aimed at mitigating the risk from such research. (author)

  12. The Distributional Impact of Social Security Policy Options.

    Science.gov (United States)

    Couch, Kenneth A; Reznik, Gayle L; Tamborini, Christopher R; Iams, Howard M

    2017-01-01

    Using microsimulation, we estimate the effects of three policy proposals that would alter Social Security's eligibility rules or benefit structure to reflect changes in women's labor force activity, marital patterns, and differential mortality among the aged. First, we estimate a set of options related to the duration of marriage required to receive divorced spouse and survivor benefits. Second, we estimate the effects of an earnings sharing proposal with survivor benefits, in which benefits are based entirely on earned benefits with spouses sharing their earnings during years of marriage. Third, we estimate the effects of adjusting benefits to reflect the increasing differential life expectancy by lifetime earnings. The results advance our understanding of the distributional effects of these alternative policy options on projected benefits and retirement income, including poverty and supplemental poverty status, of divorced and widowed women aged 60 or older in 2030.

  13. Obesity framing for health policy development in Australia, France and Switzerland.

    Science.gov (United States)

    Patchett, Annabelle D; Yeatman, Heather R; Johnson, Keryn M

    2016-03-01

    The obesity epidemic is a consequence of the interaction of cultural, environmental, genetic and behavioural factors; framing the issue is central to determining appropriate solutions. This study used content and thematic framing analysis to explore portrayal of responsibility for obesity in policy documents in Australia, France and Switzerland. For Australia and France, obesity causality was a combination of individual and environmental factors, but for Switzerland, it was predominantly individual. The primary solutions for all countries were health promotion strategies and children's education. Industry groups proposed more school education while health advocates advised government intervention. Where France emphasized cultural attitudes towards taste, Australia focused on sport. The French were most keen on legislating against unhealthy foods compared with Switzerland where there was opposition towards regulation of individual's choices. To curb the increasing prevalence of obesity, allocation of responsibility needs to be considered and initiatives enacted accordingly. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Public policy and media frames: the debate over migration in Brazil

    Directory of Open Access Journals (Sweden)

    Augusto Veloso Leão

    2013-04-01

    Full Text Available The main goal of this article is to provide a good basis to assess the way media frames are embedded in a wider social scenario, and how public and political preferences can be researched through media debate. The methodology adopted allows for an analysis of newspaper articles that can show broader trends of the debate and serve as a thermometer to measure public debate. It can further highlight details and enable in-depth analyses of media discourse. The article explores the interconnectedness of media debate and policy-making process by means of the analysis of articles published in a Brazilian newspaper between 2009 and 2010. Quantitative and qualitative methodologies are employed to identify the frames used in media and to offer insights of their relationship with the political debate. The ongoing political debate has raised attention to the issue of migration, with a great numbers of actors expressing very diverse points of view. A broader public debate has been initiated and some portions of it find voice in different means of communication. The paper argues that changes in the public and in the media debate are a response to changes in the political debate, while at the same time the first two also help to outline the latter.

  15. FRAMING AS LEGITIMATION OF CLIMATE POLICY. CLIMATE CHANGE FRAMES IN ARGENTINIAN AND BRAZILIAN PRESS DURING THE SUMMITS OF DOHA AND WARSAW

    Directory of Open Access Journals (Sweden)

    Luis González Alcaraz

    2014-06-01

    Full Text Available The article aims to describe and compare journalistic frames of climate change produced by two leading newspapers in South America: Clarin of Argentina and Folha de São Paulo of Brazil, in the context of the Doha (COP- 18 and Warsaw (COP -19 conferences. For this, it has used a definition of framing which recognizes its various dimensions: definition of the situation, reasoning about causes, moral evaluations and recommendations or prescriptions. The analysis was addressed by a qualitative process of coding and classification of journalistic texts. The empirical results indicate that the frames produced for the newspapers correspond to the political context to which they belong, that they coincide in pointing to climate change as a serious problem caused primarily by industrialized countries and what must be faced with a sense of urgency, so they tend to legitimate climate policy. In this regard, it is noted that journalistic frames not only guide the interpretation of social problems, but legitimate political action.

  16. Changing policy framing as a deliberate strategy for public health advocacy: a qualitative policy case study of minimum unit pricing of alcohol.

    Science.gov (United States)

    Katikireddi, Srinivasa Vittal; Bond, Lyndal; Hilton, Shona

    2014-06-01

    Scotland is the first country in the world to pass legislation introducing a minimum unit price (MUP) for alcohol in an attempt to reduce consumption and associated harms by increasing the price of the cheapest alcohol. We investigated the competing ways in which policy stakeholders presented the debate. We then established whether a change in framing helped explain the policy's emergence. We conducted a detailed policy case study through analysis of evidence submitted to the Scottish parliament, and in-depth, one-to-one interviews (n = 36) with politicians, civil servants, advocates, researchers, and industry representatives. Public- and voluntary-sector stakeholders tended to support MUP, while industry representatives were more divided. Two markedly different ways of presenting alcohol as a policy problem were evident. Critics of MUP (all of whom were related to industry) emphasized social disorder issues, particularly among young people, and hence argued for targeted approaches. In contrast, advocates for MUP (with the exception of those in industry) focused on alcohol as a health issue arising from overconsumption at a population level, thus suggesting that population-based interventions were necessary. Industry stakeholders favoring MUP adopted a hybrid framing, maintaining several aspects of the critical framing. Our interview data showed that public health advocates worked hard to redefine the policy issue by deliberately presenting a consistent alternative framing. Framing alcohol policy as a broad, multisectoral, public health issue that requires a whole-population approach has been crucial to enabling policymakers to seriously consider MUP, and public health advocates intentionally presented alcohol policy in this way. This reframing helped prioritize public health considerations in the policy debate and represents a deliberate strategy for consideration by those advocating for policy change around the world and in other public health areas. © 2014

  17. Changing Policy Framing as a Deliberate Strategy for Public Health Advocacy: A Qualitative Policy Case Study of Minimum Unit Pricing of Alcohol

    Science.gov (United States)

    Katikireddi, Srinivasa Vittal; Bond, Lyndal; Hilton, Shona

    2014-01-01

    Context Scotland is the first country in the world to pass legislation introducing a minimum unit price (MUP) for alcohol in an attempt to reduce consumption and associated harms by increasing the price of the cheapest alcohol. We investigated the competing ways in which policy stakeholders presented the debate. We then established whether a change in framing helped explain the policy's emergence. Methods We conducted a detailed policy case study through analysis of evidence submitted to the Scottish parliament, and in-depth, one-to-one interviews (n = 36) with politicians, civil servants, advocates, researchers, and industry representatives. Findings Public- and voluntary-sector stakeholders tended to support MUP, while industry representatives were more divided. Two markedly different ways of presenting alcohol as a policy problem were evident. Critics of MUP (all of whom were related to industry) emphasized social disorder issues, particularly among young people, and hence argued for targeted approaches. In contrast, advocates for MUP (with the exception of those in industry) focused on alcohol as a health issue arising from overconsumption at a population level, thus suggesting that population-based interventions were necessary. Industry stakeholders favoring MUP adopted a hybrid framing, maintaining several aspects of the critical framing. Our interview data showed that public health advocates worked hard to redefine the policy issue by deliberately presenting a consistent alternative framing. Conclusions Framing alcohol policy as a broad, multisectoral, public health issue that requires a whole-population approach has been crucial to enabling policymakers to seriously consider MUP, and public health advocates intentionally presented alcohol policy in this way. This reframing helped prioritize public health considerations in the policy debate and represents a deliberate strategy for consideration by those advocating for policy change around the world and in

  18. The role of space in the security and defence policy of Turkey. A change in outlook: Security in space versus security from space

    OpenAIRE

    Ercan, C.; Kale, I.

    2017-01-01

    Space and security domains are strongly related with each other. Nowadays, space is an indispensable part of security and defence policy, and it is increasingly becoming a critical infrastructure for strategic Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) systems. However, space is vulnerable itself to the new space threats. This study reviews the current and near future space role in Turkey's security and defence policy and aims to address...

  19. Impact of Population Aging on Military and Security Policy

    Directory of Open Access Journals (Sweden)

    Martina Šimková

    2014-12-01

    Full Text Available Population ageing is among the most important problems of developed European countries and the most frequently discussed social issues. The Czech Republic also faces population ageing and we cannot expect a different trend in the future. Life expectancy has increased due to better health care while current lifestyle often leads to lower natality, resulting in a negative rate of natural increase and a decreasing proportion of young people in population in the future. This problem affects all spheres of life and social and economic development. Population ageing may pose a threat to the security of the population in different ways. The functioning of the security system may be threatened due to decreasing workforce. Population ageing may undercut resources for military budgets. Young recruits represent an important part of military forces and the latter are competing in the labour market with more attractive occupations. Especially ensuring the stability of the personnel needed for securing crisis situations would be a significant problem of near future. This paper presents a demographic perspective on staffing and correct operation of military forces in the context of population ageing. It describes the current situation of human resources in the military policy of the Czech Republic and determines the negative impact of population ageing on recruitment potential. It deals with the sustainability of human resources for security forces.

  20. ENERGY IN THE CONTEXT OF THE PRESENT CHALLENGES TO THE EUROPEAN COMMON SECURITY AND DEFENCE POLICY

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2014-10-01

    Full Text Available The Common Security and Defence Policy is a part of the European Union’s Common Foreign and Security Policy (CFSP and establishes the policy framework for the institutional structures and military instruments which have to deal with the security challenges in Europe’s geopolitical neighborhood. The article aims to identify and analyze the role of energy as one of the present challenges to the European Common Security and Defence Policy in the context of the recent events in the world economy.

  1. Framing, Ideology and Evidence: Uganda's HIV Success and the Development of PEPFAR's "ABC" Policy for HIV Prevention

    Science.gov (United States)

    Parkhurst, Justin O.

    2012-01-01

    Cognitive framing theories explain how individuals understand and apply information in relation to existing experiences and beliefs. Yet these theories have rarely been applied to explore the interpretation and application of evidence in policy development. This paper undertakes a critical discourse analysis of interviews and texts surrounding a…

  2. Framing in policy processes: a case study from hospital planning in the National Health Service in England.

    Science.gov (United States)

    Jones, Lorelei; Exworthy, Mark

    2015-01-01

    This paper reports from an ethnographic study of hospital planning in England undertaken between 2006 and 2009. We explored how a policy to centralise hospital services was espoused in national policy documents, how this shifted over time and how it was translated in practice. We found that policy texts defined hospital planning as a clinical issue and framed decisions to close hospitals or hospital departments as based on the evidence and necessary to ensure safety. We interpreted this framing as a rhetorical strategy for implementing organisational change in the context of community resistance to service closure and a concomitant policy emphasising the importance of public and patient involvement in planning. Although the persuasive power of the framing was limited, a more insidious form of power was identified in the way the framing disguised the political nature of the issue by defining it as a clinical problem. We conclude by discussing how the clinical rationale constrains public participation in decisions about the delivery and organisation of healthcare and restricts the extent to which alternative courses of action can be considered. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. The Interaction of News and Advocate Frames: Manipulating Audience Perceptions of a Local Public Policy Issue.

    Science.gov (United States)

    Tewksbury, David; Jones, Jennifer; Peske, Matthew W.; Raymond, Ashlea; Vig, William

    2000-01-01

    Presents the results of a two-wave experiment designed to examine how journalistic news frames can facilitate the communication of advocacy frames (to undergraduate students) designed to influence audience perceptions of a political issue. Discusses the implications of these results for journalism, issue advocacy, and the study of issue framing.…

  4. Social movement heterogeneity in public policy framing: A multi-stakeholder analysis of the Keystone XL pipeline

    Science.gov (United States)

    Wesley, David T. A.

    In 2011, stakeholders with differing objectives formed an alliance to oppose the Keystone XL heavy oil pipeline. The alliance, which came to be known as "Tar Sands Action," implemented various strategies, some of which were more successful than others. Tar Sands Action was a largely heterogeneous alliance that included indigenous tribes, environmentalists, ranchers, landowners, and trade unions, making it one of the more diverse social movement organizations in history. Each of these stakeholder categories had distinct demographic structures, representing an array of racial, ethnic, educational, occupational, and political backgrounds. Participants also had differing policy objectives that included combating climate change and protecting jobs, agricultural interests, water resources, wildlife, and human health. The current dissertation examines the Tar Sands Action movement to understand how heterogeneous social movement organizations mobilize supporters, maintain alliances, and create effective frames to achieve policy objectives. A multi-stakeholder analysis of the development, evolution and communication of frames concerning the Keystone XL controversy provides insight into the role of alliances, direct action, and the news media in challenging hegemonic frames. Previous research has ignored the potential value that SMO heterogeneity provides by treating social movements as culturally homogenous. However, diversity has been shown to affect performance in business organizations. The current study demonstrates that under some circumstances, diversity can also improve policy outcomes. Moreover, policy frames are shown to be more effective in sustaining news media and public interest through a process the author calls dynamic frame sequencing (DFS). DFS refers to a process implementing different stakeholder frames at strategically opportune moments. Finally, Tar Sands Action was one of the first SMOs to rely heavily on social media to build alliances, disseminate

  5. Myth, Metaphor, and Imagination: Framing Homeland Security as Art and Archetype

    Science.gov (United States)

    2013-03-01

    Culture to Identify the Post 9/11 Homeland Security Zeitgeist” (Master’s thesis, Naval Postgraduate School, 2008). 4 Abraham H. Maslow , The Farther...Archetypes in a Public Mental Hospital.” Doctoral dissertation, University of Southern California, 1987. Maslow , Abraham H. 1971. The Farther Reaches

  6. India's grain security policy in the era of high food prices

    DEFF Research Database (Denmark)

    Yu, Wusheng; Bandara, Jayatilleke

    2017-01-01

    policies, which are superior in terms of their welfare effects and fiscal costs and might also be politically feasible. These findings have important implications on the ongoing debates on India's food security policy, particularly in relation to the discussion on its National Food Security Act....

  7. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  8. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    Science.gov (United States)

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  9. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  10. Design of effective energy efficiency policies. An analysis in the frame of target setting, monitoring and evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Schlomann, Barbara

    2014-07-01

    Energy efficiency is widely acknowledged as the most important strategy for achieving global energy and climate targets. Apart from its contribution to the reduction of energy consumption and energy-related greenhouse gas emissions (GHG), improving energy efficiency can deliver a range of co-benefits to the economy and society. There are, however, indications that energy efficiency policy is still insufficiently anchored both in the EU and many Member States as well as at an international level. This thesis focuses on the question how to create more favourable preconditions for an effective anchoring of energy efficiency policy in energy and climate policy. The design of energy efficiency policies is analyzed in the frame of the setting of energy efficiency targets and the monitoring and evaluation of their success. This provides new insights in the functioning of policies and hence their improvement in view of target achievement.

  11. How the Second Delta Committee Set the Agenda for Climate Adaptation Policy: A Dutch Case Study on Framing Strategies for Policy Change

    Directory of Open Access Journals (Sweden)

    Simon H. Verduijn

    2012-06-01

    Full Text Available In 2008, the Second State Delta Committee, commissioned by the Dutch Secretary of Public Works and Water Management, provided suggestions on how to defend the Netherlands against the expected impacts of climate change, such as sea level rise, longer periods of drought, more intense periods of rainfall and additional land subsidence over the coming two hundred years (Veerman, 2008. In this paper we show that even though no crisis actually occurred, the Second Delta Committee succeeded in three areas. First, the committee managed to create awareness and set the agenda for climate adaptation policy and the issue of safety in Dutch water management. Second, the committee succeeded to a large extent in getting the media, the public and politics to accept its frame and framing of the problems, causes, moral judgments and suggested remedies. Third, the committee has to a certain degree already succeeded in having its recommendations translated into policy programmes. It will be argued that framing strategies were key to the committee’s success and that the committee used various framing strategies to convince the Cabinet, citizens and others of the urgency and necessity of implementing adaptation measures. The most important framing strategies identified were adherence to the climate adaptation narrative, using the story of our delta identity, creating a sense of urgency and collectiveness, and creating a crisis narrative.

  12. Policy and strategy of the Cuban Regulatory Organization for the establishment of the legal and regulation frame

    International Nuclear Information System (INIS)

    Arnau F, A.; Alonso G, I.; Sarabia M, I.

    2006-01-01

    The National Center of Nuclear Security, Cuban entity authorized to exercise the regulation functions and control of the security of the use of the nuclear energy and the accounting and control of the nuclear materials, has among its functions, to elaborate and to propose for its approval to the corresponding instances, the juridical, technical dispositions and of procedure in its competition sphere, what demands that in this sense clear guidelines exist to carry out this social mission. The fact of assuming this function demands the necessity of a Politics for the establishment of the legal and regulation frame that expresses in a coherent way the general lines on those that it behaves the elaboration of the standards that govern this activity, to reach the end in an efficient and effective way and consequently the adoption of a Strategy that frames the necessary actions that assure the one execution and development of the politics and the pursuit of the precise rules for an optimal result. The Politics for the establishment of the legal and regulation frame of the National Center of Nuclear Security is based on a group of general principles that mark the guidelines so that this activity is chord to the national juridical system, to the good ones international practices and the recommendations of the International Atomic Energy Agency appropriated to the national experience and the daily reality, being this a transparent and reconciled process in such a way that the addressee of these standards can contribute their recommendations to the ends of achieving an effective applicability of the legal and regulation frame that governs this activity in the country. The development and pursuit of these principles is sustained in a group of actions to the help of the strategy for the establishment of the legal and regulation frame, embracing the actions so much during the process of elaboration of the legal frame, its systematic revision, the publication and distribution

  13. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company

    OpenAIRE

    Qureshi, Muhammad Sohail

    2012-01-01

    Nowadays information security policies are operative in many organizations. Currently few organizations take the pain of verifying the efficacy of these policies. Different standards and procedures exist about methods of measuring efficacy of information security policies. Choosing and implementing them depends mainly on the key performance indicators (KPIs) and key risk indicators (KRIs) of any particular organization. This thesis is a case study of an organization in United Arab Emirates (U...

  14. BULGARIA’S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EUROPE

    Science.gov (United States)

    2017-04-06

    tenuous than ever with the new controversial Trump administration and the EU nascent foreign policy efforts already failed in handling the challenges...AIR WAR COLLEGE AIR UNIVERSITY BULGARIA’S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EUROPE by Dimitar Y...the abatement of US interest in Europe, will require wise foreign policy maneuvers to address the changes in the transformed security environment. As

  15. The presidential politics of climate discourse: energy frames, policy, and political tactics from the 2016 Primaries in the United States

    OpenAIRE

    Brown, George; Sovacool, Benjamin K

    2017-01-01

    his study presents the results of an investigation into the frequency in which four candidates of the 2016 United States Presidential Primary season communicated their political positions on climate change, and how they subsequently framed these stances in numerous contextual drivers alongside energy policies. A systematic content analysis of political debates, campaign speeches, and press statements reveals how Hillary Clinton, Bernie Sanders, Donald Trump, and Ted Cruz undertook in vote-see...

  16. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    Science.gov (United States)

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  17. Message framing in the context of the national menu-labelling policy: a comparison of public health and private industry interests.

    Science.gov (United States)

    Shelton, Rachel C; Colgrove, James; Lee, Grace; Truong, Michelle; Wingood, Gina M

    2017-04-01

    We conducted a content analysis of public comments to understand the key framing approaches used by private industry v. public health sector, with the goal of informing future public health messaging, framing and advocacy in the context of policy making. Comments to the proposed menu-labelling policy were extracted from Regulations.gov and analysed. A framing matrix was used to organize and code key devices and themes. Documents were analysed using content analysis with Dedoose software. Recent national nutrition-labelling regulations in the USA provide a timely opportunity to understand message framing in relation to obesity prevention and policy. We examined a total of ninety-seven documents submitted on behalf of organizations (private industry, n 64; public health, n 33). Public health focused on positive health consequences of the policy, used a social justice frame and supported its arguments with academic data. Industry was more critical of the policy; it used a market justice frame that emphasized minimal regulation, depicted its members as small, family-run businesses, and illustrated points with humanizing examples. Public health framing should counter and consider engaging directly with non-health-related arguments made by industry. Public health should include more powerful framing devices to convey their messages, including metaphors and humanizing examples.

  18. The choice of strategic trade policy in China under the WTO frame

    Institute of Scientific and Technical Information of China (English)

    陆长春; 唐丹; 王新辉; 张德晖

    2007-01-01

    This text first elaborated the core thought and apply condition of the strategic trade policy first;secondly Put the strategic trade policy and WTO rule together to carry on analysis;finally,Combine the concrete circumstance of China,Put forward several suggestions on carrying out a strategic trade policy under the WTO frame。

  19. Composing Alternatives to a National Security Language Policy

    Science.gov (United States)

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  20. An encryption scheme for a secure policy updating

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, M.; Petkovic, M.; Obaidat, M.S.; Tsihrintzis, G.A.; Filipe, J.

    2012-01-01

    Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can decrypt the encrypted data. However, one of the

  1. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  2. The framing of unconventional natural gas resources in the foreign energy policy discourse of the Russian Federation

    International Nuclear Information System (INIS)

    Ocelík, Petr; Osička, Jan

    2014-01-01

    The advent of unconventional resources of natural gas has altered the order on global as well as continental gas markets. With rising liquidity, the position of established dominant suppliers is eroding. We focus on the initial response of Russia, the leading supplier of natural gas to Europe, to the new situation, building the research on unit-level constructivism and discourse analysis. We use frame analysis to reveal what image of unconventional resources was constructed in Russian foreign energy policy discourse (FEPD) in the period between 2009 and 2011, when the “unconventional revolution” did not yet have any sharp contours. We conclude that in Russian FEPD the unconventionals are considered as a distinctive and inferior source of energy compared to conventional natural gas. Emphasis is put on their economic irrationality and environmental hazards. The bottom line of the discourse is the idea that there is a choice between conventional and unconventional sources, with this choice being framed as one between good and bad, or right and wrong. - Highlights: • We examine the image of “unconventional gas” in Russian foreign energy policy discourse. • Two main frames (reliable supplier and triumphant natural gas) were identified. • Two main argumentation schemes (economic and environmental) were identified. • The “unconventional gas” is defined as a mistaken and inferior source of energy

  3. (Inefficiency of EU Common Foreign and Security Policy: Ukraine, Brexit, Trump and beyond

    Directory of Open Access Journals (Sweden)

    Filipec Ondřej

    2017-10-01

    Full Text Available The main aim of this article is to explore and analyze key determinants of EU Common Foreign and Security Policy efficiency. For this purpose a 3C analytical approach is used, exploring EU foreign and security policy consistency, capacities and the dimension of cooperation. Article analyzes both horizontal and vertical, consistency of EU Foreign and Security policy especially with connection to Ukraine crises and diverging interests of EU member states. EU capacities are explored with main focus on military spending and challenges related to limited spending. EU military decline is put in contrast with new emerging regional powers. In the area of cooperation article is dedicated mainly to ineffective partnership with Turkey, cold attitude of Trump administration towards Europe and the implications of Brexit for EU foreign and security policy.

  4. INTERNAL MARKET GOVERNMENT SECURITIES IN PROMOTING THE EFFICIENCY OF DEBT POLICY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    K. Kuryshchuk

    2014-01-01

    Full Text Available The article analyzes the effectiveness of debt policy of Ukraine, to its shortcomings and implications for the economy. The evaluation of the domestic government securities market and its impact on the efficiency of debt management.

  5. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  6. Party politics and Greek security policy from 1974 to 1984: change and continuity

    OpenAIRE

    Haines, John L.

    1984-01-01

    Approved for public release; distribution is unlimited This thesis explores the effects of political change on Greek security policy during the period 1974 to 1984. This period encompasses significant change in Greece's foreign relations including those with the United States. The central question is: Are the elements of Greek security policy based on long-term basic interests which find consistent expression, or are they a function of domestic political factors, more ideologicall...

  7. Role and participation of women in the establishment and implementation of international security policies

    Directory of Open Access Journals (Sweden)

    Marigonë Vrajolli

    2018-03-01

    The purpose of this paper is to explain the different roles that women have in creating security policies. Further, this paper explains the role of women in initiatives, peacekeeping and peace-building. The paper also explains the international mechanisms that promote the involvement of women in peace and security processes.

  8. Critical water requirements for food, methodology and policy consequences for food security

    NARCIS (Netherlands)

    Gerbens-Leenes, P.W.; Nonhebel, S.

    2004-01-01

    Food security and increasing water scarcity have a dominant place on the food policy agenda. Food security requires sufficient water of adequate quality because water is a prerequisite for plant growth. Nowadays, agriculture accounts for 70% of the worldwide human fresh water use. The expected

  9. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems

    NARCIS (Netherlands)

    Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir; Barthe, Gilles; Markatos, Evangelos; Samarati, Pierangela

    2016-01-01

    A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy,

  10. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  11. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    national security and the interagency process ( Marcella , 2010). All these documents reviewed focused mainly on national security and overseas...administration, they were considered “the heart and soul of the process” ( Marcella , 2010). While subtle differences exist across administrations, the IPC...and build consensus across the government for action ( Marcella , 2010). During the second term of the Bush administration and during the first years

  12. The Value of a European Security and Defense Policy

    Science.gov (United States)

    2007-05-08

    relations has lately dominated US foreign policy. Subsequently some normative and meta- ethical conceptual conclusions will be drawn upon to show how US...relations has lately dominated US foreign policy by analyzing recent 3 policy decisions. After this analysis, some normative meta ethical conclusions...old patterns or as Kagan writes: “Europeans have stepped out of the Hobbesian world of anarchy into the Kantian world of perpetual peace.”13 The fact

  13. Assessing the impact of information and framing on support for climate policy action

    International Nuclear Information System (INIS)

    Hatfield-Dodds, Steve

    2007-01-01

    Full text: A significant share of the public appears mislead by the way the economic impacts of emissions reductions are traditionally communicated. This misunderstanding is associated with reduced support for policy action, and risks long term climate impacts that would be avoided if results were communicated properly. Correct this basis appears likely to have a larger effect on attitudes than new research and information on the impacts of climate change. Government action to achieve deep cuts in greenhouse gas emissions - like other major policy changes -depends on public support, which in turn depends on perceptions of policy impacts. This paper reports research exploring the effect of three factors on support for policy action: the way that policy impacts are described; the magnitude of these impacts, and additional information on climate change impacts, provided internally through the surveys and externally through the release of An Inconvenient Truth and media coverage of the Stern Report (2006). The research used split sample phone and internet surveys (n = 4264) conducted in Australia and New Zealand in four waves from April to December 2006. The study gives rise to four major findings: Support for policy action is sensitive to the magnitude of expected economic impacts, with predicted support varying from 27% to 84% across the different levels of policy impact presented; Current approaches to communicating policy impacts are associated with public support for policy action being 8-10% lower than it would be if policy impacts were well communicated. This bias may be corrected by describing policy impacts in terms of changes relative to current levels - stating that incomes continue to rise - as well as describing impacts relative to the base case; The reduction in support associated with these biases is much larger than the increase in support associated with providing credible additional information on the impacts of climate change; Significantly more than

  14. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  15. Guideline of Cyber Security Policy for Digital I and C Systems in Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Zeen; Kim, Jang Seong; Kim, Kwang Jo [Information and Communications University, Daejeon (Korea, Republic of); Kang, Young Doo; Kim, Dai Il; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2007-10-15

    Recently computers and communication systems have been developed very fast and applied to various areas in many applications. This development has raised new vulnerabilities that may endanger the critical systems for nuclear safety and physical protection at the facilities. In order to protect the critical infrastructures from these new cyber attacks, we clearly need deep considerations on the risks and threats through the cyberspace. Based on these needs, many organizations which related to nuclear power plants suggested various cyber security protection methods based on regulation or technical safeguard. Even if security countermeasures against various cyber attacks are important, it is required to establish the best practices of cyber security policy by the vendor and licensee. Based on the policy they can evaluate their activities against various cyber attacks throughout the whole life cycle. In this paper, we discuss how to establish the cyber security policy for digital instrumentation and control (I and C) systems in nuclear power plants.

  16. Guideline of Cyber Security Policy for Digital I and C Systems in Nuclear Power Plant

    International Nuclear Information System (INIS)

    Kim, Zeen; Kim, Jang Seong; Kim, Kwang Jo; Kang, Young Doo; Kim, Dai Il; Jeong, Choong Heui

    2007-01-01

    Recently computers and communication systems have been developed very fast and applied to various areas in many applications. This development has raised new vulnerabilities that may endanger the critical systems for nuclear safety and physical protection at the facilities. In order to protect the critical infrastructures from these new cyber attacks, we clearly need deep considerations on the risks and threats through the cyberspace. Based on these needs, many organizations which related to nuclear power plants suggested various cyber security protection methods based on regulation or technical safeguard. Even if security countermeasures against various cyber attacks are important, it is required to establish the best practices of cyber security policy by the vendor and licensee. Based on the policy they can evaluate their activities against various cyber attacks throughout the whole life cycle. In this paper, we discuss how to establish the cyber security policy for digital instrumentation and control (I and C) systems in nuclear power plants

  17. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  18. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  19. [Review of food policy approaches: from food security to food sovereignty (2000-2013)].

    Science.gov (United States)

    López-Giraldo, Luis Alirio; Franco-Giraldo, Álvaro

    2015-07-01

    Food policies have attracted special interest due to the global food crisis in 2008 and promotion of the Millennium Development Goals, leading to approaches by different fields. This thematic review aims to describe the main theoretical and methodological approaches to food security and food sovereignty policies. A search was performed in databases of scientific journals from 2000 to 2013. 320 complete articles were selected from a total of 2,699. After reading the articles to apply the inclusion criteria, 55 items were maintained for analysis. In conclusion, with the predominance of food security as a guiding policy, food sovereignty has emerged as a critical response to be included in designing and researching food policies. Food policies are essential for achieving public health goals. Public health should thus take a leading role in linking and orienting such policies.

  20. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-29

    Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Qatar, Bahrain, and Oman). In March 2011, Kuwait joined a GCC military intervention to...before the start of [2013]”—a statement that furthered Iraq’s argument that the U.N. Security Council should remove any remaining “Chapter 7” (of the...with alternative mechanisms, as discussed below. On December 15, 2010, the U.N. Security Council passed three resolutions—1956, 1957, and 1958—that

  1. Germany and energy security in the 2000s. Rise and fall of a policy issue?

    International Nuclear Information System (INIS)

    Duffield, John S.

    2009-01-01

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future. (author)

  2. Germany and energy security in the 2000s. Rise and fall of a policy issue?

    Energy Technology Data Exchange (ETDEWEB)

    Duffield, John S. [Department of Political Science, Georgia State University, Atlanta, GA 30303 (United States)

    2009-11-15

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future. (author)

  3. Germany and energy security in the 2000s: Rise and fall of a policy issue?

    Energy Technology Data Exchange (ETDEWEB)

    Duffield, John S., E-mail: duffield@gsu.ed [Department of Political Science, Georgia State University, Atlanta, GA 30303 (United States)

    2009-11-15

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future.

  4. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.

    Science.gov (United States)

    Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah

    2016-01-01

    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  5. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD Scheme.

    Directory of Open Access Journals (Sweden)

    Tarik Idbeaa

    Full Text Available This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD. Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  6. How social movements influence policies : Advocacy, framing, emotions and outcomes among reproductive rights coalitions in Peru.

    OpenAIRE

    Coe, Anna-Britt

    2010-01-01

    With its origins in the early 1990s, feminist advocacy directed at influencing public policies is a relatively new phenomenon in Latin America that is commonly studied at the national level. The aim of this thesis was to study feminist advocacy on reproductive rights at the sub-national level in Peru. Specifically, it explored two research questions: how do feminist movements carry out advocacy to intervene with government agencies and what effects does their advocacy have on policies. This a...

  7. Information System Security: Army Web Site Administration, Policies, and Practices

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Policy requires heads of DoD Components to establish a process to identify appropriate information for posting to Web sites and to review all information placed on publicly accessible Web sites...

  8. Framing energy efficiency and renewable energy policies: An international comparison between Mexico and China

    International Nuclear Information System (INIS)

    Valenzuela, Jose Maria; Qi, Ye

    2012-01-01

    This essay compares national strategies on mitigation of GHG emissions for Mexico and China. This state-centered analysis stresses the importance of the interaction between international commitments, the disposition of internal interest of economy-wide actors, and the legacies of policy making and institutions, particularly in relation to economic development and central–local government relations. This research does not attempt to classify institutions according to their effectives to foster climate change policies, but rather explores specific circumstances for climate change policy making on developing countries. Contrary to international proposal to find a generic optimal policy choice, the research explored the relevance of certain political and economic institutions that can be present in other national cases. It shows that the legacies on liberalization and state retreat undermine the state ability to effectively engage with the economic actors on decisions and management. Likewise regular engagement with them undermines the state affinity towards pursuing economic efficient solutions. The relevance of adequate system of incentives for local government to engage in an agenda that is, by nature, adopted by the central government. - Highlights: ► We compared China and Mexico CO 2 emissions potentials and strategies on energy. ► Cost abatement curves were used to induce societal interest. ► Policies on management decision are effective but not clearly efficient. ► Policies that stress efficiency face serious limitations of scope. ► Centrally provided incentives are highly required for local governments action.

  9. Trust Evolution Policies for Security in Collaborative Ad Hoc Applications

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Jensen, Christian D.; Connell, Paul O

    2006-01-01

    The vision of pervasive computing has introduced the notion of a vast, networked infrastructure of heterogeneous entities interact through collaborative applications, e.g., playing a multi-player online game on the way to work. This will require interactions between users who may be marginally...... admission policies in a manner similar to what would be expected from human trust assessment. This indicates that trust evolution policies can replace explicit human intervention in application scenarios that are similar to the evaluated prototype....

  10. Linking research and food security policies in MENA | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 حزيران (يونيو) 2013 ... Hammou Laamrani works for IDRC as a specialist in agriculture, water, and knowledge management. He believes that ... Food security challenges are also related to the low adoption of technologies to optimize food availability and storage, reduce post-harvest losses, and improve food safety. Unless food ...

  11. Support for Multi-Level Security Policies in DRM Architectures

    NARCIS (Netherlands)

    Tanenbaum, A.S.; Popescu, B.C.; Crispo, B.; Hempelmann, C.F.; Raskin, V.

    2004-01-01

    Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no easy task, given that content needs to be protected while accessed through electronic devices in the hands of

  12. Identifying the Enemy: Social Categorization and National Security Policy

    Science.gov (United States)

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  13. Framework for an African policy towards creating cyber security awareness

    CSIR Research Space (South Africa)

    Dlamini, IZ

    2011-05-01

    Full Text Available Cyber security is a GLOBAL issue. The rest of the world needs Africa to be aware and ready. Furthermore, Africa can only be aware and ready if it is internally organised and collaborates effectively with the rest of the world. The African continent...

  14. An integrated assessment of climate change, air pollution, and energy security policy

    International Nuclear Information System (INIS)

    Bollen, Johannes; Hers, Sebastiaan; Van der Zwaan, Bob

    2010-01-01

    This article presents an integrated assessment of climate change, air pollution, and energy security policy. Basis of our analysis is the MERGE model, designed to study the interaction between the global economy, energy use, and the impacts of climate change. For our purposes we expanded MERGE with expressions that quantify damages incurred to regional economies as a result of air pollution and lack of energy security. One of the main findings of our cost-benefit analysis is that energy security policy alone does not decrease the use of oil: global oil consumption is only delayed by several decades and oil reserves are still practically depleted before the end of the 21st century. If, on the other hand, energy security policy is integrated with optimal climate change and air pollution policy, the world's oil reserves will not be depleted, at least not before our modeling horizon well into the 22nd century: total cumulative demand for oil decreases by about 24%. More generally, we demonstrate that there are multiple other benefits of combining climate change, air pollution, and energy security policies and exploiting the possible synergies between them. These benefits can be large: for Europe the achievable CO 2 emission abatement and oil consumption reduction levels are significantly deeper for integrated policy than when a strategy is adopted in which one of the three policies is omitted. Integrated optimal energy policy can reduce the number of premature deaths from air pollution by about 14,000 annually in Europe and over 3 million per year globally, by lowering the chronic exposure to ambient particulate matter. Only the optimal strategy combining the three types of energy policy can constrain the global average atmospheric temperature increase to a limit of 3 C with respect to the pre-industrial level. (author)

  15. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  16. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  17. Greek National Security Concerns and the European Union’s Common Foreign and Security Policy: Consensus or Divergence?

    Science.gov (United States)

    2011-09-01

    to my tutor.” Alexander the Great, referring to his tutor, Aristotle (356–323 BC) xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION...an actual policy since the Turkish invasion of Cyprus. Despite his political rhetoric and posturing while in opposition, Papandreou’s tenure...responsibility for global security.”139 Limited in breadth within the Petersberg tasks framework, the ESS focuses its rhetoric on the internal, rather

  18. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  19. Challenges of EU Security on the Example of Cybeterrorism Policy

    Directory of Open Access Journals (Sweden)

    Izabela Oleksiewicz

    2015-06-01

    Full Text Available In addition to traditional threats to information as spying or leaking state secrets and business secrets appeared the new threats, among which the most dangerous is cyberterrorism. Taking into account the problems of cyber-terrorism, includes, in particular, the analysis of legislation aimed at ensuring the security of information systems of individual countries particular, this subject should be also recognized as requiring at the present time the insightful analysis. Therefore, this publication is an attempt of characteristics the determinants of this phenomenon and analysis of the latest legal solutions in the fight against cyber terrorism within the European Union. Moreover, it was made the attempt to find an answer to the question whether the current legal solutions of the European Union in the area of security are an effective tool in the fight against cyberterrorism.

  20. Towards a policy for human security: psychosocial contributions.

    Science.gov (United States)

    Tullio, Francesco

    2007-01-01

    Inspired by the correspondence between Einstein and Freud in 1936, this paper focuses on the multidimensional aspect of security, exploring its implications within the psychosocial approach. Reflections are therefore centred on the psychological aspects of conflict, on bio-psychic responses to violent solicitation and on ways in which individual emotions are managed and controlled by the State. Some social and economic mechanisms comprising the present global social scenario are explored: the intermesh between economic/industrial organisations and Security Institutions, and the consumerist economic model and its individual/collective consequences, ultimately environmental destruction. As suggested by Einstein, the creation of a supranational organisation would be an essential step towards an effective and economically sustainable international system. This can be achieved through a process that implies the evolution of cultural parameters and the transformation of national institutions. In this sense, the author suggests a decisive role for civil society organisations such as the International Physicians for the Prevention of Nuclear War (IPPNW).

  1. Poverty, Security and Social Assistance: Challenges of Brazilian Social Policy

    Directory of Open Access Journals (Sweden)

    Ana Paula Ornellas Mauriel

    2010-01-01

    Full Text Available This article presents partial results of a study about anti-poverty programs in Brazil. The main contribution of the text is that it relates certain characteristics of the anti poverty programs to theoretical categories that have influenced the debate about social policy in the contemporary context. Special attention is given to the relation of these programs with national social assistance policy. The article begins from the hypothesis that the logic that had inspired the construction of social policies was reconsidered, based on a transformation in the theoretical understanding of the social issue and of ways to confront it. This change appears in the texts in the priority given to poverty as a category of analysis, which is understood as an absence of capacities. This theoretically and methodologically configures an individualistic perspective on social issues, the principal theoretical source for which is the thinking of Amartya Sen.

  2. Reflections on the cost of "low-cost" whole genome sequencing: framing the health policy debate.

    Directory of Open Access Journals (Sweden)

    Timothy Caulfield

    2013-11-01

    Full Text Available The cost of whole genome sequencing is dropping rapidly. There has been a great deal of enthusiasm about the potential for this technological advance to transform clinical care. Given the interest and significant investment in genomics, this seems an ideal time to consider what the evidence tells us about potential benefits and harms, particularly in the context of health care policy. The scale and pace of adoption of this powerful new technology should be driven by clinical need, clinical evidence, and a commitment to put patients at the centre of health care policy.

  3. Bahrain: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2017-02-14

    by the Ministry of Interior. Bahrain’s opposition asserts that the United States is downplaying regime abuses in order to protect the security... woman , who was unopposed in her district, was elected out of 18 female candidates. The king subsequently named a new Shura Council with 20 Shiites, 19...previous COR). The same woman who had won in 2006 was elected. Municipal elections were conducted concurrently. The king reappointed 30 of the 40 serving

  4. ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

    OpenAIRE

    Asghar, Muhammad Rizwan; Ion, Mihaela; Russello, Giovanni; Crispo, Bruno

    2013-01-01

    Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. There are solutions for preserving confidentiality of data while supporting search on the data stor...

  5. Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress

    Science.gov (United States)

    2010-12-10

    gaseous chlorine disinfection to chloramine disinfection —a change identified by some advocacy groups as being an inherently safer substitution—as being...chemicals, such as chlorine, for purposes such as disinfection .29 Advocates for their inclusion in security regulations cite the presence of such...Science and Technology (S& T ) Directorate is engaged in a Chemical Infrastructure Risk Assessment Project that, among other goals, will assess the

  6. Oman: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2012-08-30

    workshop in Muscat to discuss freedom of speech .3 However, evidence that the pace of change has been perceived as slow was demonstrated in 2011 in...change their government, limits on freedom of speech , and societal mores that discriminate against women. The report adds that security force...Research Service 7 Freedom of Expression/Media The State Dept. human rights report for 2011 states that the law provides for limited freedom of speech and

  7. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  8. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    Lieutenant General, Canadian Forces, Canadian Military Repre- sentative to NATO Elizabeth Race, Deputy Defence Policy Advisor, Canadian Joint...Ruehle, Head, Energy Security Section, Emerging Security Challenges Division, NATO ( Brus - sels) Patrick Nash, Lieutenant General, Irish Army, for- mer

  9. Language Policy-Making in Multilingual Education: Mass Media and the Framing of Medium of Instruction

    Science.gov (United States)

    Tollefson, James W.

    2015-01-01

    In some settings, medium of instruction (MOI) policies in multilingual education break out into public debates in mass media involving politicians, business leaders, government officials, parents, and school children. These public discussions of MOI often index struggles over the distribution of political power and economic resources, and issues…

  10. National Security and the Industrial Policy Debate: Modernizing Defense Manufacturing

    Science.gov (United States)

    1991-05-01

    47. 49. Michael Schroeder and Walecia Konrad, " Nucor : Rolling Right Into Steel’s Big Time," Business Week 19 Nov. 1990: 76. 50. Clyde V. Prestowitz...Defense." The I Industrial Policy Debate. Ed. Chalmers Johnson. San Francisco: ICS Press, 1984. i 74I Schroeder, Michael and Walecia Konrad. " Nucor

  11. Iran: Politics, Gulf Security, and U.S. Policy

    Science.gov (United States)

    2016-03-30

    U.S. Policy Congressional Research Service Contents Political History ...Research Service 1 Political History Iran is a country of nearly 80 million people, located in the heart of the Persian Gulf region. The United...Iran government figure was 27), including a 19-year-old woman , Neda Soltani, who subsequently became an emblem of the uprising. The opposition

  12. Distribution of Responsibility for Social Security and Labour Market Policy

    DEFF Research Database (Denmark)

    Madsen, Per Kongshøj

    It is shown that legislation of unemployment insurance and active labour market policy is set by the national government. Legislation with respect to employment protection, however, is largely left to the social partners, i.e. the dismissal of salaried workers is regulated by a special piece...

  13. US oil policy and energy security; Politique petroliere americaine et securite energetique

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    2002-05-15

    Although the energy dependence reached its historical maximum and will continue to increase for the next 20 years, the USA keep their oil policy. For the economist this policy is reasonable because of the poor room for the US imports reduction costs. To explain these conclusions the author discusses on the following topics: the links between the oil dependence and the energy security, the oil policy after Reagan, the oil policy evolution - or no evolution - facing the increasing dependency and the Cheney report. (A.L.B.)

  14. Framing scales and scaling frames

    NARCIS (Netherlands)

    van Lieshout, M.; Dewulf, A.; Aarts, N.; Termeer, K.

    2009-01-01

    Policy problems are not just out there. Actors highlight different aspects of a situation as problematic and situate the problem on different scales. In this study we will analyse the way actors apply scales in their talk (or texts) to frame the complex decision-making process of the establishment

  15. The Development of Public Policies to Address Non-communicable Diseases in the Caribbean Country of Barbados: The Importance of Problem Framing and Policy Entrepreneurs

    Directory of Open Access Journals (Sweden)

    Nigel Unwin

    2017-02-01

    Full Text Available Background Government policy measures have a key role to play in the prevention and control of noncommunicable diseases (NCDs. The Caribbean, a middle-income region, has the highest per capita burden of NCDs in the Americas. Our aim was to examine policy development and implementation between the years 2000 and 2013 on NCD prevention and control in Barbados, and to investigate factors promoting, and hindering, success. Methods A qualitative case study design was used involving a structured policy document review and semistructured interviews with key informants, identified through stakeholder analysis and ‘cascading.’ Documents were abstracted into a standard form. Interviews were recorded, transcribed verbatim and underwent framework analysis, guided by the multiple streams framework (MSF. There were 25 key informants, from the Ministry of Health (MoH, other government Ministries, civil society organisations, and the private sector. Results A significant policy window opened between 2005 and 2007 in which new posts to address NCDs were created in the MoH, and a government supported multi-sectoral national NCD commission was established. Factors contributing to this government commitment and funding included a high level of awareness, throughout society, of the NCD burden, including media coverage of local research findings; the availability of policy recommendations by international bodies that could be adopted locally, notably the framework convention on tobacco control (FCTC; and the activities of local highly respected policy entrepreneurs with access to senior politicians, who were able to bring together political concern for the problem with potential policy solutions. However, factors were also identified that hindered multi-sectoral policy development in several areas, including around nutrition, physical activity, and alcohol. These included a lack of consensus (valence on the nature of the problem, often framed as being

  16. The Development of Public Policies to Address Non-communicable Diseases in the Caribbean Country of Barbados: The Importance of Problem Framing and Policy Entrepreneurs.

    Science.gov (United States)

    Unwin, Nigel; Samuels, T Alafia; Hassell, Trevor; Brownson, Ross C; Guell, Cornelia

    2016-06-15

    Government policy measures have a key role to play in the prevention and control of non-communicable diseases (NCDs). The Caribbean, a middle-income region, has the highest per capita burden of NCDs in the Americas. Our aim was to examine policy development and implementation between the years 2000 and 2013 on NCD prevention and control in Barbados, and to investigate factors promoting, and hindering, success. A qualitative case study design was used involving a structured policy document review and semi-structured interviews with key informants, identified through stakeholder analysis and 'cascading.' Documents were abstracted into a standard form. Interviews were recorded, transcribed verbatim and underwent framework analysis, guided by the multiple streams framework (MSF). There were 25 key informants, from the Ministry of Health (MoH), other government Ministries, civil society organisations, and the private sector. A significant policy window opened between 2005 and 2007 in which new posts to address NCDs were created in the MoH, and a government supported multi-sectoral national NCD commission was established. Factors contributing to this government commitment and funding included a high level of awareness, throughout society, of the NCD burden, including media coverage of local research findings; the availability of policy recommendations by international bodies that could be adopted locally, notably the framework convention on tobacco control (FCTC); and the activities of local highly respected policy entrepreneurs with access to senior politicians, who were able to bring together political concern for the problem with potential policy solutions. However, factors were also identified that hindered multi-sectoral policy development in several areas, including around nutrition, physical activity, and alcohol. These included a lack of consensus (valence) on the nature of the problem, often framed as being predominantly one of individuals needing to take

  17. The Development of Public Policies to Address Non-communicable Diseases in the Caribbean Country of Barbados: The Importance of Problem Framing and Policy Entrepreneurs

    Science.gov (United States)

    Unwin, Nigel; Samuels, T. Alafia; Hassell, Trevor; Brownson, Ross C.; Guell, Cornelia

    2017-01-01

    Background: Government policy measures have a key role to play in the prevention and control of non-communicable diseases (NCDs). The Caribbean, a middle-income region, has the highest per capita burden of NCDs in the Americas. Our aim was to examine policy development and implementation between the years 2000 and 2013 on NCD prevention and control in Barbados, and to investigate factors promoting, and hindering, success. Methods: A qualitative case study design was used involving a structured policy document review and semi-structured interviews with key informants, identified through stakeholder analysis and ‘cascading.’ Documents were abstracted into a standard form. Interviews were recorded, transcribed verbatim and underwent framework analysis, guided by the multiple streams framework (MSF). There were 25 key informants, from the Ministry of Health (MoH), other government Ministries, civil society organisations, and the private sector. Results: A significant policy window opened between 2005 and 2007 in which new posts to address NCDs were created in the MoH, and a government supported multi-sectoral national NCD commission was established. Factors contributing to this government commitment and funding included a high level of awareness, throughout society, of the NCD burden, including media coverage of local research findings; the availability of policy recommendations by international bodies that could be adopted locally, notably the framework convention on tobacco control (FCTC); and the activities of local highly respected policy entrepreneurs with access to senior politicians, who were able to bring together political concern for the problem with potential policy solutions. However, factors were also identified that hindered multi-sectoral policy development in several areas, including around nutrition, physical activity, and alcohol. These included a lack of consensus (valence) on the nature of the problem, often framed as being predominantly one of

  18. American Foreign Policy Think Tanks and their Views on Baltic Security

    Directory of Open Access Journals (Sweden)

    Boyd Jonathan A.

    2017-12-01

    Full Text Available Recent events have created a sense of urgency within the U.S. foreign policy establishment to update its strategy towards Russia. The Baltic states are seen to be particularly vulnerable and because of its NATO commitments and its history of underwriting security in the region, the U.S. is under pressure to develop an appropriate response. Policy and research institutes-or think tanks-are an important part of the U.S. foreign policy establishment, and given the influence they often have on American foreign policy, it is sensible for any student of Baltic security to evaluate the think tanks’ current perspectives on the viability and desirability of U.S. security commitments in the region. To that end, this article evaluates the outputs of twelve prominent U.S. foreign policy think tanks according to the views they expressed across four general groupings of issues: positions on U.S. grand strategy, perceptions of Moscow’s intentions and capabilities, assessments of NATO’s heath and its value to U.S. security, and the level of commitment to, and assessment of, the security vulnerabilities of the Baltic states. The findings dispel a common misperception that U.S. foreign policy think tanks are generally shifting towards a realist perspective on the Baltic states; they generally do not support U.S. retrenchment, most consider Russia as having revanchist motives, and as a whole support bolstering the defences of NATO’s easternmost flank. However, it would also be an exaggeration to conclude that the U.S. think tank community overall were staunch defenders of the Baltic states, as for many there is a prevailing inattentiveness to Baltic security issues.

  19. Framing REDD+ at National Level: Actors and Discourse around Nepal’s Policy Debate

    Directory of Open Access Journals (Sweden)

    Rishi R. Bastakoti

    2017-02-01

    Full Text Available Forests and carbon sequestration have become fundamental themes in climate change mitigation. The idea of Reducing Emissions from Deforestation and forest Degradation (REDD+ has generated significant interest in forest governance from United Nations (UN climate strategies over the past decade. REDD+ was initially hailed as a smart and cost-effective way to mitigate climate change. As it is rolling out, ambiguities and controversies are increasingly surfacing to the stakeholders at different levels. Examining the forest governance of Nepal in detail, this research examines how relationships between national and local forest actors have changed, and how REDD+ discourses have evolved among them at the interface between global interests in carbon commodification on one hand, and local realities of community forestry on the other hand. To better understand these competing positions, the study uses a post-structural political ecology perspective with elements of discourse analysis. Using data from interviews with policy actors and members of three local community forest user groups, focus group discussions, policy event observations, and document reviews, this paper highlights how global forest carbon commodification has been affecting community forestry governance. It also illustrates different storylines that actors employ to influence policy discourse and REDD+ debates, indicating a considerable range of problem definitions and policy solutions of climate change among the actors. The analysis highlights the connection between power relationships and the evolution of discourses surrounding REDD+, and how an external discourse can reinforce or challenge local governance and the centralization of forest authority. As such, the research also offers a new application of discursive storylines to climate change discourse analysis across national and local scales. The findings emphasize the importance of a more open and transparent dialogue across Nepal

  20. Air Force IT System Security Compliance with Law and Policy

    Science.gov (United States)

    2016-04-01

    monetary burden on 3 system owners as there is “…a significant cost benefit to building in IA during the development phase” 4 of a system. Current...16 Option 4 : Cloud Computing to Eliminate Policy and Methodology Requirements ....17 Option 4 : Application...Assurance ( IA ) (data integrity) to support mission assurance. To ensure IA and to support the mission, changes need to be made to Air Force IT

  1. Policies and Processes for Social Inclusion: Using EquiFrame and EquIPP for Policy Dialogue Comment on "Are Sexual and Reproductive Health Policies Designed for All? Vulnerable Groups in Policy Documents of Four European Countries and Their Involvement in Policy Development".

    Science.gov (United States)

    MacLachlan, Malcolm; Mannan, Hasheem; Huss, Tessy; Munthali, Alister; Amin, Mutamad

    2015-11-16

    The application of EquiFrame in the analysis of sexual and reproductive health policies by Ivanova et al to a new thematic area, their selection of only some of the Core Concepts of human rights in health service provision and the addition of new vulnerable groups relevant to the purpose of their analysis, are all very welcome developments. We also applaud their application of EquiFrame to policies in countries where it has not previously been used, along with their use of interviews with policy-makers to produce a deeper understanding of policy processes. We argue that clear justification for the inclusion of additional, or replacement of some exiting vulnerable groups within EquiFrame should be accompanied by clear definitions of such groups, along with the evidence-base that justifies their classification as a vulnerable or marginalised group. To illustrate the versatility of EquiFrame, we summarise a range of ways in which it has been used across a number of regions; including a brief Case Study of its use to develop the National Health Policy of Malawi. While EquiFrame focuses on policy content, we preview a new policy analysis tool - Equity and Inclusion in Policy Processes (EquIPP) - which assesses the extent of equity and inclusion in broader policy processes. Together, EquiFrame and EquIPP can be used to help governments and civil society ensure that policies are addressing the much stronger emphasis on social inclusion, now apparent in the Sustainable Development Goals (SDGs). © 2016 by Kerman University of Medical Sciences.

  2. Policy in Conflict: The Struggle Between Environmental Policy and Homeland Security Goals

    Science.gov (United States)

    2013-09-01

    environmental and energy 34 policy (Murkowski, 2010). However, a good set of literature on the broader, macro level question central to this investigation...terms of increasing efficiency of the automotive fleet (demand side), certain environmental policies have the unintended consequence of restricting the...Middle East  Broader aspects of the struggle between environmental policy and energy policy  A broad analysis of ways to diminish animus toward the

  3. Don't shoot the messenger: re-framing climate policy to respond to evolving science (Invited)

    Science.gov (United States)

    Allen, M. R.; Otto, F. E.; Otto, A.; Rayner, S.

    2013-12-01

    Lack of progress in mitigation policy, as atmospheric CO2 concentrations climb apparently inexorably past 400ppm, is often blamed on a failure to 'communicate the climate change message' effectively. A small but increasing number of commentators is arguing that the problem is not communication, but the way in which climate policy choices are framed. In particular, the overt politicization of climate science, with so-called 'belief in climate change' being invoked as automatically implying support for a global carbon price or cap-and-trade regime, or even as an argument for voting for specific parties, makes it increasingly difficult to discuss policy options in the light of evolving science. At the heart of the problem is the interpretation of the 'precautionary principle', which is widely invoked in climate policy as a response to scientific uncertainty: policies, it is argued, should be designed to be robust to the range of possible future climates, or to deliver the ';best' possible probability-weighted outcome. The problem with this approach is that it very often makes policy contingent on worst-case scenarios - such as the risk of high climate sensitivity or rapid non-linear climate change - which are often the most uncertain aspects of climate science and hence subject to frequent revision. To be relevant to policies that are based on mitigating worst-case risks, the scientific community is also required to focus on establishing what these risks are, leaving it open, unjustly but understandably, to the accusation of alarmism. Focusing on worst-case scenarios can also give the impression that the mitigation problem is unachievable, and the only option is short-term adaptation followed by geo-engineering. One way of reducing the politicization of climate science is to make policy explicitly contingent on the climate response, such that a high (or low) rate of anthropogenic warming over the coming decades is automatically met with an aggressive (or moderate

  4. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Guri, E-mail: guri.bang@cicero.uio.n [CICERO - Center for International Climate and Environmental Research Oslo, P.O. Box 1129, 0318 Oslo (Norway)

    2010-04-15

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  5. Energy security and climate change concerns. Triggers for energy policy change in the United States?

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Guri [CICERO - Center for International Climate and Environmental Research Oslo, P.O. Box 1129, 0318 Oslo (Norway)

    2010-04-15

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress - the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo. (author)

  6. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    International Nuclear Information System (INIS)

    Bang, Guri

    2010-01-01

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  7. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

    Directory of Open Access Journals (Sweden)

    Faouzi Jaïdi

    2018-01-01

    Full Text Available Substantial advances in Information and Communication Technologies (ICT bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things, edge-fog-social-cloud computing, and big data analytics is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our system SVIRVRO that allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.

  8. The effects of a social media policy on pharmacy students' facebook security settings.

    Science.gov (United States)

    Williams, Jennifer; Feild, Carinda; James, Kristina

    2011-11-10

    To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy.

  9. Effect of Policy Interventions on Food Security in Tigray, Northern Ethiopia

    Directory of Open Access Journals (Sweden)

    Anne van der Veen

    2011-03-01

    Full Text Available Following the design of a conservation-based agricultural development strategy and food security strategy, the Tigray government has implemented different pro-poor development programs over the past years to address the problems of food security. This study attempts to investigate the effectiveness of government policy interventions at different scales addressed to improve food security. Food security both at the regional and district level was investigated by deriving food balance sheets for the period 2000-2008. An empirical analysis based on a logit model was also employed to analyze household level food security status. The results of the logit model reveal that government policy interventions such as water harvesting schemes, employment generation schemes, and promotion of technology adoption significantly contribute to a higher likelihood of household food security status. The findings of the food balance sheet also indicate that the region has made some impressive development gains in improving regional food self-sufficiency, indicating the importance of government interventions in improving food security both at the household and regional level.

  10. A review of management of infertility in Nigeria: framing the ethics of a national health policy.

    Science.gov (United States)

    Akinloye, Oluyemi; Truter, Ernest J

    2011-01-01

    Infertility has recently been construed to be a serious problem in sub-Saharan Africa. This problem seems to be viewed as of low priority with reference to the effective and efficient allocation of available health resources by national governments as well as by international donors sponsoring either research or service delivery in the public health sector. In this paper the problem of infertility in Nigeria is surveyed with a view to assessing the ethical dimension of proposals to manage infertility as a public sector priority in health care delivery. The population/individual and public/private distinction in the formulation of health policy has ethical implications that cannot simply be ignored and are therefore engaged in critically assessing the problem of infertility. Cost-utility analysis (such as Quality Adjusted Life-Year composite index) in the management of infertility in Nigeria entails the need for caution relevant to the country's efforts to achieve Millennium Development Goals. This should remain the case whether the ethical evaluation appeals to utilitarian or contractarian (Rawlsian) principles. The "worst off " category of Nigerians includes (1) underweight children less than 5 years of age, with special concern for infants (0-1 years of age) and (2) the proportion of the population below a minimum level of dietary consumption. The Rawlsian ethic implies that any Federal Ministry of Health policy aimed at establishing public programs for infertility management can be considered a "fair" allocation and expenditure if, and only if, the situation for these two cohorts is not thereby made worse. Nigerian health policy cannot assume this type of increased allocation of its resources to infertility care without it being hard pressed to warrant defensible moral or rational argument.

  11. A methodological frame for assessing benzene induced leukemia risk mitigation due to policy measures

    International Nuclear Information System (INIS)

    Karakitsios, Spyros P.; Sarigiannis, Dimosthenis A.; Gotti, Alberto; Kassomenos, Pavlos A.; Pilidis, Georgios A.

    2013-01-01

    The study relies on the development of a methodology for assessing the determinants that comprise the overall leukemia risk due to benzene exposure and how these are affected by outdoor and indoor air quality regulation. An integrated modeling environment was constructed comprising traffic emissions, dispersion models, human exposure models and a coupled internal dose/biology-based dose–response risk assessment model, in order to assess the benzene imposed leukemia risk, as much as the impact of traffic fleet renewal and smoking banning to these levels. Regarding traffic fleet renewal, several “what if” scenarios were tested. The detailed full-chain methodology was applied in a South-Eastern European urban setting in Greece and a limited version of the methodology in Helsinki. Non-smoking population runs an average risk equal to 4.1 · 10 −5 compared to 23.4 · 10 −5 for smokers. The estimated lifetime risk for the examined occupational groups was higher than the one estimated for the general public by 10–20%. Active smoking constitutes a dominant parameter for benzene-attributable leukemia risk, much stronger than any related activity, occupational or not. From the assessment of mitigation policies it was found that the associated leukemia risk in the optimum traffic fleet scenario could be reduced by up to 85% for non-smokers and up to 8% for smokers. On the contrary, smoking banning provided smaller gains for (7% for non-smokers, 1% for smokers), while for Helsinki, smoking policies were found to be more efficient than traffic fleet renewal. The methodology proposed above provides a general framework for assessing aggregated exposure and the consequent leukemia risk from benzene (incorporating mechanistic data), capturing exposure and internal dosimetry dynamics, translating changes in exposure determinants to actual changes in population risk, providing a valuable tool for risk management evaluation and consequently to policy support. - Highlights

  12. A review of management of infertility in Nigeria: framing the ethics of a national health policy

    Directory of Open Access Journals (Sweden)

    Akinloye O

    2011-08-01

    Full Text Available Oluyemi Akinloye1,2, Ernest J Truter21Department of Chemical Pathology, Reproductive and Molecular Endocrinology Unit, College of Health Sciences, Ladoke Akintola University of Technology, Osogbo, Osun State, Nigeria; 2Department of Biomedical Sciences, Faculty of Health and Wellness Science, Cape Peninsula University of Technology, Bellville Campus, Cape Town, South AfricaAbstract: Infertility has recently been construed to be a serious problem in sub-Saharan Africa. This problem seems to be viewed as of low priority with reference to the effective and efficient allocation of available health resources by national governments as well as by international donors sponsoring either research or service delivery in the public health sector. In this paper the problem of infertility in Nigeria is surveyed with a view to assessing the ethical dimension of proposals to manage infertility as a public sector priority in health care delivery. The population/individual and public/private distinction in the formulation of health policy has ethical implications that cannot simply be ignored and are therefore engaged in critically assessing the problem of infertility. Cost–utility analysis (such as Quality Adjusted Life-Year composite index in the management of infertility in Nigeria entails the need for caution relevant to the country's efforts to achieve Millennium Development Goals. This should remain the case whether the ethical evaluation appeals to utilitarian or contractarian (Rawlsian principles. The "worst off" category of Nigerians includes (1 underweight children less than 5 years of age, with special concern for infants (0–1 years of age and (2 the proportion of the population below a minimum level of dietary consumption. The Rawlsian ethic implies that any Federal Ministry of Health policy aimed at establishing public programs for infertility management can be considered a "fair" allocation and expenditure if, and only if, the situation for

  13. A methodological frame for assessing benzene induced leukemia risk mitigation due to policy measures

    Energy Technology Data Exchange (ETDEWEB)

    Karakitsios, Spyros P. [Aristotle University of Thessaloniki, Department of Chemical Engineering, 54124 Thessaloniki (Greece); Sarigiannis, Dimosthenis A., E-mail: denis@eng.auth.gr [Aristotle University of Thessaloniki, Department of Chemical Engineering, 54124 Thessaloniki (Greece); Centre for Research and Technology Hellas (CE.R.T.H.), 57001, Thessaloniki (Greece); Gotti, Alberto [Centre for Research and Technology Hellas (CE.R.T.H.), 57001, Thessaloniki (Greece); Kassomenos, Pavlos A. [University of Ioannina, Department of Physics, Laboratory of Meteorology, GR-45110 Ioannina (Greece); Pilidis, Georgios A. [University of Ioannina, Department of Biological Appl. and Technologies, GR-45110 Ioannina (Greece)

    2013-01-15

    The study relies on the development of a methodology for assessing the determinants that comprise the overall leukemia risk due to benzene exposure and how these are affected by outdoor and indoor air quality regulation. An integrated modeling environment was constructed comprising traffic emissions, dispersion models, human exposure models and a coupled internal dose/biology-based dose–response risk assessment model, in order to assess the benzene imposed leukemia risk, as much as the impact of traffic fleet renewal and smoking banning to these levels. Regarding traffic fleet renewal, several “what if” scenarios were tested. The detailed full-chain methodology was applied in a South-Eastern European urban setting in Greece and a limited version of the methodology in Helsinki. Non-smoking population runs an average risk equal to 4.1 · 10{sup −5} compared to 23.4 · 10{sup −5} for smokers. The estimated lifetime risk for the examined occupational groups was higher than the one estimated for the general public by 10–20%. Active smoking constitutes a dominant parameter for benzene-attributable leukemia risk, much stronger than any related activity, occupational or not. From the assessment of mitigation policies it was found that the associated leukemia risk in the optimum traffic fleet scenario could be reduced by up to 85% for non-smokers and up to 8% for smokers. On the contrary, smoking banning provided smaller gains for (7% for non-smokers, 1% for smokers), while for Helsinki, smoking policies were found to be more efficient than traffic fleet renewal. The methodology proposed above provides a general framework for assessing aggregated exposure and the consequent leukemia risk from benzene (incorporating mechanistic data), capturing exposure and internal dosimetry dynamics, translating changes in exposure determinants to actual changes in population risk, providing a valuable tool for risk management evaluation and consequently to policy support

  14. The invisibility of men in South African violence prevention policy: national prioritization, male vulnerability, and framing prevention.

    Science.gov (United States)

    van Niekerk, Ashley; Tonsing, Susanne; Seedat, Mohamed; Jacobs, Roxanne; Ratele, Kopano; McClure, Roderick

    2015-01-01

    South Africa has a significant violence problem. The exposure of girls and women to interpersonal violence is widespread, and the victimization of men, especially to severe and homicidal forms of aggression, is of considerable concern, with male homicide eight times the global rate. In the last two decades, there have been a plethora of South African policies to promote safety. However, indications suggest that the policy response to violence is not coherently formulated, comprehensive, or evenly implemented. This study examines selected South African national legislative instruments in terms of their framing and definition of violence and its typology, vulnerable populations, and prevention. This study comprises a directed content analysis of selected legislative documents from South African ministries mandated to prevent violence and its consequences or tasked with the prevention of key contributors to violence. Documents were selected using an electronic keyword search method and analyzed independently by two researchers. The legislative documents recognized the high levels of violence, confirmed the prioritization of selected vulnerable groups, especially women, children, disabled persons, and rural populations, and above all drew on criminological perspectives to emphasize tertiary prevention interventions. There is a policy focus on the protection and support of victims and the prosecution of perpetrators, but near absent recognition of men as victims. There is a need to broaden the policy framework from primarily criminological and prosecutorial perspectives to include public health contributions. It is likewise important to enlarge the conceptions of vulnerability to include men alongside other vulnerable groups. These measures are important for shaping and resourcing prevention decisions and strengthening primary prevention approaches to violence.

  15. The invisibility of men in South African violence prevention policy: national prioritization, male vulnerability, and framing prevention

    Science.gov (United States)

    van Niekerk, Ashley; Tonsing, Susanne; Seedat, Mohamed; Jacobs, Roxanne; Ratele, Kopano; McClure, Roderick

    2015-01-01

    Background South Africa has a significant violence problem. The exposure of girls and women to interpersonal violence is widespread, and the victimization of men, especially to severe and homicidal forms of aggression, is of considerable concern, with male homicide eight times the global rate. In the last two decades, there have been a plethora of South African policies to promote safety. However, indications suggest that the policy response to violence is not coherently formulated, comprehensive, or evenly implemented. Objective This study examines selected South African national legislative instruments in terms of their framing and definition of violence and its typology, vulnerable populations, and prevention. Design This study comprises a directed content analysis of selected legislative documents from South African ministries mandated to prevent violence and its consequences or tasked with the prevention of key contributors to violence. Documents were selected using an electronic keyword search method and analyzed independently by two researchers. Results The legislative documents recognized the high levels of violence, confirmed the prioritization of selected vulnerable groups, especially women, children, disabled persons, and rural populations, and above all drew on criminological perspectives to emphasize tertiary prevention interventions. There is a policy focus on the protection and support of victims and the prosecution of perpetrators, but near absent recognition of men as victims. Conclusions There is a need to broaden the policy framework from primarily criminological and prosecutorial perspectives to include public health contributions. It is likewise important to enlarge the conceptions of vulnerability to include men alongside other vulnerable groups. These measures are important for shaping and resourcing prevention decisions and strengthening primary prevention approaches to violence. PMID:26228996

  16. The invisibility of men in South African violence prevention policy: national prioritization, male vulnerability, and framing prevention

    Directory of Open Access Journals (Sweden)

    Ashley van Niekerk

    2015-07-01

    Full Text Available Background: South Africa has a significant violence problem. The exposure of girls and women to interpersonal violence is widespread, and the victimization of men, especially to severe and homicidal forms of aggression, is of considerable concern, with male homicide eight times the global rate. In the last two decades, there have been a plethora of South African policies to promote safety. However, indications suggest that the policy response to violence is not coherently formulated, comprehensive, or evenly implemented. Objective: This study examines selected South African national legislative instruments in terms of their framing and definition of violence and its typology, vulnerable populations, and prevention. Design: This study comprises a directed content analysis of selected legislative documents from South African ministries mandated to prevent violence and its consequences or tasked with the prevention of key contributors to violence. Documents were selected using an electronic keyword search method and analyzed independently by two researchers. Results: The legislative documents recognized the high levels of violence, confirmed the prioritization of selected vulnerable groups, especially women, children, disabled persons, and rural populations, and above all drew on criminological perspectives to emphasize tertiary prevention interventions. There is a policy focus on the protection and support of victims and the prosecution of perpetrators, but near absent recognition of men as victims. Conclusions: There is a need to broaden the policy framework from primarily criminological and prosecutorial perspectives to include public health contributions. It is likewise important to enlarge the conceptions of vulnerability to include men alongside other vulnerable groups. These measures are important for shaping and resourcing prevention decisions and strengthening primary prevention approaches to violence.

  17. OECD Policy Recommendations on Security for Biological Materials

    International Nuclear Information System (INIS)

    Radisch, J.

    2007-01-01

    Biomedical innovations derived from research on pathogenic micro-organisms promise astounding health and economic benefits. Some such biological resources employed in the RandD for diagnostic kits, vaccines and therapeutics, however, possess capacity for dual-use; they may be misused to develop biological weapons. Research facilities entrusted with possession of such dual-use materials have a responsibility to comply with biosecurity measures that are designed to prevent loss or theft and thereby reduce the probability of a bioterrorist attack. The OECD has provided a forum for its Member countries to engage in a dialogue of international co-operation with a view to produce policies that achieve a research environment fortified by biosecurity measures and capable of producing health innovations. In 2007, the OECD developed a risk assessment framework and risk management principles for Biological Resource Centres. Ongoing policy work at the OECD will look to design biosecurity guidelines appropriate to a broader range of facilities in possession of dual-use materials, such as university and industrial laboratories.(author)

  18. Common Foreign and Security Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Haydar Efe

    2008-06-01

    Full Text Available CFSP has been one of the most difficult areas in the cooperation cooperate in EU’s integration process. Because member states which have different national interests, historical traditions and different political relations with other parts of the world, have seen it as a sign of their sovereignty. But, in spite of many controversies, the demands for a CFSP are widely shared in the EU. The main argument of this study is to emphasize the fact that in the realization of the aims of EU for being effective in the solutions of international problems and for being the main actor on the global policy the only way is to form effective and coherent DDGP

  19. Sustainable land use and food security in developing countries: DLV's approach to policy support.

    NARCIS (Netherlands)

    Keulen, van H.; Kuyvenhoven, A.; Ruben, R.

    1998-01-01

    During the past decades, major changes have taken place with regard to the available policy instruments for food security and rural development. These changes are reviewed against the background of the structural adjustment programmes carried out in the agricultural sector. The linkages between

  20. American Policy in the Persian Gulf Region: Peace, Security, and the Spread of Democracy

    National Research Council Canada - National Science Library

    Fox, Darin J

    2008-01-01

    To achieve lasting security in the Arabian Gulf region, U.S. policy, though currently focused on Iraq, must engage Saudi Arabia and Iran with all of its instruments of national power to encourage the spread of democracy within the region...

  1. Policies and measures for economic efficiency, energy security and environment protection in India

    International Nuclear Information System (INIS)

    Venkaiah, M.; Kaushik, S.C.; Dewangan, M.L.

    2007-01-01

    India needs to sustain 8-10% economic growth to meet energy needs of people below poverty line. India would, at least, need to grow its primary energy supply (3-4 times) of present consumption to deliver a sustained growth of 8% by 2031. This paper discusses India's policies and measures for economic efficiency, environment protection and energy security (3-E). (author)

  2. Visa Security Policy: Roles of the Departments of State and Homeland Sec

    Science.gov (United States)

    2010-03-08

    report pursuant to S. Res.137., committee print, 81st Cong., 2nd sess., April 20, 1950. 11 8 U.S.C. 1104 . 12 8 U.S.C. 1201. Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS

  3. Education Policy and National Security in Brazil in the Post-1964 Context

    Science.gov (United States)

    Silveira, Rene Trentin

    2013-01-01

    The aim of this article is to analyse and show in detail the influence of the National Security and Development Doctrine, the main ideological prop of the 1964 civilian-military coup, on the education policy implemented by the regime. Special attention is given to the MEC-USAID agreements, the setting up of the Meira Matos Commission and the…

  4. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    -, 9/2008 (2008), s. 1-34 R&D Projects: GA ČR GA402/05/0711 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics http://ies.fsv.cuni.cz/default/file/download/id/8361

  5. Effects of competing news media frames of weight on antifat stigma, beliefs about weight and support for obesity-related public policies.

    Science.gov (United States)

    Frederick, D A; Saguy, A C; Sandhu, G; Mann, T

    2016-03-01

    In the popular news media, public health officials routinely emphasize the health risks of obesity and portray weight as under personal control. These messages may increase support for policies designed to reduce rates of obesity, but can also increase antifat stigma. Less often, the media cover 'Health at Every Size' or 'Fat Rights' perspectives that may have the opposite effects. We investigated how exposure to different 'fat frames' shifts attitudes about weight and support for obesity policies. Across four experiments (n=2187), people read constructed news articles framing fatness as negative (unhealthy, controllable, acceptable to stigmatize) or positive (healthy, uncontrollable, unacceptable to stigmatize). Compared with people who read fat-positive frames, people who read fat-negative frames expressed more: belief in the health risks of being fat (d=0.95-1.22), belief weight is controllable (d=0.38-0.55), support for charging obese people more for health insurance (d=0.26-0.77), antifat prejudice (in three out of four experiments, d=0.28-0.39), willingness to discriminate against fat people (d=0.39-0.71) and less willingness to celebrate body size diversity (d=0.37-0.64). They were also less willing to say that women at the lower end of the obese range could be healthy at their weights. Effects on support for public policies, however, were generally small and/or nonsignificant. Compared with a control condition, exposure to fat-positive frames generally shifted attitudes more than fat-negative frames. In experiment 4, adding a message about the unacceptability of weight-based discrimination to unhealthy/controllable news articles only reduced antifat stigma on one of three measures compared with articles adding a discrimination-acceptable message. Exposure to different news frames of fat can shift beliefs about weight-related health risks and weight-based stigma. Shifting policy attitudes, however, is more challenging.

  6. Policy revision in health enterprise information security: P3WG final report

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2003-05-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.

  7. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  8. Addressing 2030 EU policy framework for energy and climate: Cost, risk and energy security issues

    International Nuclear Information System (INIS)

    Llano-Paz, Fernando de; Martínez Fernandez, Paulino; Soares, Isabel

    2016-01-01

    The different energy sources, their costs and impacts on the environment determine the electricity production process. Energy planning must solve the existence of uncertainty through the diversification of power generation technologies portfolio. The European Union energy and environmental policy has been mainly based on promoting the security of supply, efficiency, energy savings and the promotion of Renewable Energy Sources. The recent European Commission communication “Towards an European Energy Union: A secure, sustainable, competitive and affordable energy for every European” establishes the path for the European future. This study deals with the analysis of the latest EU “Energy Union” goals through the application of Markowitz portfolio theory considering technological real assets. The EU targets are assessed under a double perspective: economic and environmental. The model concludes that implementing a high share of Renewable Energy target in the design of European Policies is not relevant: the maximization of Renewable Energy share could be achieved considering a sole Low Emissions of carbon dioxide policy. Additionally it is confirmed the need of Nuclear energy in 2030: a zero nuclear energy share in 2030 European Mix is not possible, unless the technological limits participation for Renewable Energy Sources were increased. - Highlights: • Implementing a high RES share target in European Policies could not be relevant. • Maximizing RES share could be achieved considering a sole Low Emissions policy. • The EU 2030 Nuclear energy 50% shutting down could be feasible. • Minimizing risk portfolio presents high diversification and energy security levels.

  9. Comparative analysis of military security policy of Norway and Denmark in the Arctic region

    Directory of Open Access Journals (Sweden)

    Igor S. Doroshenko

    2017-01-01

    Full Text Available The interest of Western countries in the Arctic region is growing with each new statement about the sharp climate change and the melting of the Arctic Ocean’s glaciers. In addition to the threats related to the environmental situation in the Arctic zone, the desire to participate in shelf research and development, the potential of using the sea routes of the region by both the Arctic and non-Arctic states creates threats to the security of the Nordic countries.The coastal states, which in case of the escalation of tensions will be in the midst of a regional conflict in the Arctic, are Norway and Denmark. Therefore, the analysis of a level of Norwegian and Danish military security against a backdrop of increasing confrontation between Russia and West and changing climate situation in the region is urgent ., Nevertheless, to ensure a necessary level of defence capability as well as security of borders and zones of exceptional economic interests in the conditions of low temperatures is not so easy. This article examines the Norwegian and Danish approaches to the new military security challenges in the Arctic region. The paper contains examination of the doctrinal basis of military security along with the main documents that form the security concepts of the two countries in the Arctic region, and the reports of the defense ministries and scientific institutions surveys of military activities in the Arctic.Three directions of coastal countries’ policy making in the issues of military security were chosen for comparison. Firstly, the relationships with the USA, the leader of the North Atlantic alliance, which allow us to determine the significance of Norway and Denmark in building NATO security in the north. Secondly, the relationships with the EU and separately with the Nordic countries are considered. This case shows the level of involvement of the European community in the issue of ensuring the Arctic security . Thirdly, the relationships with

  10. Youth transitioning out of foster care: an evaluation of a Supplemental Security Income policy change.

    Science.gov (United States)

    King, Laura; Rukh-Kamaa, Aneer

    2013-01-01

    Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.

  11. The Paradox of German Foreign and Security Policy: With Respect to National Energy Security

    Science.gov (United States)

    2009-05-21

    analysis from an historical perspective and first published post- materialist theory. It builds on Maslow ‟s hierarchy of needs and seeks to explain how...and maintaining the data needed , and completing and reviewing this collection of information. Send comments regarding this burden estimate or any...policy. Being strategically prepared when market forces fail to balance contradictory interests becomes a necessity for many countries. Based on Germany

  12. The united states and the world oil security. US oil policy and production of a global collective good

    International Nuclear Information System (INIS)

    Noel, P.

    2004-07-01

    The aim of this paper is to define and discusses the part of the Unites States in the world oil system operating and more particularly the US oil security policy in the world policy. It refutes some established ideas as the necessity of the US military supremacy to provide the oil security, the necessity of ''agreements'' with oil exporting countries facing the US energy consumption increase or the limitation of the resources access to other countries. At the opposite the United States seem to invest in the production of a global public good in matter of energy security. In order to illustrate this opinion the author defines the problem of the US oil security in a world context. He analyzes then the US policies to show the impacts in the world oil security and studies the specific part of the military factor in the security policy. (A.L.B.)

  13. Increasing public support for food-industry related, obesity prevention policies: The role of a taste-engineering frame and contextualized values.

    Science.gov (United States)

    Ortiz, Selena E; Zimmerman, Frederick J; Adler, Gary J

    2016-05-01

    Support for policies to combat obesity is often undermined by a public sense that obesity is largely a matter of personal responsibility. Industry rhetoric is a major contributor to this perception, as the soda/fast food/big food companies emphasize choice and individual agency in their efforts to neutralize policies that are burdensome. Yet obesity experts recognize that environmental forces play a major role in obesity. We investigate whether exposure to a taste-engineering frame increases support for food and beverage policies that address obesity. A taste-engineering frame details strategies used by the food industry to engineer preferences and increase the over-consumption of processed foods and sugary beverages. We also examine the effects of exposure to two contextualized values that have recently been promoted in expert discourse-consumer knowledge and consumer safety - on public support of policies. Our research shows how causal frames and contextualized values may effectively produce support for new obesity policies. We use an online survey experiment to test the effects of exposure to a taste-engineering frame (TEF), the value of consumer knowledge (CK), or the value of consumer safety (CS), on level of support for a range of policies. A random sample of adults, age 18 + living in the United States was included in the study (N = 2580). Ordered logistic regression was used to measure the effects of treatment exposure. The primary outcome was level-of-support for four (4) food-industry related, obesity prevention policies (aka food and beverage policies): 1) require food-manufacturers to disclose the amount of additives in food products on food packaging; 2) require food-manufacturers to advertise food products in accordance with their actual nutritional value; 3) prohibit all high-fat, high-sugar food advertising on television programming watched primarily by children; and 4) increase healthy food availability in work sites, schools, and hospitals

  14. Integrating security issues in nuclear engineering curriculum in Indonesia. Classical vs policy approaches

    International Nuclear Information System (INIS)

    Putero, Susetyo Hario; Rosita, Widya; Sihana, Fnu; Ferdiansjah; Santosa, Haryono Budi; Muharini, Anung

    2015-01-01

    Recently, risk management for nuclear facilities becomes more complex due to security issue addressed by IAEA. The harmonization between safety, safeguards and security is still questionable. It also challenges to nuclear engineering curriculum in the world how to appropriately lecture the new issue. This paper would like to describe how to integrate this issue in developing nuclear engineering curriculum in Indonesia. Indonesia has still no nuclear power plant, but there are 3 research reactors laid in Indonesia. As addition, there are several hospitals and industries utilizing radioisotopes in their activities. The knowledge about nuclear security of their staffs is also not enough for handling radioactive material furthermore the security officers. Universitas Gadjah Mada (UGM) is the only university in Indonesia offering nuclear engineering program, as consequently the university should actively play the role in overcoming this issue not only in Indonesia, but also in Southeast Asia. In the other hand, students has to have proper knowledge in order to complete in the global nuclear industry. After visited several universities in USA and participated in INSEN meeting, we found that most of universities in the world anticipate this issue by giving the student courses related to policy (non-technical) study based on IAEA NSS 12. In the other hand, the rest just make nuclear security as a case study on their class. Furthermore, almost all of programs are graduate level. UGM decided to enhance several present related undergraduate courses with security topics as first step to develop the awareness of student to nuclear security. The next (curriculum 2016) is to integrate security topics into the entire of curriculum including designing a nuclear security elective course for undergraduate level. The first trial has successfully improved the student knowledge and awareness on nuclear security. (author)

  15. Energy security in ASEAN: A quantitative approach for sustainable energy policy

    International Nuclear Information System (INIS)

    Tongsopit, Sopitsuda; Kittner, Noah; Chang, Youngho; Aksornkij, Apinya; Wangjiraniran, Weerin

    2016-01-01

    We investigate energy security of the Association of Southeast Asian Nations (ASEAN) under the 4-A’s framework. The ASEAN Economic Community (AEC) agreement launched in 2015 renewed a regional focus on energy security and sustainability. We employ an analytic framework to quantitatively assess progress in different categories including availability, acceptability, affordability, and applicability. Key metrics include the documentation of CO_2 emissions, energy access measures, and energy supply reserves from 2005–2010. We identify relevant energy indicators using high quality historical data from the IEA and World Bank. We find that ASEAN made little progress toward establishing energy security in the previous five-year planning period (2005–2010) as it regressed in most categories except applicability. Therefore, we suggest that increased development of renewable energy and energy efficiency technologies would move ASEAN in a positive direction toward achieving energy security and sustainable energy policy goals. - Highlights: • We investigate energy security in ASEAN across four dimensions. • Energy security in ASEAN has mostly regressed from 2005–2010. • Future cooperative agreements will help ASEAN improve energy security.

  16. Nuclear security policy in the context of counter-terrorism in Cambodia

    International Nuclear Information System (INIS)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia

  17. Nuclear security policy in the context of counter-terrorism in Cambodia

    Science.gov (United States)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  18. Nuclear security policy in the context of counter-terrorism in Cambodia

    Energy Technology Data Exchange (ETDEWEB)

    Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong [Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  19. Framing the frame

    OpenAIRE

    Todd McElroy; John J. Seta

    2007-01-01

    We examined how the goal of a decision task influences the perceived positive, negative valence of the alternatives and thereby the likelihood and direction of framing effects. In Study 1 we manipulated the goal to increase, decrease or maintain the commodity in question and found that when the goal of the task was to increase the commodity, a framing effect consistent with those typically observed in the literature was found. When the goal was to decrease, a framing effect opposite to the ty...

  20. Role of Global Food Security in the Common Agrarian Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Igor N. Shcherbak

    2014-01-01

    Full Text Available The author devoted his research to the role of the global food security in the priorities of the Common Agricultural Policy of the European Union (CAP. The research sheds light on the parameters of the Common Agricultural Policy and the basic steps on the path of its reform. The research demonstrates that the priorities of the EC are mainly concentrated on achieving food security for the member-states of the EC, its population and the interests of the agricultural sector. The modern challenges to the Global Food Security (global food crises of 2007-2009, acute food shortages and hunger in crises regions of Africa and chronic malnutrition are placed high on the agenda of the CAP. In this situation, the EU is trying in the interests of stabilization of the world agricultural market to solve simultaneously the tasks of providing assistance for development and mitigation of the threats to the Global Food security. The deepening rift between the strategy of the CAP oriented towards promotion of agricultural export and real contribution of the EC to the Global Food Security and assistance for development is becoming more and more the most «vulnerable» place of the CAP.

  1. The Nuclear Security Science and Policy Institute at Texas A&M University

    Directory of Open Access Journals (Sweden)

    Claudio A. Gariazzo

    2015-07-01

    Full Text Available The Nuclear Security Science and Policy Institute (NSSPI is a multidisciplinary organization at Texas A&M University and was the first U.S. academic institution focused on technical graduate education, research, and service related to the safeguarding of nuclear materials and the reduction of nuclear threats. NSSPI employs science, engineering, and policy expertise to: (1 conduct research and development to help detect, prevent, and reverse nuclear and radiological proliferation and guard against nuclear terrorism; (2 educate the next generation of nuclear security and nuclear nonproliferation leaders; (3 analyze the interrelationships between policy and technology in the field of nuclear security; and (4 serve as a public resource for knowledge and skills to reduce nuclear threats. Since 2006, over 31 Doctoral and 73 Master degrees were awarded through NSSPI-sponsored research. Forty-one of those degrees are Master of Science in Nuclear Engineering with a specialization in Nuclear Nonproliferation and 16 were Doctorate of Philosophy degrees with a specific focus on nuclear nonproliferation. Over 200 students from both technical and policy backgrounds have taken classes provided by NSSPI at Texas A&M. The model for creating safeguards and security experts, which has in large part been replicated worldwide, was established at Texas A&M by NSSPI faculty and staff. In addition to conventional classroom lectures, NSSPI faculty have provided practical experiences; advised students on valuable research projects that have contributed substantially to the overall nuclear nonproliferation, safeguards and security arenas; and engaged several similar academic and research institutes around the world in activities and research for the benefit of Texas A&M students. NSSPI has had an enormous impact on the nuclear nonproliferation workforce (across the international community in the past 8 years, and this paper is an attempt to summarize the activities

  2. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  3. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  4. 'Sustainability does not quite get the attention it deserves': synergies and tensions in the sustainability frames of Australian food policy actors.

    Science.gov (United States)

    Trevena, Helen; Kaldor, Jenny Claire; Downs, Shauna M

    2015-09-01

    The development of food policy is strongly influenced by the understanding and position actors adopt in their 'framing' of sustainability. The Australian Government developed a National Food Plan (2010-2013). In public consultations on the National Food Plan Green Paper, the government sought stakeholders' views on sustainability. The present study examined the way in which the food industry and civil society organizations framed sustainability in their submissions to the Green Paper. Submissions by food industry actors and civil society organizations were analysed using a framing matrix that examined positioning, drivers, underlying principles and policy solutions related to sustainability. Submissions were open coded and subsequently organized based on themes within the framing matrix. Australia. One hundred and twenty-four written submissions (1420 pages). While submissions from industry and civil society organizations often framed sustainability similarly, there were also major differences. Civil society organizations were more likely to make the link between the food supply and population health, while industry was more likely to focus on economic sustainability. Both viewed consumer demand as a driver of sustainability, welcomed the idea of a whole-of-government approach and stressed the need for investment in research and development to improve productivity and sustainable farming practices. The meaning of sustainability shifted throughout the policy process. There are opportunities for creating shared value in food policy, where the health, environment and economic dimensions of sustainability can be compatible. However, despite pockets of optimism there is a need for a shared vision of sustainability if Australia is to have a food policy integrating these dimensions.

  5. Adoption of an information systems security policy in small and medium sized enterprises.

    Directory of Open Access Journals (Sweden)

    Isabel Maria Lopes

    2017-03-01

    Full Text Available Information Systems Security (ISS is a relevant fact for current organizations. This paper focuses on Small and Medium Sized Enterprises (SMEs. This article aims to constitute an empirical study on the applicability of the Action Research (AR method in information systems, more specifically by assessing the adoption of an ISS policy in six SMEs, and identifying the critical success factors in adopting an ISS policy. The research question we intend to answer is to what extent this research method is adequate to reach the proposed goal. The results of the study suggest that AR is a promising means for the evaluation of ISS policies adoption. It can both act as a research method that improves the understanding about the reasons why the policy has been abandoned, and as a change method, assisting practitioners to overcome barriers and suggesting measures to be implemented.

  6. Super Network on the Prairie The Discursive Framing of Broadband Connectivity by Policy Planners and Rural Residents in Alberta, Canada

    Directory of Open Access Journals (Sweden)

    Maria Bakardjieva

    2010-06-01

    Full Text Available This paper focuses on the case of the SuperNet, an infrastructure project designed and sponsored by the provincial government of Alberta, Canada with the objective of providing broadband connectivity to public facilities, businesses and residences in rural communities. The data were collected through individual interviews, focus groups, and town hall meetings in the course of a collaborative research initiative (The SuperNet Research Alliance that investigated the social construction of the broadband network from multiple perspectives. The objective of the paper is to examine in parallel the discourses in which the concept of broadband connectivity acquired meaning and substance at the levels of 1 provincial government and industry policy planners and 2 the residents of the rural communities who were the intended beneficiaries of the SuperNet. Using actor-network theory as a departure point, this analysis takes stock of the framing devices employed in the two sets of discourses and of the distinctive worldviews that generated them. It looks for the meeting points and the disjunctions between the grand visions and the grounded projections underlying the positions taken by the two respective categories of actors. Differences in the interpretation and appropriation of broadband among rural Albertans themselves are discerned and related to social factors characterizing different situations within rural areas. Rural broadband connectivity thus emerges not so much as a one-dimensional access equalizer for rural people, but as a complex mediator of opportunity, participation and identity.

  7. Policy and Policy Formulation Considerations for Incorporation of Secure Mobile Devices in USMC Ground Combat Units

    Science.gov (United States)

    2014-09-01

    Defense Information Systems Network Flag Panel, and its GIG waiver request within 14 days or be subject to censorship and punitive action (Office...can disproportionately affect the outcome of an engagement. Balancing the requirements of GIG security while also incorporating technologies which...classified the paradigm of the industrial age as the division of labor and economies of scale in his 1776 The Wealth of Nations, and it was on these

  8. Food security and nutrition in the Russian Federation – a health policy analysis

    Directory of Open Access Journals (Sweden)

    Karsten Lunze

    2015-06-01

    Full Text Available Background: In the Russian Federation (Russia, an elevated burden of premature mortality attributable to non-communicable diseases (NCDs has been observed since the country's economic transition. NCDs are largely related to preventable risk factors such as unhealthy diets. Objective: This health policy study's aim was to analyze past and current food production and nutritional trends in Russia and their policy implications for Russia's NCD burden. Design: We examined food security and nutrition in Russia using an analytical framework of food availability, access to food, and consumption. Results: Agricultural production declined during the period of economic transition, and nutritional habits changed from high-fat animal products to starches. However, per-capita energy consumption remained stable due to increased private expenditures on food and use of private land. Paradoxically, the prevalence of obesity still increased because of an excess consumption of unsaturated fat, sugar, and salt on one side, and insufficient intake of fruit and vegetables on the other. Conclusions: Policy and economic reforms in Russia were not accompanied by a food security crisis or macronutrient deprivation of the population. Yet, unhealthy diets in contemporary Russia contribute to the burden of NCDs and related avoidable mortality. Food and nutrition policies in Russia need to specifically address nutritional shortcomings and food-insecure vulnerable populations. Appropriate, evidence-informed food and nutrition policies might help address Russia's burden of NCDs on a population level.

  9. Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    has the capability of combining both history-sensitive and future-sensitive policies, providing even more flexibility and power. Moreover, we propose a global Logic for reasoning about the systems designed with this language. We show how the Logic can be used to validate the combination of security...... this approach with history-based components, as is traditional in reference-monitor-based approaches to mandatory access control. Our developments are performed in an Aspect-oriented coordination language, aiming to describe the Bell-LaPadula policy as elegantly as possible. Furthermore, the resulting language...

  10. Food security for infants and young children: an opportunity for breastfeeding policy?

    Science.gov (United States)

    Salmon, Libby

    2015-01-01

    Increased global demand for imported breast milk substitutes (infant formula, follow-on formula and toddler milks) in Asia, particularly China, and food safety recalls have led to shortages of these products in high income countries. At the same time, commodification and trade of expressed breast milk have fuelled debate about its regulation, cost and distribution. In many economies suboptimal rates of breastfeeding continue to be perpetuated, at least partially, because of a failure to recognise the time, labour and opportunity costs of breast milk production. To date, these issues have not figured prominently in discussions of food security. Policy responses have been piecemeal and reveal conflicts between promotion and protection of breastfeeding and a deregulated trade environment that facilitates the marketing and consumption of breast milk substitutes. The elements of food security are the availability, accessibility, utilization and stability of supply of nutritionally appropriate and acceptable quantities of food. These concepts have been applied to food sources for infants and young children: breastfeeding, shared breast milk and breast milk substitutes, in accordance with World Health Organization (WHO)/United Nations Children's Fund (UNICEF) guidelines on infant feeding. A preliminary analysis indicates that a food security framework may be used to respond appropriately to the human rights, ethical, economic and environmental sustainability issues that affect the supply and affordability of different infant foods. Food security for infants and young children is not possible without high rates of breastfeeding. Existing international and national instruments to protect, promote and support breastfeeding have not been implemented on a wide scale globally. These instruments need review to take into account the emerging trade environment that includes use of the internet, breast milk markets and globalised supply chains for breast milk substitutes. New

  11. Successes and Shortfalls of European Union Common Security and Defence Policy Missions in Africa

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Nervanto, Elisa

    This brief synthesises the IECEU project’s most essential findings on the effectiveness of European Union (EU) missions in four Africa countries: Libya, South Sudan, the Democratic Republic of the Congo (DRC) and the Central African Republic (CAR). It describes the main elements and impact...... and context. However, the EU missions presented in this brief share the main characteristic that they have all been deployed under the union’s Common Security and Defence Policy (CSDP)2 with the explicit intent of improving the overall security situation and addressing conflicts in Africa. This brief...... will start by providing a short overview of each case, describing the conflict(s), security situation, mission objectives and obstacles. In this way, it compares the overall effectiveness of EU operational conflict prevention across the four African countries and discusses what lessons can be learned from...

  12. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  13. Analysis of Department of Defense social media policy and its impact on operational security

    OpenAIRE

    Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah

    2015-01-01

    Approved for public release; distribution is unlimited The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means ...

  14. Leadership From the Centre: A New Foreign and Security Policy for Germany

    Science.gov (United States)

    2016-03-01

    collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources...the form of new partnerships, for a commitment that in a globalised world no longer has any geographical limits: No nation—whatever its size— to...German security and defense policy debates. D. RESEARCH DESIGN AND METHODOLOGY This thesis will source mainly scholarly works and news articles with

  15. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    2008-01-01

    Roč. 58, 7-8 (2008), s. 329-358 ISSN 0015-1920 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics Impact factor: 0.275, year: 2008 http://journal.fsv.cuni.cz/storage/1137_dusek-kopecsni_-_329-358-opravené.pdf

  16. Britain, France and Germany: Priorities for the European Union’s Security and Defense Policy

    Science.gov (United States)

    2009-12-01

    David M. Triesman, “A Strong, Competitive Europe is Vital” ( Mansion House, London, 9 January 2007), Denis MacShane, “Enlarging the EU: Peace and...Europe” ( Humboldt University, Berlin, 16 May 2006), http://www.fco.gov.uk/en/newsroom/latest-news/?view=Speech&id=1893537 (accessed 18 April 2009... Humboldt University, Berlin, 16 May 2006. Howorth, Jolyon. Security and Defence Policy in the European Union. New York: Palgrave Macmillan, 2007

  17. Nuclear regulatory policy concept on safety, security, safeguards and emergency preparedness (3S+EP)

    International Nuclear Information System (INIS)

    Ilyas, Zurias

    2009-01-01

    Regulatory Policy is formulated in regulations that stipulate the assurance of workers and public safety and environmental protection. Legislation and regulations on nuclear energy should consider nuclear safety, security and safeguards, as well as nuclear emergency preparedness (3S+EP) and liability for nuclear damage. Specific requirements stipulated in international conventions and agreements should also be taken into account. Regulatory Policy is formulated in regulations that stipulate the assurance of workers and public safety and environmental protection. Legislation and regulations on nuclear energy should consider nuclear safety, security and safeguards, as well as nuclear emergency preparedness (3S+EP) and liability for nuclear damage. Specific requirements stipulated in international conventions and agreements should also be taken into account. By undertaking proper regulatory oversight on Safety, Security and Emergency Preparedness (3S+EP) as an integrated and comprehensive system, safe and secure use of nuclear energy can be assured. Licence requirements and conditions should fulfil regulatory requirements pertaining to 3S+EP for nuclear installation as an integrated system. An effective emergency capacity that can be immediately mobilized is important. The capacity in protecting the personnel before, during and after the disaster should also be planned. Thus, proper emergency preparedness should be supported by adequate resources. The interface between safety, security, safeguards and emergency preparedness has to be set forth in nuclear regulations, such as regulatory requirements; 3S+EP; components, systems and structures of nuclear installations and human resources. Licensing regulations should stipulate, among others, DIQ, installations security system, safety analysis report, emergency preparedness requirements and necessary human resources that meet the 3S+EP requirements.

  18. Energy security in western Mediterranean: new factors, new policies. A Spanish perspective

    International Nuclear Information System (INIS)

    Mane-Estrada, Aurelia

    2008-01-01

    After having noticed that there are two typical approaches and models to address energy security, policies acting on the supply side and policies based on a market-and-institutions approach (like stated by the European Union), the author outlines the effects of this second approach for countries of the western Mediterranean Sea, and then analyses the evolutions of energetic relationships between Algeria (where the energy sector is the most open, which is the best equipped in terms of gas infrastructures, and which attracts foreign investors) and European countries of the region (France, Italy, Spain and Portugal). Thus, she analyses present exchanges in the region, the dependency of these European countries on Mediterranean producers, and the relationships between involved companies of the region. She discusses the issue of energy security policy for the region from the perspective of the governments of producing countries and of consuming countries, and of companies. She discusses whether the project of Union for the Mediterranean complies with these objectives of energy security

  19. Changing climate, changing frames

    International Nuclear Information System (INIS)

    Vink, Martinus J.; Boezeman, Daan; Dewulf, Art; Termeer, Catrien J.A.M.

    2013-01-01

    Highlights: ► We show development of flood policy frames in context of climate change attention. ► Rising attention on climate change influences traditional flood policy framing. ► The new framing employs global-scale scientific climate change knowledge. ► With declining attention, framing disregards climate change, using local knowledge. ► We conclude that frames function as sensemaking devices selectively using knowledge. -- Abstract: Water management and particularly flood defence have a long history of collective action in low-lying countries like the Netherlands. The uncertain but potentially severe impacts of the recent climate change issue (e.g. sea level rise, extreme river discharges, salinisation) amplify the wicked and controversial character of flood safety policy issues. Policy proposals in this area generally involve drastic infrastructural works and long-term investments. They face the difficult challenge of framing problems and solutions in a publicly acceptable manner in ever changing circumstances. In this paper, we analyse and compare (1) how three key policy proposals publicly frame the flood safety issue, (2) the knowledge referred to in the framing and (3) how these frames are rhetorically connected or disconnected as statements in a long-term conversation. We find that (1) framings of policy proposals differ in the way they depict the importance of climate change, the relevant timeframe and the appropriate governance mode; (2) knowledge is selectively mobilised to underpin the different frames and (3) the frames about these proposals position themselves against the background of the previous proposals through rhetorical connections and disconnections. Finally, we discuss how this analysis hints at the importance of processes of powering and puzzling that lead to particular framings towards the public at different historical junctures

  20. Chinese and Russian Policies on Climate Change: Implications for U.S. National Security Policy

    Science.gov (United States)

    2016-06-01

    crop productivity in China by 2030 as a result of climate change, and a decline of up to 37 percent in rice, maize , and wheat yields after 2050...against global warming. Comparing and contrasting China’s and Russia’s climate change policies and programs may also help to identify gaps in...adequate measures to adapt agriculture to climate change, the annual economic loss from a decrease in climate-determined crop yield in Russia is

  1. The Effects of a Social Media Policy on Pharmacy Students’ Facebook Security Settings

    Science.gov (United States)

    Feild, Carinda; James, Kristina

    2011-01-01

    Objective. To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. Methods. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. Results. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Conclusions. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy. PMID:22171105

  2. Alternative policy impacts on US GHG emissions and energy security: A hybrid modeling approach

    International Nuclear Information System (INIS)

    Sarica, Kemal; Tyner, Wallace E.

    2013-01-01

    This study addresses the possible impacts of energy and climate policies, namely corporate average fleet efficiency (CAFE) standard, renewable fuel standard (RFS) and clean energy standard (CES), and an economy wide equivalent carbon tax on GHG emissions in the US to the year 2045. Bottom–up and top–down modeling approaches find widespread use in energy economic modeling and policy analysis, in which they differ mainly with respect to the emphasis placed on technology of the energy system and/or the comprehensiveness of endogenous market adjustments. For this study, we use a hybrid energy modeling approach, MARKAL–Macro, that combines the characteristics of two divergent approaches, in order to investigate and quantify the cost of climate policies for the US and an equivalent carbon tax. The approach incorporates Macro-economic feedbacks through a single sector neoclassical growth model while maintaining sectoral and technological detail of the bottom–up optimization framework with endogenous aggregated energy demand. Our analysis is done for two important objectives of the US energy policy: GHG reduction and increased energy security. Our results suggest that the emission tax achieves results quite similar to the CES policy but very different results in the transportation sector. The CAFE standard and RFS are more expensive than a carbon tax for emission reductions. However, the CAFE standard and RFS are much more efficient at achieving crude oil import reductions. The GDP losses are 2.0% and 1.2% relative to the base case for the policy case and carbon tax. That difference may be perceived as being small given the increased energy security gained from the CAFE and RFS policy measures and the uncertainty inherent in this type of analysis. - Highlights: • Evaluates US impacts of three energy/climate policies and a carbon tax (CT) • Analysis done with bottom–up MARKAL model coupled with a macro model • Electricity clean energy standard very close to

  3. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  4. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  5. An Analysis of China's Fertilizer Policies: Impacts on the Industry, Food Security, and the Environment.

    Science.gov (United States)

    Li, Yuxuan; Zhang, Weifeng; Ma, Lin; Huang, Gaoqiang; Oenema, Oene; Zhang, Fusuo; Dou, Zhengxia

    2013-07-01

    China has made remarkable strides in recent decades to grow enough food to feed 20% of the world's population with only 9% of the world's arable land. Meanwhile, the nation is experiencing exacerbated air and water pollution problems. Agricultural growth and the pollution aggravation are closely linked with policies affecting fertilizer production and use. Essentially nonexistent in 1950, China's fertilizer industry is now a robust conglomerate producing fertilizers in amounts that not only meet domestic demand but also contribute to international trade. The industry's growth stemmed from a series of policy progressions, featuring (i) a total control system with state ownership and central planning (1949-1984), (ii) a dual system of central planning and market adjustment (1985-1997), (iii) a market-driven system with government-mandated price caps (1998-2009), and (iv) a complete market-oriented system (since 2009). In conjunction with the policy changes were massive subsidy programs totaling more than $18 billion in 2010. The support policies and subsidies helped grow the industry and safeguard an adequate supply of fertilizers at affordable costs to farmers, but the artificially low-priced fertilizers also contributed to a nationwide trend of fertilizer overuse, leading to nutrient pollution. China needs innovative policies and programs to address food security and sustainability challenges. In this study, we review and analyze policies and programs related to China's fertilizer production and use in a 60-yr span (1950-2010) and discuss its impact on the development of the industry, food security, and pressing environmental issues. Finally, our study analyzes long-term trends in fertilizer use in China and offers some key viewpoints to stimulate debates among all stakeholders. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  6. Review: Miller, Michelle Ann (2009, Rebellion and Reform in Indonesia – Jakarta’s Security and Autonomy Policies in Aceh

    Directory of Open Access Journals (Sweden)

    Antje Missbach

    2009-01-01

    Full Text Available Review of the monograph: Miller, Michelle Ann, Rebellion and Reform in Indonesia – Jakarta’s Security and Autonomy Policies in Aceh, London/ New York: Routledge, 2009, ISBN 13: 978-0-415-45467-4, 240 pages.

  7. Security, independence, and sustainability: Imprecise language and the manipulation of energy policy in the United States

    International Nuclear Information System (INIS)

    Littlefield, Scott R.

    2013-01-01

    This article examines the impact of imprecise terminology on the energy policymaking process in US, focusing on the manipulation of discourse by different political–economic interests seeking to sway popular opinion. Using the 2012 US Presidential Elections as a backdrop, the analysis highlights the cooption of the concepts “security,” “independence,” and “sustainability” in energy debates by different and often opposing interest groups. The article’s first section traces the malleability of energy terminology to the vagueness of the term “energy” itself and notes how qualifying words like security, independence, and sustainability have been selectively exploited to introduce further ambiguity to an already fungible concept. The second section notes that while energy is a critical and complex factor of macroeconomic production, its main public visibility comes via a few partially representative numbers, like gasoline prices. This mismatch of broad social importance and piecemeal public understanding enables organized interests to leverage vague terminology in support of particular policy ideas. The third section examines three policymaking tools (1) taxation, (2) regulation, and (3) technology promotion and compares these administrative instruments. Ultimately, the article concludes that loosely defined terminology inhibits energy policy discussion and stifles meaningful public debate over and action on energy issues. - Highlights: ► This article examines the impact of imprecise terminology on US energy policymaking. ► Energy security, energy independence, and sustainability are vaguely defined terms. ► Coordinated interests manipulate debate and exploit public ignorance. ► Taxes, regulation, and innovation incentives are used to apply policy prescriptions. ► Vague terminology stifles meaningful public debate over energy policy.

  8. Framing the frame

    Directory of Open Access Journals (Sweden)

    Todd McElroy

    2007-08-01

    Full Text Available We examined how the goal of a decision task influences the perceived positive, negative valence of the alternatives and thereby the likelihood and direction of framing effects. In Study 1 we manipulated the goal to increase, decrease or maintain the commodity in question and found that when the goal of the task was to increase the commodity, a framing effect consistent with those typically observed in the literature was found. When the goal was to decrease, a framing effect opposite to the typical findings was observed whereas when the goal was to maintain, no framing effect was found. When we examined the decisions of the entire population, we did not observe a framing effect. In Study 2, we provided participants with a similar decision task except in this situation the goal was ambiguous, allowing us to observe participants' self-imposed goals and how they influenced choice preferences. The findings from Study 2 demonstrated individual variability in imposed goal and provided a conceptual replication of Study 1. %need keywords

  9. A View of DANIDAs Policy Note on Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    -usikkerhed hæmmer udvikling’ understreges det, at hvis ‘underernæring’ og ‘sult’ forveksles, findes disse synergier ikke og sparsomme resourcer spildes. I Danida`s ’Policy Note on Food Security’ nævnes det, at ‘852 million are living in hunger’, altså sult. Det er imidlertid snarere kronisk underernæring end sult...... Greener World for All (NEC)’. Faktisk peger man på, at landbrugets og fødevaresektorens primære rolle er at brødføde befolkningen ved at øge tilgængeligheden og forbruget af sikre, miljørigtige madvarer, der er i overensstemmelse med ernæringsmæssige anbefalinger og til overkommelige priser. Derfor...

  10. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  11. Framing Indoor Tanning Warning Messages to Reduce Skin Cancer Risks Among Young Women: Implications for Research and Policy.

    Science.gov (United States)

    Mays, Darren; Tercyak, Kenneth P

    2015-08-01

    We investigated the impact of indoor tanning device warnings that communicate the risks associated with indoor tanning (i.e., loss framed) or the benefits of avoiding indoor tanning (i.e., gain framed). A convenience sample of non-Hispanic White women aged 18 to 30 years who tanned indoors at least once in the past year (n = 682) participated in a within-subjects experiment. Participants completed baseline measures and reported indoor tanning intentions and intentions to quit indoor tanning in response to 5 warning messages in random order. A text-only control warning was based on Food and Drug Administration-required warnings for indoor tanning devices. Experimental warnings included graphic content and were either gain or loss framed. In multivariable analyses, gain-framed warnings did not differ from the control warning on women's intentions to tan indoors, but they prompted stronger intentions to quit than the control message. Loss-framed warnings significantly reduced intentions to tan indoors and increased intentions to quit indoor tanning compared with control and gain-framed warnings. The public health impact of indoor tanning device warnings can be enhanced by incorporating graphic content and leveraging gain- and loss-framed messaging.

  12. ASEAN’S Strategic Approach Towards Security Relations with the U.S. and China: Hedging through a Common Foreign and Security Policy

    Science.gov (United States)

    2014-06-13

    Foreign and Security Policy EAS East Asia Summit EU European Union NATO North Atlantic Treaty Organization SCS South China Sea U.S. United States...operational vacuum. While ASEAN has rejected “hard” security institutions like the North Atlantic Treaty Organization to resolve inter-state... Bali Concord II) calls for the establishment of an ASEAN Community by the 74Sheldon W. Simon, “The ASEAN Regional Forum: Beyond the Talk Shop?,” NBR

  13. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    Science.gov (United States)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  14. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  15. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  16. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  17. Analysis of Russian Federation Foreign Policy in the Field of International Information Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2014-01-01

    Full Text Available Information and communication technologies (ICT play an essential role in the improvement of the quality of life, economic and socio-political of individual countries and humanity in general. However, ICT development is fraught with new challenges and threats to international and national security. Interstate rivalry in the information sphere generates conflicts, an extreme form of which is an information war. Since 1998, the Russian initiative supports the international cooperation on information security at the global and regional level as well as within the framework of the bilateral relations. The article analyzes the characteristics of the global information society, which has a decisive influence on the international security in the information age, as well as international cooperation in this field. The analysis of Russian foreign policy initiatives in the field of international information security is also presented. Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. It's difficult to trace the source of information attacks and its consequences can be devastating and cause retaliation, including the use of conventional weapons. In this situation Russian approach, advocating for the development of the rules of conduct of States and demilitarization of information space in order to ensure its safety, seems urgent and relevant with the international situation.

  18. Indirect effect of management support on users' compliance behaviour towards information security policies.

    Science.gov (United States)

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management

  19. The foreign policy and security options of Romania in the vision of Klaus Johannis

    Directory of Open Access Journals (Sweden)

    Radu-Ioan Opriș

    2015-03-01

    Full Text Available If a decade ago, Romania became a NATO member and it was enrolled in the accession process to the European Union, in 2014, the problem is radically different: Romania has a new status within NATO, it is part of the EU, it is in process of accession to the Schengen area and it has developed its strategic partnership with the United States of America. In this context, the aim of this paper is to bring into attention the vision of the new president of Romania, Klaus Iohannis, regarding the romanian foreign policy and security.

  20. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  1. The strategies to develop renewable energy application in the frame to secure energy need and electricity demand in Indonesia

    International Nuclear Information System (INIS)

    Suharta, Herliyani; Hoetman, A. R.; Sayigh, A. m.

    2006-01-01

    The paper describe the evaluation of conventional energy usage and electricity condition in Indonesia. Also there is discussion on 14 facts that will affect the security in providing the electricity and other house hold energy demand. Those covers a picture of the growth of energy demand, oil subsidy, limited and remaining natural resources, crude petroleum export and import projection, forecast of un-risk natural gas production, gas and coal for electric generation, declining of coal deposit. An effort and considerations to increase the use of renewable energy (RE) are also described. It covers a power plant selection to mach the RE resources to partly fulfill the electricity development planning, its electricity price and also the use of RE resources to fulfill the energy need in household.(Author)

  2. Secure energy supply in 2025: Indonesia's need for an energy policy strategy

    International Nuclear Information System (INIS)

    Mujiyanto, Sugeng; Tiess, Günter

    2013-01-01

    Indonesia as an emerging country with one of the fastest growing economies requires sufficient supply with energy for national development. Domestic energy production cannot satisfy the domestic demand, and the deficiency necessitates growing imports. The present energy mix consists of 96% from non-renewable sources, i.e. fossil fuels, less than 4% from renewables. Government Regulation 5/2006 aims at increasing the proportion of renewable sources to 17%. Two scenarios for the energy situation in 2025 have been elaborated and are discussed. An overall energy policy strategy and regulatory framework covering non-renewable and renewable resources are crucial for securing energy demand. - Highlights: • Indonesia aims at 17% renewable energy in energy mix 2025. • Population growth exceeds increase of energy production. • Investment incentives for new technologies, exploration and efficient production are necessary. • Clear and comprehensive energy policy strategy and regulatory framework are crucial

  3. Energy demand and supply, energy policies, and energy security in the Republic of Korea

    International Nuclear Information System (INIS)

    Kim, Hoseok; Shin, Eui-soon; Chung, Woo-jin

    2011-01-01

    The Republic of Korea (ROK) has enjoyed rapid economic growth and development over the last 30 years. Rapid increases in energy use-especially petroleum, natural gas, and electricity, and especially in the industrial and transport sectors-have fueled the ROK's economic growth, but with limited fossil fuel resources of its own, the result has been that the ROK is almost entirely dependent on energy imports. The article that follows summarizes the recent trends in the ROK energy sector, including trends in energy demand and supply, and trends in economic, demographic, and other activities that underlie trends in energy use. The ROK has been experiencing drastic changes in its energy system, mainly induced by industrial, supply security, and environmental concerns, and energy policies in the ROK have evolved over the years to address such challenges through measures such as privatization of energy-sector activities, emphases on enhancing energy security through development of energy efficiency, nuclear power, and renewable energy, and a related focus on reducing greenhouse gas emissions. The assembly of a model for evaluating energy futures in the ROK (ROK2010 LEAP) is described, and results of several policy-based scenarios focused on different levels of nuclear energy utilization are described, and their impacts on of energy supply and demand in the ROK through the year 2030 are explored, along with their implications for national energy security and long-term policy plans. Nuclear power continues to hold a crucial position in the ROK's energy policy, but aggressive expansion of nuclear power alone, even if possible given post-Fukushima global concerns, will not be sufficient to attain the ROK's 'green economy' and greenhouse gas emissions reduction goals. - Research highlights: →Rapid industrialization caused ROK energy use to increase over 10-fold during 1970-2000, with dramatic structural changes. → Growth in energy use after 2000 slowed to under 5%/yr, and

  4. Marcel de Haas, Russia’s Foreign Security Policy in the 21st Century – Putin, Medvedev and Beyond.

    Directory of Open Access Journals (Sweden)

    Isabelle Facon

    2011-03-01

    Full Text Available Specialists of Russian military and defense policy are familiar with Marcel De Haas’s prolific and in-depth publications on sometimes fairly technical issues. This book, with its broader outlook aimed at providing an overall understanding of Russian security policy in the 2000s, is the product of Dr. De Haas’s years as a Senior Research Fellow at the Clingendael Institute (The Hague. In many ways, it constitutes a follow-on to the author’s previous book– Russian Security Policy and Air Power...

  5. Beyond engagement in working with children in eight Nairobi slums to address safety, security, and housing: Digital tools for policy and community dialogue.

    Science.gov (United States)

    Mitchell, Claudia; Chege, Fatuma; Maina, Lucy; Rothman, Margot

    2016-01-01

    This article studies the ways in which researchers working in the area of health and social research and using participatory visual methods might extend the reach of participant-generated creations such as photos and drawings to engage community leaders and policy-makers. Framed as going 'beyond engagement', the article explores the idea of the production of researcher-led digital dialogue tools, focusing on one example, based on a series of visual arts-based workshops with children from eight slums in Nairobi addressing issues of safety, security, and well-being in relation to housing. The authors conclude that there is a need for researchers to embark upon the use of visual tools to expand the life and use of visual productions, and in particular to ensure meaningful participation of communities in social change.

  6. Compliance Framing - Framing Compliance

    OpenAIRE

    Lutz-Ulrich Haack; Martin C. Reimann

    2012-01-01

    Corporations have to install various organizational measures to comply with legal as well as internal guidelines systematically. Compliance management systems have the challenging task to make use of an internal compliance-marketing approach in order to ensure not only an adequate but also effective compliance-culture. Compliance-literature and findings of persuasive goal-framing-theory give opposite implications for establishing a rather values- versus rule-based compliance-culture respectiv...

  7. The Word Outside and the Pictures in Our Heads: Contingent Framing Effects of Labels on Health Policy Preferences by Political Ideology.

    Science.gov (United States)

    Roh, Sungjong; Niederdeppe, Jeff

    2016-09-01

    This study uses data from systematic Web image search results and two randomized survey experiments to analyze how frames commonly used in public debates about health issues, operationalized here as alternative word choices, influence public support for health policy reforms. In Study 1, analyses of Bing (N = 1,719), Google (N = 1,872), and Yahoo Images (N = 1,657) search results suggest that the images returned from the search query "sugar-sweetened beverage" are more likely to evoke health-related concepts than images returned from a search query about "soda." In contrast, "soda" search queries were more likely to incorporate brand-related concepts than "sugar-sweetened beverage" search queries. In Study 2, participants (N = 206) in a controlled Web experiment rated their support for policies to reduce consumption of these drinks. As expected, strong liberals had more support for policies designed to reduce the consumption of these drinks when the policies referenced "soda" compared to "sugar-sweetened beverage." To the contrary, items describing these drinks as "soda" produced lower policy support than items describing them as "sugar-sweetened beverage" among strong conservatives. In Study 3, participants (N = 1,000) in a national telephone survey experiment rated their support for a similar set of policies. Results conceptually replicated the previous Web-based experiment, such that strong liberals reported greater support for a penny-per-ounce taxation when labeled "soda" versus "sugar-sweetened beverages." In both Studies 2 and 3, more respondents referred to brand-related concepts in response to questions about "sugar-sweetened beverages" compared to "soda." We conclude with a discussion of theoretical and methodological implications for studying framing effects of labels.

  8. Newspaper representations of mental illness and the impact of the reporting of "events" on social policy: the "framing" of Isabel Schwarz and Jonathan Zito.

    Science.gov (United States)

    Paterson, B

    2006-06-01

    Concerns have been raised internationally about the role of the media in influencing public opinion and by implication, social policy on mental health issues. In particular, anxieties have been expressed that an "excessive" focus by the news media on violence in association with mental illness may reinforce pre-existing stereotypes and by escalating public concerns lead to the adoption of policies which place a high priority on the safety of the public. Such assertions are often contained in the numerous studies that record a seemingly disproportionate number of stories featuring violence in association with mental health. What is, however, almost invariably lacking is a developed theory of agency that explains how or why such depictions of mental illness might exert an influence on social policy. This paper critically examines the potential significance of the way in which responsibility for events is constructed for social policy by means of a discourse analysis, inspired by the genealogical work of Michel Foucault. It uses the device of "frames" originally developed by Goffman to explore the nature of newspaper coverage of two deaths to which causal responsibility for changes in the nature of English social policy in mental health has been attributed. Results presented suggest that attempts to assert a causal influence between media coverage and changes in the nature of social policy must engage with the question of agency.

  9. Policy Preferences about Managed Aquifer Recharge for Securing Sustainable Water Supply to Chennai City, India

    Directory of Open Access Journals (Sweden)

    Norbert Brunner

    2014-12-01

    Full Text Available The objective of this study is to bring out the policy changes with respect to managed aquifer recharge (focusing on infiltration ponds, which in the view of relevant stakeholders may ease the problem of groundwater depletion in the context of Chennai City; Tamil Nadu; India. Groundwater is needed for the drinking water security of Chennai and overexploitation has resulted in depletion and seawater intrusion. Current policies at the municipal; state and national level all support recharge of groundwater and rainwater harvesting to counter groundwater depletion. However, despite such favorable policies, the legal framework and the administrative praxis do not support systematic approaches towards managed aquifer recharge in the periphery of Chennai. The present study confirms this, considering the mandates of governmental key-actors and a survey of the preferences and motives of stakeholder representatives. There are about 25 stakeholder groups with interests in groundwater issues, but they lack a common vision. For example, conflicting interest of stakeholders may hinder implementation of certain types of managed aquifer recharge methods. To overcome this problem, most stakeholders support the idea to establish an authority in the state for licensing groundwater extraction and overseeing managed aquifer recharge.

  10. Food security, wheat production and policy in South Africa: Reflections on food sustainability and challenges for a market economy

    Directory of Open Access Journals (Sweden)

    Francois de Wet

    2018-01-01

    Full Text Available The traditional concept of security has broadened over the past decades. Food security in South Africa is an imperative for human and non-human survival. In the contemporary political economy, there is a real nexus between globalisation, exploitation, the state, scarcity of resources, the market, peoples’ need to feel secure, notions of state responsibility and food production. Political economy and human security in theoretical debates and face-to-face politics are intrinsically linked. The notion of a ‘secure community’ changed. Food security and the right to quality living became a social imperative. Understanding current agricultural economics requires the ability to link security and access to food for all. In this case study, wheat production in South Africa is addressed against the interface of the global and the local including South Africa’s transition to a democratic and constitutional state with a Bill of Rights. The current security approach represents a more comprehensive understanding of what security is meant to be and include, amongst others, housing security, medical security, service delivery and food security, as set out in the Millennium Development Goals and the subsequent Sustainable Development Goals. The issue of food security is addressed here with particular reference to wheat production, related current government policies and the market economy. The authors chose to limit their socio-economic focus to a specific sector of the agricultural market, namely wheat, rather than discuss food security in South Africa in general. Wheat was chosen as a unit of analysis because as a crop, wheat used in bread is one of the staples for the majority of South Africans and given the current negative economic developments, wheat as a staple is likely to remain integral, if not increasing its status of dependability

  11. Renewable energy perspectives in the frame of Turkey’s and the EU’s energy policies

    International Nuclear Information System (INIS)

    Şekercioğlu, Selma; Yılmaz, Mustafa

    2012-01-01

    Highlights: ► We examined the renewable energy policies of the EU and Turkey in their historical perspectives. ► In the EU there is a progress in renewable energy planning and about support mechanisms. ► In Turkey there is a need for more struggles about increasing the effectiveness of support mechanism. ► The sustainability principle of the EU energy policy has to be a guide for Turkey. - Abstract: Renewable energy as one of the current and substantial issue needs to be investigated in terms of political outlook. So the researches on renewable energy policies under the energy policies of different countries are necessary. The emergence of renewable energy policy was the 20th century but it gained momentum in 21st century. The realization of the polluting nature of the petroleum products, their negative environment effects and the assumptions about the future of non-renewable energy sources were the driving forces behind these politics. The European Union in these conditions tries to play pioneer role. Turkey on the other hand as a candidate country has to harmonize its policies with the Union’s. In this context, objective of this work is to examine the EU and Turkey’s renewable energy policies, make a comparison and as a sustainability of Turkish renewable energy policy construct a future projection in short, medium and long terms.

  12. Dutch women are liberated, migrant women are a problem: the evolution of policy frames on gender and migration

    NARCIS (Netherlands)

    Roggeband, C.M.; Verloo, M.

    2007-01-01

    Over the past decade, there has been a major shift in Dutch gender equality policy to an almost exclusive focus on migrant women. Simultaneously, the focus of 'minority policies' has shifted more and more towards gender relations. The appearance of migrant women at the top of the political agenda is

  13. Decoding the canada's foreing and security policy: tracking the strategic and ethicliberal approaches of a middle power's behavior

    OpenAIRE

    Rodríguez, Federmán

    2010-01-01

    The article attempts to explain the main paradox faced by Canada at formulating its foreign policy on international security. Explained in economic and political terms, this paradox consists in the contradiction between the Canadian ability to achieve its strategic goals, serving to its own national interest and its dependence on the United States. The first section outlines three representative examples to evaluate this paradox: the Canada’s position in North American security regime, the US...

  14. A Quantitative Study on Japanese Internet User's Awareness to Information Security: Necessity and Importance of Education and Policy

    OpenAIRE

    Toshihiko Takemura; Atsushi Umino

    2009-01-01

    In this paper, the authors examine whether or not there Institute for Information and Communications Policy shows are differences of Japanese Internet users awareness to information security based on individual attributes by using analysis of variance based on non-parametric method. As a result, generally speaking, it is found that Japanese Internet users' awareness to information security is different by individual attributes. Especially, the authors verify that the users who received the in...

  15. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  16. Frames and semi-frames

    International Nuclear Information System (INIS)

    Antoine, Jean-Pierre; Balazs, Peter

    2011-01-01

    Loosely speaking, a semi-frame is a generalized frame for which one of the frame bounds is absent. More precisely, given a total sequence in a Hilbert space, we speak of an upper (resp. lower) semi-frame if only the upper (resp. lower) frame bound is valid. Equivalently, for an upper semi-frame, the frame operator is bounded, but has an unbounded inverse, whereas a lower semi-frame has an unbounded frame operator, with a bounded inverse. We study mostly upper semi-frames, both in the continuous and discrete case, and give some remarks for the dual situation. In particular, we show that reconstruction is still possible in certain cases.

  17. QUING WHY paper: Framing gender intersections in the European Union: what implications for the quality of intersectionality in policies?

    DEFF Research Database (Denmark)

    Agustin, Lise Rolandsen; Lombardo, Emanuela

    are increasingly present but they are treated implicitly and from a separate perspective, and the inclusion of a wide range of inequalities often implies a degendering of the policy content. We assess the implications of the identified intersectionality trends for the quality of intersectionality in gender...... equality policies and we suggest the practice of an ‘intersectionality impact assessment’ as a way to improve the quality of EU policy-making. In this regard, we particularly focus on the interface between the civil society and the EU institutions....

  18. Common security and defence policy of the European Union and NATO

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2015-01-01

    Full Text Available The paper presents the structural analysis of cooperation collectivity NATO and the EU, who are the guarantors of foreign security policy in the region and in the world. In this regard, it outlines the hypothetical discourse in the EU's relations with NATO, the United States, that have marked the start of the independence of each individual battle in terms of security. Standalone approach, reflecting the credibility of each individual collectivity, ultimately lead to a reduction of investment potential. It starts by considering a presentation of possible options on the reflection of the relations between the EU and NATO that the 'fine-tuning' proclaims the need for integration and pragmatic and rational manner, accepted by the political and economic realities in achieving interests. In this paper, the intention of the data on CSDP and critical analysis of relations between the EU and NATO and the presentation of the most significant agreements between the two collectives, help bridge the gap in the division of political interest and commitment of its leading members.

  19. The impact of security and intelligence policy in the era of cyber crimes

    Directory of Open Access Journals (Sweden)

    MSc. Bahri Gashi

    2016-07-01

    Full Text Available Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions. The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in  public systems and private sector; creating barriers in distance entry networks and information systems, etc. Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes.

  20. Potential impacts of biofuel development on food security in Botswana: A contribution to energy policy

    International Nuclear Information System (INIS)

    Kgathi, Donald L.; Mfundisi, K.B.; Mmopelwa, G.; Mosepele, K.

    2012-01-01

    Biofuel development continues to be a critical development strategy in Africa because it promises to be an important part of the emerging bio-economy. However, there is a growing concern that the pattern of biofuel development is not always consistent with the principles of sustainable development. This paper assesses the potential of the impacts of biofuel development on food security in Botswana. Drawing on informal and semi-structured interviews, the paper concludes that there is potential for the development of biofuels in Botswana without adverse effects on food security due mainly to availability of idle land which accounted for 72% of agricultural land in the eastern part of the country in 2008. It is suggested that farmers could be incentivized to produce energy crops and more food from such land. Although it is hypothesized that the implementation of biofuel development programmes in other countries had an impact on local commodity prices during the period 2005–2008 in Botswana, it is argued that local biofuel production may not necessarily lead to a substantial increase in commodity food prices because land availability is not a major issue. The paper makes policy recommendations for sustainable biofuel development in Botswana. - Highlights: ► Biofuel development in Botswana can be pursued without harming food security. ► There is plenty idle land which could be used for biofuel and food production. ► Biofuel production will not lead to significant increases in food prices. ► There is need to define land for biofuels to avoid future scarcity of land for food production.

  1. [Food and nutrition security policy in Brazil: an analysis of resource allocation].

    Science.gov (United States)

    Custódio, Marta Battaglia; Yuba, Tânia Yuka; Cyrillo, Denise Cavallini

    2013-02-01

    To describe the progression and distribution of federal funds for programs and activities that fall within the scope of the guidelines of the Brazilian National Policy on Food and Nutrition Security (PNSAN) in the period from 2004 to 2010. This descriptive study used data from the Transparency Website maintained by the Brazilian Public Sector Internal Control Office. Search results were exported to Excel spreadsheets. To determine the resources allocated to food security initiatives, a database was set up containing all actions developed by the federal government between 2004 and 2010. This database was reviewed and the actions that were not related to PNSAN were discarded. The annual amounts obtained were corrected by the Consumer Price Index and updated for the year 2010. Since actions are part of specific programs, the sum of the resources allocated for all the actions of a program amounted to the resources invested in the program as a whole. The programs were then prioritized according to the amount of resources received in 2010. Of the 5 014 actions receiving federal funds in the study period, 814 were related to PNSAN (229 programs). There was growth in resources allocated for PNSAN programs, reaching US$ 15 billion in 2010 (an 82% increase over the previous year). The largest amount was invested in Bolsa Família, a cash transfer program. Ten programs received 90% of the funds, of which five were linked to food production processes. The amount of resources invested in the PNSAN and in actions and programs that promote food and nutrition security is increasing in Brazil.

  2. Framing ‘fracking’

    NARCIS (Netherlands)

    Williams, Laurence; Macnaghten, Philip; Davies, Richard; Curtis, Sarah

    2017-01-01

    The prospect of fracking in the United Kingdom has been accompanied by significant public unease. We outline how the policy debate is being framed by UK institutional actors, finding evidence of a dominant discourse in which the policy approach is defined through a deficit model of public

  3. Wind Development in the United States: A Comprehensive Policy Framework for Effective Wind Development as Framed by PJM Stakeholders

    Science.gov (United States)

    Stewart, Courtney A.

    Wind energy has been lauded as a resource for the United States to lessen its dependency on foreign fuels, reduce carbon output, and potentially create millions of jobs. Accordingly, wind energy is in the forefront of many government officials' minds throughout the United States; however, there are several barriers to wind farm development. This research reviews the social and political barriers to wind farm development and examines the successful renewable energy policies that have been used throughout Europe and the United States. This research consists of interviews with various stakeholders in the PJM region who compare and contrast renewable energy policies in Europe from those in the United States. The resulting information from the interviews creates a comprehensive policy framework that policy makers at all levels of government can utilize and refer to when discussing and drafting wind energy legislation.

  4. Policy in the Public Eye : Agenda-setting and framing dynamics of traditional and social media in relation to immigration and integration policies

    NARCIS (Netherlands)

    R. Dekker (Rianne)

    2016-01-01

    markdownabstractThe policy field of immigration and migrant integration is publicly and politically controversial. Consequently, issues related to immigration and migrant integration are regularly in the public eye of the media. This doctoral thesis analyzes how policy agendas in the domain of

  5. Analysis of rice policy based on presidential instruction on household food security: simultaneous equation model

    Science.gov (United States)

    Sembiring, S. A.

    2018-02-01

    The objective of this research is to analyze the impacts of rice policy on the household food security. The research used cross section data, were collected from 74 respondent as determined by purposive sampling in Sei Rejo villages, the Sub District of Sei Rampah, Serdang Bedagai District in the Province of North Sumatera. Rice policy model specification uses the simultaneous equations consisting of 6 structural equations and 6 identity equations which was estimated using Two Stages Least Squares (2SLS) method. The results show that the effectiveness of government purchase price of dried harvest paddy gave a positive impact on paddy planted area and lead to an increase paddy production and an increase of the rice production gave a positive impact on household rice availability and household rice surplus, and the increase of household rice surplus gave the quantity of Raskin decrease, whereas the increase of fertilizers gave a negative impact on paddy planted area and lead to decrease paddy production and to decrease in rice production was followed by an decrease in household rice availability and household rice surplus, and the decrease of household rice surplus gave the quantity of Raskin increase.

  6. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  7. Frames, agency and institutional change

    DEFF Research Database (Denmark)

    Rasmussen, Grane Mikael Gregaard; Jensen, Per Langaa; Gottlieb, Stefan Christoffer

    2017-01-01

    This study examines change and the sources influencing the formulation and diffusion of policies in construction. The change examined is the introduction of a benchmarking policy initiative in the Danish construction industry. Using institutional theory with emphasis on the concepts of frames...... and framings, we show how strategically motivated actors are able to frame policy problems in ways that disclose the mixture of motives, interests and institutional mechanisms at play in change processes. In doing so, we contribute to the literature on the role of agency in institutional change and the framing...

  8. The Ripple Effect of Virginia Tech: Assessing the Nationwide Impact on Campus Safety and Security Policy and Practice

    Science.gov (United States)

    Rasmussen, Chris; Johnson, Gina

    2008-01-01

    This report is the result of a nationwide survey conducted in March 2008 of student life officers and campus safety directors to assess the impact of the April 2007 shootings at Virginia Tech on campus safety and security policy and practice. Discussion areas include: (1) Student Privacy vs. Need-to-Know; (2) Prevention, Mitigation and Recovery;…

  9. Towards Food Security and Livelihoods of Low-income Women in central Uganda: Policy Implications based on action research

    DEFF Research Database (Denmark)

    Nambuanyi, Lekunze Ransom; Midtvåge, Runa; Hiranandani, Vanmala Sunder

    2015-01-01

    Uganda is burdened with rising poverty, malnutrition and food insecurity. While most Ugandans depend on agriculture for their livelihoods, it is important to recognize that access to and control over resources by women and climate factors are central to the question of food security in Uganda....... However, a review of the literature demonstrates that policy options have poorly understood these interlinkages or tended to undermine them, especially the extent that these policies and programs put the necessary attention on the role of women farmers in food security. This paper presents part of a work...... in progress of a research project that seeks to investigate the interrelated effects of agricultural practices, access to and control over resources, as well as climate change on women’s food security in the urban and peri-urban areas of central Uganda. The paper not only considers how to turn...

  10. Quantum frames

    Science.gov (United States)

    Brown, Matthew J.

    2014-02-01

    The framework of quantum frames can help unravel some of the interpretive difficulties i the foundation of quantum mechanics. In this paper, I begin by tracing the origins of this concept in Bohr's discussion of quantum theory and his theory of complementarity. Engaging with various interpreters and followers of Bohr, I argue that the correct account of quantum frames must be extended beyond literal space-time reference frames to frames defined by relations between a quantum system and the exosystem or external physical frame, of which measurement contexts are a particularly important example. This approach provides superior solutions to key EPR-type measurement and locality paradoxes.

  11. Media Framing

    DEFF Research Database (Denmark)

    Pedersen, Rasmus T.

    2017-01-01

    The concept of media framing refers to the way in which the news media organize and provide meaning to a news story by emphasizing some parts of reality and disregarding other parts. These patterns of emphasis and exclusion in news coverage create frames that can have considerable effects on news...... consumers’ perceptions and attitudes regarding the given issue or event. This entry briefly elaborates on the concept of media framing, presents key types of media frames, and introduces the research on media framing effects....

  12. Policy Needs for Social Security in the Process of Citizenization of the Peri-urban Farmers:A Case Study of Hefei City

    Institute of Scientific and Technical Information of China (English)

    TAN Jiang-lin; CHEN Rui; NI Wen-cong

    2012-01-01

    We conduct a survey of transformational towns and villages in High-tech Development District, Yaohai District and Shushan District, Hefei City. Using data, we analyze the "sideline effect" and inherent contradiction of transformational cities, research the policy needs for social security and its trend in the citizenization process of the peri-urban farmers. On this basis, we construct the social security policy system that can adapt to the accelerated process of urbanization. Finally, we put forth the following recommendations for the social security policy in the citizenization process of the peri-urban farmers: distinguishing different groups’ policy needs for social security; attaching importance to people’s dynamic policy needs for social security in urbanization; focusing on the adaptability of social security policy transformation in urbanization; attaching importance to the social psychosocial environment of social security policy transformation in urbanization; achieving the trinity of non-farm conversion, urbanization and citizenization in the process of urbanization; strengthening the government’s dominant position in the building of social security policy system.

  13. A survey of energy policy priorities in the United States: Energy supply security, economics, and the environment

    International Nuclear Information System (INIS)

    Manley, Dawn K.; Hines, Valerie A.; Jordan, Matthew W.; Stoltz, Ronald E.

    2013-01-01

    Security, environment, and economic concerns are commonly identified as three major objectives of energy policy. State and federal governments have set aggressive targets for carbon emissions reductions and for alternative fuel use and increased vehicle efficiency to reduce petroleum consumption. Moreover, jobs creation and GDP growth are often cited as key drivers for energy policies. Previous studies on energy policy decision-making have examined the process for developing and evaluating options using multi-criteria decision analysis tools. In addition, energy opinion polls have either elicited preferences between two goals or whether the public supports a specific policy action. In this article, we report results from a survey of 884 members of professional membership organizations on how the U.S. should prioritize energy policy across the goals of energy supply security, environment and climate, and economics and job creation. The majority favor policymaking that is balanced across all three. Security and economic concerns increase with age for male respondents, whereas environment is the highest priority for females regardless of age. Unlike previous surveys that target the general public and focus on a particular objective or technology, these results provide an example of eliciting a portfolio allocation across multiple energy policy goals from targeted constituents. - Highlights: • We surveyed 884 members of professional membership organizations on how the U.S. should prioritize energy policy. • The paper addresses direct elicitation of energy policy goal portfolio allocation for a large set of energy stakeholders. • The majority of respondents favor policymaking balanced across multiple goals. • We observed differences in priorities based on age and gender. • Respondents expressed a tension in allocating across goals that are interrelated

  14. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    Science.gov (United States)

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  15. Food Supply Security and Import Substitution as the Key Strategic Objectives of the Modern Agricultural Policy

    Directory of Open Access Journals (Sweden)

    Anatoly Ivanovich Altukhov

    2015-09-01

    Full Text Available A crucially new social- and economic situation has shaped up by now in the rural areas and agricultural sphere; in its many instances such situation does not fit in the national agricultural policy in effect called upon to be a long-term instrument for economic adjustment of the agro-food market and state support of the agricultural sphere, most significantly, its foundation — the farming sector. Ensuring of food supply security by import substitution in the age of the national farm product markets globalization is possible in the macro-economic conditions promoting the development of the agricultural sector. The main reason that retards this sector development is inequitable cross-sector exchange at sacrifice of the agricultural industry. The article sets forward and approbates the author’s method of simple assessment procedure of how the price cross-sector relations and state financial support (in the form of subsidies of the agricultural enterprises influence their profitability generation. Further to the assessment, the following conclusions have been made: — in view of the tangible contribution of the agricultural sector to the country economy, this sector is self-reliant for its own development, i.e. the state is reasonably in a position to increase expenses for eliminating negative consequences of inequitable crosssector exchange; — the amount of expenses for state financial support is supposed to enable the agricultural commodity producers to generate profitability to the level that can stimulate the farm workers’ labour efficiency and build up a system of affordable credit facilities for the objects of techno-engineering modernization necessary to produce competitive products. — the issue of improving the competitiveness of agricultural production should be addressed in the first place at the federal level. Among the essential factors to increase the competitiveness of specific types of domestic food products and

  16. Among cosmopolitan values and strategic interests: liberal and realist discourses of canada’s international security policy during post- cold war

    OpenAIRE

    Rodríguez M., Federmán

    2014-01-01

    The purpose of the article is to explain the liberal and realist discourses that underpinned the Canadian International Security Policy (CISP) during the post-Cold War. In particular, it offers evidence to show that Canadian governments inevitably debate between cosmopolitan values and strategic interests in formulating their respective policies of international security. After considering how liberal and realist orientations of this policy have been studied in the literature on CISP, it expl...

  17. Framing scenarios of binational water policy with a tool to visualize, quantify and valuate changes in ecosystem services

    Science.gov (United States)

    Norman, Laura M.; Villarreal, Miguel L.; Niraula, Rewati; Meixner, Thomas; Frisvold, George; Labiosa, William

    2013-01-01

    In the Santa Cruz Watershed, located on the Arizona-Sonora portion of the U.S.-Mexico border, an international wastewater treatment plant treats wastewater from cities on both sides of the border, before discharging it into the river in Arizona. These artificial flows often subsidize important perennial surface water ecosystems in the region. An explicit understanding of the benefits of maintaining instream flow for present and future generations requires the ability to assess and understand the important trade-offs implicit in water-resource management decisions. In this paper, we outline an approach for modeling and visualizing impacts of management decisions in terms of rare terrestrial and aquatic wildlife, vegetation, surface water, groundwater recharge, real-estate values and socio-environmental vulnerable communities. We identify and quantify ecosystem services and model the potential reduction in effluent discharge to the U.S. that is under scrutiny by binational water policy makers and of concern to stakeholders. Results of service provisioning are presented, and implications for policy makers and resource managers are discussed. This paper presents a robust ecosystem services assessment of multiple scenarios of watershed management as a means to discern eco-hydrological responses and consider their potential values for future generations living in the borderlands.

  18. Carbon capture and storage: Frames and blind spots

    International Nuclear Information System (INIS)

    Martínez Arranz, Alfonso

    2015-01-01

    The European Union (EU) carbon capture and storage (CCS) demonstration programme stands out for the speed with which financial support was agreed to, the size of this support, and its unusual format. This paper sets out to examine CCS policymaking in the EU by analysing the way this technology was framed. It draws up a simple model of technology framing with two variants. The first one describes the creation of “mainstream frames” of technologies in policymaking. The second one explains the effects of a “hegemonic frame”, namely the weakening of evaluation criteria and the increased salience of “blind spots”. On this basis, this paper explains the global mainstreaming of a CCS frame and its transformation into a hegemonic frame in the EU. Finally, the paper reviews the blind spots in this hegemonic frame and their impact on EU policy. -- Highlights: •Absent much public debate, experts alone have framed CCS; yet serious biases exist. •Powerful interests in the EU took advantage of a positive global framing of CCS. •A hegemonic framing of CCS in the EU caused it to bypass rigorous evaluation. •Claims regarding energy security and other benefits of CCS in the EU are dubious

  19. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  20. Effects of Alternative Framing on the Publics Perceived Importance of Environmental Conservation

    Directory of Open Access Journals (Sweden)

    Amanda E Sorensen

    2015-05-01

    Full Text Available Effective communication of science to the general public is important for numerous reasons, including support for policy, funding, informed public decision making, among others. Prior research has found that scientists participating in public policy and public communication must frame their communication efforts in order to connect with audiences. A frame is the mechanism that individuals use to understand and interpret the world around them. Framing can encourage specific interpretations and reference points for a particular issue or event; especially when meaning is negotiated between the media and public audiences. In this study, we looked at the effect of framing within an environmental conservation context. To do this we had survey respondents rank common issues, among them being environmental conservation, from most important to least important for the government to address. We framed environmental conservation using three synonymous terms (environmental security, ecosystem services, and environmental quality to assess whether there was an effect on rankings dependent on how we framed environmental conservation. We also investigated the effect of individuals’ personality characteristics (identity frame on those environmental conservation rankings. We found that individuals who self-identified as environmentalist were positively associated with ranking highly (most important environmental conservation when it was framed as either environmental quality or ecosystem services, but not when it was framed as environmental security. Conversely, those individuals who did not rank themselves highly as self-identified environmentalists were positively associated with environmental conservation when it was framed as environmental security. This research suggests that framing audience specific messages can engender audience support in hot-button issues such as environmental conservation and climate change.

  1. Framing theory

    NARCIS (Netherlands)

    de Vreese, C.H.; Lecheler, S.; Mazzoleni, G.; Barnhurst, K.G.; Ikeda, K.; Maia, R.C.M.; Wessler, H.

    2016-01-01

    Political issues can be viewed from different perspectives and they can be defined differently in the news media by emphasizing some aspects and leaving others aside. This is at the core of news framing theory. Framing originates within sociology and psychology and has become one of the most used

  2. On Framing

    DEFF Research Database (Denmark)

    Peder Pedersen, Claus

    2018-01-01

    On framing as artistic and conceptual tool in the works of Claudia Carbone. Contribution to exhibition at the Aarhus School of Architecture.......On framing as artistic and conceptual tool in the works of Claudia Carbone. Contribution to exhibition at the Aarhus School of Architecture....

  3. Framing politics

    NARCIS (Netherlands)

    Lecheler, S.K.

    2010-01-01

    This dissertation supplies a number of research findings that add to a theory of news framing effects, and also to the understanding of the role media effects play in political communication. We show that researchers must think more about what actually constitutes a framing effect, and that a

  4. Framing obesity in UK policy from the Blair years, 1997-2015: the persistence of individualistic approaches despite overwhelming evidence of societal and economic factors, and the need for collective responsibility.

    Science.gov (United States)

    Ulijaszek, Stanley J; McLennan, Amy K

    2016-05-01

    Since 1997, and despite several political changes, obesity policy in the UK has overwhelmingly framed obesity as a problem of individual responsibility. Reports, policies and interventions have emphasized that it is the responsibility of individual consumers to make personal changes to reduce obesity. The Foresight Report 'Tackling Obesities: Future Choices' (2007) attempted to reframe obesity as a complex problem that required multiple sites of intervention well beyond the range of personal responsibility. This framing formed the basis for policy and coincided with increasing acknowledgement of the complex nature of obesity in obesity research. Yet policy and interventions developed following Foresight, such as the Change4Life social marketing campaign, targeted individual consumer behaviour. With the Conservative-Liberal Democrat government of 2011, intervention shifted to corporate and individual responsibility, making corporations voluntarily responsible for motivating individual consumers to change. This article examines shifts in the framing of obesity from a problem of individual responsibility, towards collective responsibility, and back to the individual in UK government reports, policies and interventions between 1997 and 2015. We show that UK obesity policies reflect the landscape of policymakers, advisors, political pressures and values, as much as, if not more than, the landscape of evidence. The view that the individual should be the central site for obesity prevention and intervention has remained central to the political framing of population-level obesity, despite strong evidence contrary to this. Power dynamics in obesity governance processes have remained unchallenged by the UK government, and individualistic framing of obesity policy continues to offer the path of least resistance. © 2016 World Obesity.

  5. U.S. Army War College Guide to National Security Issues. Volume 2. National Security Policy and Strategy

    Science.gov (United States)

    2012-06-01

    establishment of a plethora of federal agencies empowered to make policy in their realms in order to lift the country out of the Depression . Justice Robert H... depressing regularity. The fact of moral failure, rather than proving the falsity of morality, points instead to the source of our disappointment in such... Centennial Campaign: The Sioux War of 1876, Norman, OK: University of Oklahoma Press, 1976, p. 23. 24. Gray, p. 89. 25. Utley, p. 253. 26. Ibid., p

  6. The immigrant and the misunderstanding of emergency: The influence of frame security in the practical experimentation of an innovative one of cultural mediation on road / L’immigrato e il malintenso della sicurezza: L’influenza del frame sicuritario nella sperimentazione di una practica innovative di mediazione culturale su strada

    Directory of Open Access Journals (Sweden)

    Vincenzo Romania

    2009-10-01

    , mainly, oPadova (Italy in 2007. I focus, mainly, oPadova (Italy in 2007. I focus, mainly, on the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings

  7. Testimony before the US-China Economic Security Review Commission: China's Agriculture Policy and US Access to China's Market

    OpenAIRE

    Dermot J. Hayes

    2013-01-01

    Testimony before the US-China Economic and Security Review Commission on April 25, 2013, by Dermot Hayes, professor of Economics and Finance, Iowa State University. Testimony covers impacts on food demand from China's rising incomes and urbanization; the viability of China's attempt to remain self-sufficient in meat and key staple crop production under inherent supply constraints, and the possible technological- and policy-based measures they may pursue in regard of such constraints; and, the...

  8. Japanese Prime Minister Shinzo Abe’s Two Administrations: Successes and Failures of Domestic and Security Policies

    Science.gov (United States)

    2016-12-01

    parties as well. It seemed also difficult to make coalitions among the opposition parties, with their diverse political identities , to win a district...explanations for Abe’s political success in his second administration. Abe’s pragmatism in statecraft mainly originated from his own political experiences...and was crucial for accumulating his political capital and realizing security policy. At the domestic level, political influence from former

  9. U.S.-China Economic and Security Review Commission: Emerging Factor in Western Pacific Strategic Policy Analysis

    OpenAIRE

    Chapman, Bert

    2017-01-01

    Those studying and analyzing Western Pacific strategic trends and develop- ments have access to multiple unclassified analyses of security trends in this region covering these waters and adjacent countries. These information resources are produced by military and government agencies from multiple countries, multinational public policy research institutions, popular and scholarly journals, and Internet resources featuring text, data, webcasts, and imagery. One of these resources is the U.S.–Ch...

  10. Framing Gangnam Style

    Directory of Open Access Journals (Sweden)

    Hyunsun Catherine Yoon

    2017-08-01

    Full Text Available This paper examines the way in which news about Gangnam Style was framed in the Korean press. First released on 15th July 2012, it became the first video to pass two billion views on YouTube. 400 news articles between July 2012 and March 2013 from two South Korean newspapers - Chosun Ilbo and Hankyoreh were analyzed using the frame analysis method in five categories: industry/economy, globalization, cultural interest, criticism, and competition. The right-left opinion cleavage is important because news frames interact with official discourses, audience frames and prior knowledge which consequently mediate effects on public opinion, policy debates, social movement and individual interpretations. Whilst the existing literature on Gangnam Style took rather holistic approach, this study aimed to fill the lacuna, considering this phenomenon as a dynamic process, by segmenting different stages - recognition, spread, peak and continuation. Both newspapers acknowledged Gangnam Style was an epochal event but their perspectives and news frames were different; globalization frame was most frequently used in Chosun Ilbo whereas cultural interest frame was most often used in Hankyoreh. Although more critical approaches were found in Hankyoreh, reflecting the right-left opinion cleavage, both papers lacked in critical appraisal and analysis of Gangnam Style’s reception in a broader context of the new Korean Wave.

  11. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  12. REDD policy impacts on the agri-food sector and food security

    NARCIS (Netherlands)

    Tabeau, A.A.; Meijl, van J.C.M.; Overmars, K.P.; Stehfest, Elke

    2015-01-01

    The REDD policy which preserves, enables substantial emission reductions. Since agricultural production and area expansion is a primary driver of tropical deforestation, REDD policies might limit the expansion possibilities of agricultural land use and therefore influence competitiveness,

  13. Asylum migration and the construction of the European Common Foreign and Security Policy: evidence from the Greek case

    Directory of Open Access Journals (Sweden)

    Silvia Lucía Forero Castañeda

    2015-12-01

    Full Text Available This article examines how the recent evolution of asylum migration has affected the construction of the European Common Foreign and Security Policy (EU-CFSP, taking the Greek case during the 2001-2012 period as a starting point. With this in mind, the normative progress of the EU-CFSP facing the reception of asylum seekers in Greece is analyzed, under the scope of what Barry Buzan and Ole Waever would call Securitization Process. Both legal and political frameworks on asylum migration in Greece and in the European Union are approached, in the context of the evolution of the EU-CFSP in three main areas: Neighborhood Policy, Development and Cooperation Policy, and Human Rights Protection. The conclusión points toward the partial influence of asylum migration in the configuration of the UE-CFSP during the studied period.

  14. Competitive Framing

    OpenAIRE

    Ran Spiegler

    2014-01-01

    I present a simple framework for modeling two-firm market competition when consumer choice is "frame-dependent", and firms use costless "marketing messages" to influence the consumer's frame. This framework embeds several recent models in the "behavioral industrial organization" literature. I identify a property that consumer choice may satisfy, which extends the concept of Weighted Regularity due to Piccione and Spiegler (2012), and provide a characterization of Nash equilibria under this pr...

  15. The Effects of National Policy on Refugee Welfare and Related Security Issues: A Comparative Case Study of Lebanon, Egypt and Syria

    National Research Council Canada - National Science Library

    Cleary, Jessica E

    2008-01-01

    .... However, it is the effects of state policy that actually shape the living conditions and the opportunities available for refugees, and in turn influence the security repercussions they can set in motion...

  16. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ... as a core element of the Common Security and Defense Policy of the EU, Based on the interpretation of Clausewitz's theory of war and strategy in Britain, France, and Germany, main commonalities...

  17. The mass balance of production and consumption: Supporting policy-makers for aquatic food security

    Science.gov (United States)

    Lopes, A. S.; Ferreira, J. G.; Vale, C.; Johansen, J.

    2017-03-01

    the world, well above both Malaysia and South Korea (each with 58 kg ind-1 y-1). The corrected data show that Portugal had the highest consumption rate in the world until the mid-1970's, when it was overtaken by Iceland for reasons discussed herein. The lack of detailed per-species consumption data, as well as the grouping of species by commodities, hinders a more detailed seafood consumption analysis, required by policy makers and stakeholders to effectively develop management measures to reduce illegal fishing or bycatch, and to correctly formulate strategic options for development of aquaculture and fisheries, necessary for ensuring food security over the next decades.

  18. News media representations of a common EU foreign and security policy: a cross-national content analysis of CFSP coverage in national quality newspapers

    NARCIS (Netherlands)

    Kandyla, A.-A.; de Vreese, C.

    2011-01-01

    This study is a cross-national comparative content analysis of the broadsheet press coverage of EU Common Foreign and Security issues (n=1453) focusing on the presence of indicators of a European Public Sphere. Specifically, we investigated the visibility of Common Foreign and Security Policy (CFSP)

  19. Framing financial culture

    DEFF Research Database (Denmark)

    Just, Sine Nørholm; Mouton, Nicolaas T.O.

    2014-01-01

    between competing frames leads to the conclusion that this political “blame game” is related to struggles over how to define the scandal, how to conceptualize its causes, and policy recommendations. Banks may have lost the battle of “Liborgate,” but the war over the meaning of financial culture is far...... from over. Originality/value – The paper is theoretically and methodologically original in its combination of the theories of framing and stasis, and it provides analytical insights into how sense is made of financial culture in the wake of the financial crisis....

  20. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    Science.gov (United States)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only

  1. Nutrition and food security policy in the Islamic Republic of Iran: situation analysis and roadmap towards 2021.

    Science.gov (United States)

    Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo

    2018-05-03

    All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).

  2. Escape and evade control policies for ensuring the physical security of nonholonomic, ground-based, unattended mobile sensor nodes

    Science.gov (United States)

    Mascarenas, David; Stull, Christopher; Farrar, Charles

    2011-06-01

    In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.

  3. Weak and Failing States: Evolving Security Threats and U.S. Policy

    National Research Council Canada - National Science Library

    Wyler, Liana S

    2008-01-01

    .... national security goal since the end of the Cold War. Numerous U.S. government documents point to several threats emanating from states that are variously described as weak, fragile, vulnerable, failing, precarious, failed, in crisis, or collapsed...

  4. Cybersecurity via Intermediaries : Analyzing Security Measurements to Understand Intermediary Incentives and Inform Public Policy

    NARCIS (Netherlands)

    Asghari, H.

    2016-01-01

    Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure

  5. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... officials say they are not sure the effort is "winning." These assessments emphasize a growing sense of insecurity in areas around Kabul previously considered secure, and increased numbers of civilian and military deaths...

  6. Striking First: Preemptive and Preventive Attack in U.S. National Security Policy

    National Research Council Canada - National Science Library

    Mueller, Karl P; Castillo, Jasen J; Morgan, Forrest E; Pegahi, Negeen; Rosen, Brian

    2006-01-01

    .... U.S. leaders recast the national security strategy to place greater emphasis on the threats posed by violent nonstate actors and by states from which they might acquire nuclear, biological, or chemical...

  7. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... Both the official U.S. as well as outside assessments increasingly point to Pakistan's failure to prevent Taliban and other militant infiltration into Afghanistan as a cause of the security deterioration...

  8. What is the place of the energy supply security and energy independence in the energy policy?

    International Nuclear Information System (INIS)

    2001-12-01

    Since the petroleum crisis and the electric power cuts of the 1999 storm, the energy security interest is growing. The author recall the structural risks of the energy systems and the vulnerability of the occidental economies to the supply disruptions. They propose then a long term cooperation between producer and consumer countries, a development of operational tools to face the crisis and a supply security inside the europe. (A.L.B.)

  9. Audience reactions to peace journalism: How supporters and critics of the Israeli policy process escalation and de-escalation oriented media frames

    Directory of Open Access Journals (Sweden)

    Stephanie Thiel

    2014-04-01

    Full Text Available This paper reports on an experiment that uses the Israeli-Palestinian conflict as a natural laboratory for studying how recipients make sense of escalation vs. de-escalation oriented news articles. The results of the study indicate that media frames and individual frames have both a direct effect and complex interaction effects on participants’ text understanding. Particularly the effect of media war frames diminishes if they are incongruent with participants’ individual frames, and the propaganda function of reports about violence and human casualties can be neutralized if framed according to a peace frame. If participants had a priori positioned themselves in favor of the perpetrator, they may produce reactance, however.

  10. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Science.gov (United States)

    2012-12-26

    ..., Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records... made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory..., Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on January 30, 2013, 10:00 a...

  11. Political and Institutional Drivers of Social Security Policy in South Africa

    DEFF Research Database (Denmark)

    S. Ulriksen, Marianne; Plagerson, Sophie

    studies with varying policy outcomes: 1) the social cash transfer system, which is well established; and 2) the National Health Insurance (NHI) scheme, a recent policy, which has suffered several delays. Building on the power resource and historical institutionalism approaches, we explore how different...

  12. Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach

    Science.gov (United States)

    2011-08-01

    enviromental factors, then it is very likely that the corresponding device has been compromised and controlled by an adversary. In this case, the report... Enviromental Factors in Faulty Case (b) Result of Policy Execution in Faulty Case Figure 7: Policy Execution in Faulty Case (a) Enviromental Factors

  13. Energy policy for Europe. Ensuring secure and low-carbon energy in the EU's internal market. Interim report

    International Nuclear Information System (INIS)

    Egenhofer, C.; Hammes, J.J.; Pedersen, K.

    2006-12-01

    In early March 2006, the European Commission re-launched the discussion on an Energy Policy for Europe with the 2006 publication of its Green Paper 'Secure, Competitive and Sustainable Energy for Europe'. This manifests the EU's will to broaden its reflection on its future energy systems, taking into account increasing market liberalisation and globalisation, environmental pressures, technological challenges and the growing import dependency from politically unstable regions. Other major contributions to this debate include the climate change communication 'Winning the battle against climate change' (published in 2005), the Green Paper on Energy Efficiency (2005), the Energy Efficiency Action Plan (2006), the ongoing works of the High Level Group on Competitiveness, Energy and the Environment (2006) and the enquiry into the energy sector by DG Competition of the European Commission in 2006. The Spring European Council in March 2006 welcomed the Energy Policy Green Paper and committed itself adopting a prioritised Action Plan at its spring session in 2007, to be prepared by the European Commission and the Energy Council. Early next year, the European Commission will table both the EU Strategic Energy Review, accompanied by a number of sectoral policies and a Green Paper on future climate change policy for the period post-2012 when the Kyoto Protocol expires. Both the EU Strategic Energy Review and the post-2012 Green Paper will outline the European Union (EU) 'energy and climate change vision' and propose a roadmap towards achieving EU energy and climate change objectives, namely, how to ensure the competitiveness of European industries while at the same time combating climate change and ensuring security of energy supply. To contribute to this debate, the CEPS multi-stakeholder Task Force on 'energy policy for Europe' has presented this Interim Report, which attempts to develop the key elements for an EU energy policy framework. Although this report will focus

  14. Policy and strategy of the Cuban Regulatory Organization for the establishment of the legal and regulation frame; Politica y estrategia del Organo Regulador Cubano para el establecimiento del marco legal y reglamentario

    Energy Technology Data Exchange (ETDEWEB)

    Arnau F, A.; Alonso G, I.; Sarabia M, I. [Centro Nacional de Seguridad Nuclear (Cuba)

    2006-07-01

    The National Center of Nuclear Security, Cuban entity authorized to exercise the regulation functions and control of the security of the use of the nuclear energy and the accounting and control of the nuclear materials, has among its functions, to elaborate and to propose for its approval to the corresponding instances, the juridical, technical dispositions and of procedure in its competition sphere, what demands that in this sense clear guidelines exist to carry out this social mission. The fact of assuming this function demands the necessity of a Politics for the establishment of the legal and regulation frame that expresses in a coherent way the general lines on those that it behaves the elaboration of the standards that govern this activity, to reach the end in an efficient and effective way and consequently the adoption of a Strategy that frames the necessary actions that assure the one execution and development of the politics and the pursuit of the precise rules for an optimal result. The Politics for the establishment of the legal and regulation frame of the National Center of Nuclear Security is based on a group of general principles that mark the guidelines so that this activity is chord to the national juridical system, to the good ones international practices and the recommendations of the International Atomic Energy Agency appropriated to the national experience and the daily reality, being this a transparent and reconciled process in such a way that the addressee of these standards can contribute their recommendations to the ends of achieving an effective applicability of the legal and regulation frame that governs this activity in the country. The development and pursuit of these principles is sustained in a group of actions to the help of the strategy for the establishment of the legal and regulation frame, embracing the actions so much during the process of elaboration of the legal frame, its systematic revision, the publication and distribution

  15. Framing Light Rail Projects

    DEFF Research Database (Denmark)

    Olesen, Mette

    2014-01-01

    In Europe, there has been a strong political will to implement light rail. This article contributes to the knowledge concerning policies around light rail by analysing how local actors frame light rail projects and which rationalities and arguments are present in this decision-making process....... The article draws on the socio-technical approach to mobilities studies in order to reassemble the decision-making process in three European cases: Bergen, Angers, and Bern. This article provides insights into the political, discursive and material production of light rail mobilities in a European context....... It identifies the planning rationales behind the systems and the policies that have been supportive of this light rail vision. Finally, the article identifies the practical challenges and potentials that have been connected to the different local frames of light rail mobility which can be used in future...

  16. Exploring Resource Security Policy and Green Science and Technology in Asia

    Science.gov (United States)

    2014-04-01

    consumption patterns, diets and resource use of its population that will only increase 1...Indonesia, Vietnam, Thailand and Malaysia - have started to put, if not ramped up existing, green policies in place. 9 In India, the government’s

  17. Nuclear Weapons in U.S. National Security Policy: Past, Present, and Prospects

    National Research Council Canada - National Science Library

    Woolf, Amy F

    2008-01-01

    .... During the Cold War, the United States often modified, or tailored, its nuclear targeting doctrine, its nuclear weapons employment policy, and its nuclear force structure to enhance or maintain...

  18. Party Politics and Greek Security Policy from 1974 to 1984: Change and Continuity.

    Science.gov (United States)

    1984-12-01

    it was stated that: The challenge for American policy aakers who want to ensure the tuture of the alliance is to adopt policies which respond to...parliament building. Most of the personal - ities represented the perpetuation of the Greek military regime which had controlled Greece since the 1967 Greek...brought a degree of prosperity to Greece. 12 His resignation in 1963 as a result of disagreement with the King marked him as a person of independent

  19. A Security plan for LMOs - concentrated on environmental policy of Biosafety Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Park, Yong Ha [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    Biotechnology industry in Korea is raised by the national support. Also, Korea imports 70% of entire agricultural products. Considering the present situation in Korea, signing a Biosafety Protocol is necessary to prevent harm by LMOs and to protect associated biotechnological industry. Therefore, the problems on signing Biosafety Protocol were analyzed and the environmental policy to be pursued was proposed. This study result will be a cornerstone to prepare a definite environmental policy by government. 54 refs., 7 figs., 27 tabs.

  20. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Microphysical particles such as glass and metal can be hazardous and cause serious injury to consumers. Pathogenic bacteria, viruses and toxins produced by microorganisms are all possible contaminants of food and impact food safety. Like food security, food safety is also effected by poverty and climate change. Hence Foo

  1. Swiss Strategic Communication in the Defense Sector and Its Implications for Swiss Security Policy

    Science.gov (United States)

    2017-12-01

    rejected because of its projected higher costs compared to buying the fighter jets.392 Through a public -private partnership, the needed Gripens would...necessary military strategies, overall efficiency and coherence can be augmented to the benefit of national security, the public finances, and the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SWISS STRATEGIC

  2. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    Science.gov (United States)

    2010-01-01

    Reconnaissance and Observation ( MUSIS ), enhancement of the use of the EU Satellite-Center (EUSC), enhancement of Unmanned Armed Vehicles (UAV), Maritime Mine...stipulated by the capability declaration of 2008, are within the responsibility of the agency. Specific capabilities initiatives, such as the MUSIS ...Product ISAF = International Security Assistance Force KFOR = NATO Kosovo Force MUSIS = Multinational Space-Based Imaging System for Surveillance

  3. Economics and National Security: Issues and Implications for U.S. Policy

    Science.gov (United States)

    2011-01-04

    College, K-12, and Early Childhood Education ............................................................. 25 Science, Technology, Engineering, and...to democratize because democracies were more likely than dictatorships to have shared values and to keep the peace; and • Western culture was...ahead of the United States in all three categories.57 College, K-12, and Early Childhood Education58 The 2010 National Security Strategy proposes that

  4. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  5. Career Obsolescence and Social Security: Emerging Education Policy Issues in Law.

    Science.gov (United States)

    Sandow, Stuart A.

    This document is the second in a series of studies designed to examine the legal aspects of various potential educational problems in our society. This particular study deals with the case of a highly trained aerospace technician who sues the social security trust for loan benefits, arguing that he is economically disabled and has been retired by…

  6. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  7. Framing Innovation

    DEFF Research Database (Denmark)

    Haase, Louise Møller; Laursen, Linda Nhu

    2017-01-01

    Designing a remarkable product innovation is a difficult challenge, which businesses today continuously are striving to tackle. This challenge is particularly present in the early phase of innovation, where the main product concept and frames of the innovation is determined. As a main challenge...... in the early phase is the reasoning process; innovation team are faced with open-ended ill-defines problems, where they need to make decisions about an unknown future having only incomplete, ambiguous and contradicting insights available. We study the reasoning of experts, how they frame to make sense of all...... the insights and create a basis for decision making in relation to a new project. Based on case studies of five innovative products from various industries, we suggest a Product Reasoning Model for understanding reasoning and envisioning of new product innovations in the early phases...

  8. Framing Innovation

    DEFF Research Database (Denmark)

    Haase, Louise Møller; Laursen, Linda Nhu

    2017-01-01

    Designing a remarkable product innovation is a difficult challenge, which businesses today continuously are striving to tackle. This challenge is particularly present in the early phase of innovation, where the main product concept and frames of the innovation is determined. As a main challenge...... in the early phase is the reasoning process; innovation team are faced with open- ended ill-defines problems, where they need to make decisions about an unknown future having only incomplete, ambiguous and contradicting insights available. We study the reasoning of experts, how they frame to make sense of all...... the insights and create a basis for decision making in relation to a new project. Based on case studies of five innovative products from various industries, we suggest a Product Reasoning Model for understanding reasoning and envisioning of new product innovations in the early phases of innovation....

  9. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  10. What’s in a word? The framing of health at the regional level: ASEAN, EU, SADC and UNASUR

    Science.gov (United States)

    Amaya, Ana B; Rollet, Vincent; Kingah, Stephen

    2015-01-01

    The Association of Southeast Asian Nations, the European Union, the Southern African Development Community and the Union of South American Nations have increasingly been involved in health diplomacy in the past decade, yet little is known about how they frame health as a foreign policy issue and how this has an impact on their prioritisation of policies. For this, we conducted a review of existing grey and peer-reviewed literature that address regional integration and health, as well as a documentary review according to security, development, trade, human rights, moral/ethical reasonings and global public goods frames identified in the literature. The policy frames identified responded to the challenges these regions currently face. The Association of Southeast Asian Nation’s struggle with re-emerging diseases has led to favouring a securitisation approach to health, the European Union approaches health as a cross-cutting policy issue, the Southern African Development Community presents health as a driver for development, and while the Union of South American Nations emphasises health as a human right and addresses the social determinants of health as an ethical imperative. Overall, these policy frames were useful in analysing the framing of health in foreign policy at the regional level. However, within our analysis, we identified a new frame that approaches health as an intersectoral issue. The impact of regional organisations’ forward will depend on their ability to harness their convening power and speak in a coherent voice on health matters. PMID:26635496

  11. What's in a word? The framing of health at the regional level: ASEAN, EU, SADC and UNASUR.

    Science.gov (United States)

    Amaya, Ana B; Rollet, Vincent; Kingah, Stephen

    2015-12-01

    The Association of Southeast Asian Nations, the European Union, the Southern African Development Community and the Union of South American Nations have increasingly been involved in health diplomacy in the past decade, yet little is known about how they frame health as a foreign policy issue and how this has an impact on their prioritisation of policies. For this, we conducted a review of existing grey and peer-reviewed literature that address regional integration and health, as well as a documentary review according to security, development, trade, human rights, moral/ethical reasonings and global public goods frames identified in the literature. The policy frames identified responded to the challenges these regions currently face. The Association of Southeast Asian Nation's struggle with re-emerging diseases has led to favouring a securitisation approach to health, the European Union approaches health as a cross-cutting policy issue, the Southern African Development Community presents health as a driver for development, and while the Union of South American Nations emphasises health as a human right and addresses the social determinants of health as an ethical imperative. Overall, these policy frames were useful in analysing the framing of health in foreign policy at the regional level. However, within our analysis, we identified a new frame that approaches health as an intersectoral issue. The impact of regional organisations' forward will depend on their ability to harness their convening power and speak in a coherent voice on health matters.

  12. Epilogue: global food security, rhetoric, and the sustainable intensification debate

    NARCIS (Netherlands)

    Kuijper, T.W.M.; Struik, P.C.

    2014-01-01

    The need to feed nine billion people in 2050 has given rise to widespread debate in science and policy circles. The debate is largely framed in neo-Malthusian terms, and elements of global food security (resilience of the food system, food quantity and quality, right to and access to food) demand

  13. Evaluation and the Framing of Race

    Science.gov (United States)

    House, Ernest R.

    2017-01-01

    Racial framing can have strong effects on programs, policies, and even evaluations. Racial framing developed as a justification for the exploitation of minorities and has been a primary causal factor in the persistence of racism. By being aware of its pattern, structure, origins, and how racial framing generates effects, we can significantly…

  14. Consumer Food Security and Labeling Intervention on Food Products through Public Policies in Romania

    Directory of Open Access Journals (Sweden)

    Dacinia Crina Petrescu

    2018-02-01

    Full Text Available The correct understanding of consumers’ food labeling knowledge and perceptions is a prerequisite to develop and implement coherent and appropriate food safety policies. One objective of the paper was to discover how often consumers access and use specific food label information. Another objective was to explore stakeholders’ preferences for several public policy options relevant for food safety. In this respect, a survey on a sample of 312 Romanian consumers and the evaluation of several public policy options by four stakeholder groups (food producers and sellers, doctors, fitness trainers, and consumers were carried out. The results revealed that the most frequently read types of information on the label were “expiration date” and “price”, closely followed by “quantity” and “brand”. Among tested public policies, those related to the traffic light labels and to the social interest messages with health claims were rewarded with high scores by investigated stakeholders. Although nutrition has a decisive impact on health state, nutrition information was not frequently read by people, thus justifying the implementation of a public policy meant to enhance consumers’ interest in and reading frequency of nutrition information on food label.

  15. Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

    Directory of Open Access Journals (Sweden)

    Happy M. Tirivangasi

    2018-05-01

    Full Text Available Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities. Consequently, this has an impact on market access, trade, food supply, reduced income, increased food prices, decreased farm income and employment. Natural disasters create poverty, which in turn increases the prevalence of food insecurity and malnutrition. It is clear that disasters put food security at risk. The poorest people in the community are affected by food insecurity and disasters; hence, there is a need to be prepared as well as be in a position to manage disasters. Without serious efforts to address them, the risks of disasters will become an increasingly serious obstacle to sustainable development and the achievement of sustainable development goals, particularly goal number 2 ‘end hunger, achieve food security and improved nutrition and promote sustainable agriculture’. In recent years, countries in southern Africa have experienced an increase in the frequency, magnitude and impact of climate change–related hazards such as droughts, veld fire, depleting water resources and flood events. This research aims to reveal Southern African Development Community disaster risk management strategies for food security to see how they an influence and shape policy at the national level in southern Africa. Sustainable Livelihood approach was adopted as the main theoretical framework for the study. The qualitative Analysis is based largely on data from databases such as national reports, regional reports and empirical findings on the disaster management–sustainable development nexus.

  16. Sustainable Food Security in the Mountains of Pakistan: Towards a Policy Framework.

    Science.gov (United States)

    Rasul, Golam; Hussain, Abid

    2015-01-01

    The nature and causes of food and livelihood security in mountain areas are quite different to those in the plains. Rapid socioeconomic and environmental changes added to the topographical constraints have exacerbated the problem of food insecurity in the Hindu Kush-Himalayan (HKH) region. In Pakistan, food insecurity is significantly higher in the mountain areas than in the plains as a result of a range of biophysical and socioeconomic factors. The potential of mountain niche products such as fruit, nuts, and livestock has remained underutilized. Moreover, the opportunities offered by globalization, market integration, remittances, and non-farm income have not been fully tapped. This paper analyzes the opportunities and challenges of food security in Pakistan's mountain areas, and outlines a framework for addressing the specific issues in terms of four different types of area differentiated by agro-ecological potential and access to markets, information, and institutional services.

  17. FOOD SECURITY PROVIDING OF THE SVERDLOVSKAYA OBLAST POPULATION AS THE AGRARIAN POLICY BASIS

    Directory of Open Access Journals (Sweden)

    M.V. Fedorov

    2008-12-01

    Full Text Available Food safety may be interpreted as production systems attribute providing during different technological processes the security and the quality of food products. The key role in this is played by control systems over these processes. Any control system is based on the information data concerning efficiency and state of the system. This information is necessary for operative quality management and the frequency of hypothetic deviations may serve as a universal numeric indicator of the technological processes breakages. The basic elements of food security provision in the region are seen as the following: orientation on our own resources; agro industrial complex restructuring wits a due account of disproportions in its spheres; innovation changes in the production processes in view of competitiveness increase; nutrition improvement and health of the population.

  18. Sports Venue Security: Public Policy Options for Sear 4-5 Events

    Science.gov (United States)

    2014-06-01

    team which commands the highest attendance is the world-renowned New York Yankees franchise . The Yankees games average 10,300 people per pre-season...spectator-patron buy -in to partner with the government and private sector for funding SEAR 4–5 venue security. As shown in Chapter III, the sports...now. Further, the sports ticket buying public has also accepted the purely for profit convenience fees already attached to sporting event ticket

  19. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-06-06

    Security Council Resolution 1193 (August 28, 1998) and 1214 (December 8, 1998) urged the Taliban to end discrimination against women . Women’s rights ...powers to compensate. Gives men and women equal rights under the law, allows for political parties as long as they are not “un-Islamic;” allows for...implement the NAPWA and all of its past commitments and laws to strengthen the rights of women and provide services to them. The major institutional

  20. Mitigating Insider Threats in the Domestic Aviation System: Policy Options for the Transportation Security Administration

    Science.gov (United States)

    2017-12-01

    Birmingham Airport to come up with a set of short-, mid-, and long-term initiatives for its employees. The first step was to pull the top layer of...programs are defensive and akin to a goalie patrolling the net. They know what they are defending against and the area (goal) they are protecting...Unfortunately, even the best goalies from time to time have the ball kicked past them. At their core, security programs can be split into two main

  1. Analysis of Department of Defense Social Media Policy and Its Impact on Operational Security

    Science.gov (United States)

    2015-06-01

    MWR Morale, Welfare , and Recreation NIPRNET Non-secure Internet Protocol Router Network NIST National Institute of Standards and Technology NSA...cyber risks at both the national and international levels (DOD, 2011). This is because many domestic technology firms outsource software production...provided by morale, welfare , and recreation (MWR), military exchanges, and lodging programs for use by authorized patrons. C) Applies to contractors

  2. The Impact of the Soviet Military Presence in the Arctic Region on Norwegian Security Policies

    Science.gov (United States)

    1990-01-01

    Admiral Roy Breivik , "Assuring the Security of Reinforcements to Norway", NATO’s Sixteen Nations, Special nr 2, (1982): 67. Former Director General of...34Norway Country Portrait", (1984): 53. 17 Holst, (1982): 27. 18 German, (1982): 61. 19 Bjol, (1983): 25. 20 Breivik , (1982): 68. 21 Interview, Major Kurt...1, (January 1981): 5-7. 137 Vinogradov, N., as translated by Suggs, Robert C., "Let’s Go to Hammerfest", Red Star, (February 1985). Wall, Patrick

  3. A Formal Model of Trust Chain based on Multi-level Security Policy

    OpenAIRE

    Kong Xiangying

    2013-01-01

    Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. We use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust system and trust decision theorem of trust chain transfer which is proved meantime. Finally, a prototype system is given to show the efficiency of the model.

  4. Dividend Policy: A Survey of Malaysian Public Listed Companies and Security Analysts

    OpenAIRE

    Chong, David Voon Chee

    2003-01-01

    This dissertation revisits the dividend puzzle and attempts to answer the fundamental question of “why do companies pay dividends?” by using a simple regression model incorporating the major theories on dividend relevance. In addition, this research investigates if the opinions of companies (both dividend and non-dividend paying) and security analysts differ with respect to the various explanations for paying dividends. Finally, this research also explores the views and opinions of corporate ...

  5. Social Security reform: evaluating current proposals. Latest results of the EBRI-SSASIM2 policy simulation model.

    Science.gov (United States)

    Copeland, C; VanDerhei, J; Salisbury, D L

    1999-06-01

    The present Social Security program has been shown to be financially unsustainable in the future without modification to the current program. The purpose of this Issue Brief, EBRI's fourth in a series on Social Security reform, is threefold: to illustrate new features of the EBRI-SSASIM2 policy simulation model not available in earlier EBRI publications, to expand quantitative analysis to specific proposals, and to evaluate the uncertainty involved in proposals that rely on equity investment. This analysis compares the Gregg/Breaux-Kolbe/Stenholm (GB-KS) and Moynihan/Kerrey proposals with three generic or "traditional" reforms: increasing taxes, reducing benefits, and/or increasing the retirement age. Both proposals would create individual accounts by "carving out" funds from current Social Security payroll taxes. This analysis also examines other proposed changes that would "add on" to existing Social Security funds through the use of general revenue transfers and/or investment in the equities market. President Clinton has proposed a general revenue transfer and the collective investment of some of the OASDI trust fund assets in equities. Reps. Archer and Shaw have proposed a general revenue tax credit to establish individual accounts that would be invested partially in the equities markets. When comparing Social Security reform proposals that would specifically alter benefit levels, the Moynihan/Kerrey bill compares quite favorably with the other proposals in both benefit levels and payback ratios, when individuals elect to use the individual account option. In contrast, the GB-KS bills do not compare quite as favorably for their benefit levels, but do compare favorably in terms of payback ratios. An important comparison in these bills is the administrative costs of managing the individual accounts, since benefits can be lowered by up to 23 percent when going from the assumed low to high administrative costs. Moreover, allowing individuals to decide whether to

  6. Sustainable Livestock Production in The Perspective of National Food Security Policy

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-03-01

    Full Text Available This paper presents an overview of the role that livestock play in various dimensions of food security. Food security is defined as a state of affairs where all people at all times have access to safe and nutritious food to maintain a healthy and active life. Availability, accessibility, and affordability of individuals to consume food according to their respective socio-economic conditions are important dimensions. It describes the place of livestock products in human nutrition, the contribution of livestock to the national food supply and the way that livestock can affect food access, as a direct source of food and a source of income. Access to food is the most basic human right, especially for Indonesia with more than 240 million people with annual growth of 1.3%. To secure food availability, a sustainable food production growth more than 2% per year, including animal protein sources, is needed. It is necessary to strengthen food supply by maximizing available resources; improve food distribution system to guarantee a stable food supply and public access; encourage diversified food consumption; and prevent as well as resolve food scarcity. Furthermore, within the national objectives for self-sufficiency in rice, corn, soybean, and white sugar, the current annual percapita consumption of livestock products has reached 6.96 kg (meat, 7.3 kg (eggs and 16.5 kg (milk, which indicates good progress to stimulate sustainable domestic livestock production.

  7. Strategic Culture and Energy Security Policy of South Korea: The Case of Nuclear Energy

    International Nuclear Information System (INIS)

    Kim, Taehyun

    2012-01-01

    The U. S. - ROK Civil Nuclear Cooperation Agreement highlights the dilemma of contemporary international non-proliferation regime. Non-Proliferation Treaty has represented an awkward balance between the ideal of nuclear energy and the reality of nuclear weapons. It is neither complete nor effective. It is not complete because it does not cover all the issues with respect to nuclear energy, which have become increasingly complex. Nuclear security, for example, is not an issue that it addresses, and it is precisely why President Obama called for the unprecedented Nuclear Security Summit. It is not effective. It has failed in preventing proliferation of nuclear weapons states, India, Israel, Pakistan and North Korea, who remain outside of the regime. An international regime is defined as 'a set of principles, norms, rules, and decision-procedures around which actors' expectations converge. The extents to which actors' expectations converge and forceful measures in the name of international community against any violation are justified will measure its effectiveness. NPT regime is sub-par on that. The world is in dire need of a comprehensive and integrated regime for nuclear energy regime, where proliferation, security, and safety concern are effectively addressed. South Korea, if it truly wants to become a key player in the field, has to be one of its architects. The ability to meet the challenge of revising Civil Nuclear Cooperation Agreement will show if it is a qualified architect

  8. Security policy speculation of user uploaded images on content sharing sites

    Science.gov (United States)

    Iyapparaja, M.; Tiwari, Maneesh

    2017-11-01

    Innovation is developing step by step tremendously. As there are numerous social locales where information likes pictures, sound, video and so forth are shared by the client to each other. In concentrate to all exercises on social locales, there is need of protection to pictures. Because of this reason, I utilized Adaptive protection strategy forecast instrument to give security to the pictures. Issue identified with pictures is the huge issue in social locales like Facebook, twitter and so on. So here the part of a social thought, security to pictures, metadata and so on is produced. To conquer this issue we produced an answer which is 2 systems which understanding to a background marked by the pictures gives appropriated answer for them. Here we give an arrangement to the specific sort of pictures by characterizing them and in addition giving protection to pictures which are transferred agreement to a calculation that we utilized. Consequently as indicated by this arrangement expectation pictures take after a similar approach on up and coming pictures and give successful security to them.

  9. Conditions of Poland’s foreign and security policy within the EU and NATO environment

    Directory of Open Access Journals (Sweden)

    Antczak- Barzan Anna

    2014-01-01

    Full Text Available The article is an attempt to answer the question about the state of Poland’s security after the first decade of the twenty-first century, what are its determinants, what kind of challenges Poland faces and which of them may turn into a threat and which into an opportunity, or what Polish potential is and which of its components determine its position on the international arena. It is achieved through a detailed analysis of actions undertaken by Poland in the international arena to strengthen its international position as well as the level of its security. Thus, the aim is to identify those determinants which may contribute to establishing a stronger position and which can create problems and become a formidable challenge in the context of various aspects of security, and even develop into a threat. Unfortunately, the picture which comes out of the above mentioned analysis is not optimistic and the impression is that Poland did not use the chance it was given after the accession to the NATO and the EU.

  10. [Food and nutritional security: situation analysis of decentralization in the national public policy].

    Science.gov (United States)

    Vasconcellos, Ana Beatriz Pinto de Almeida; Moura, Leides Barroso Azevedo de

    2018-03-01

    The aim of this study was to analyze the situation with the decentralization of the Brazilian National System of Food and Nutritional Security (SISAN), created in 2006 under the Brazilian National Food and Nutritional Security Act (LOSAN). Based on the criteria for joining SISAN, as set out in Decree 7,272 of August 25, 2010, the authors analyzed data from the basic information surveys of the Brazilian Institute of Geography and Statistics, 2014 (Estadic e Munic/2014). The results show that decentralization of SISAN is still incipient at the municipal level, although all the states of Brazil have already joined the system. The social assistance sector has played an outstanding role in coordinating SISAN at the state and municipal levels, while in the latter the health sector has also played a relevant role. The analysis of food and nutritional security activities conducted to date, based on the sources of federal, state, and municipal funds, further shows that the federal sphere has still not played a strong inductive role capable of leading the expansion of SISAN. More effective funding mechanisms and the assignment of responsibilities to the states and municipalities are relevant factors for consolidating the system's state-level base and expanding the municipal base in the search for an identity and capillarity for SISAN.

  11. Security, development and human rights: normative, legal and policy challenges for the international drug control system.

    Science.gov (United States)

    Barrett, Damon

    2010-03-01

    This commentary addresses some of the challenges posed by the broader normative, legal and policy framework of the United Nations for the international drug control system. The 'purposes and principles' of the United Nations are presented and set against the threat based rhetoric of the drug control system and the negative consequences of that system. Some of the challenges posed by human rights law and norms to the international drug control system are also described, and the need for an impact assessment of the current system alongside alternative policy options is highlighted as a necessary consequence of these analyses. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  12. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  13. Fundamental economic irreversibilities influence policies for enhancing international forest phytosanitary security

    Science.gov (United States)

    Thomas P. Holmes; Will Allen; Robert G. Haight; E. Carina H. Keskitalo; Mariella Marzano; Maria Pettersson; Christopher P. Quine; E. R. Langer

    2017-01-01

    National and international efforts to manage forest biosecurity create tension between opposing sources of ecological and economic irreversibility. Phytosanitary policies designed to protect national borders from biological invasions incur sunk costs deriving from economic and political irreversibilities that incentivizes wait-and-see decision-making. However, the...

  14. Achieving Food Security and Environmental Sustainability in Southeast Asia: A Policy Challenge

    NARCIS (Netherlands)

    Mahanani WR; MNV

    2002-01-01

    To get a thorough picture on the possible situation of food and the environment in Southeast Asia in 2030 and to identify the areas that need policy intervention, five scenarios on future food production are reviewed and compared. These scenarios include: 1) FAO AT 2015/30 which is taken as the

  15. Good governance and virtue in South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Burmeister, O

    2015-01-01

    Full Text Available Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack...

  16. REDD policy impacts on the agri-food sector and food security

    NARCIS (Netherlands)

    Tabeau, Andrzej; Meijl, van Hans; Overmars, Koen P.; Stehfest, Elke

    2017-01-01

    Recent research shows that the combined contributions of deforestation, forest degradation and peat land emissions account for about 15% of greenhouse gas emissions. The REDD policy which preserves forests and values standing forests, enables substantial emission reductions. Since agricultural

  17. United States foreign oil policy since World War 1 : for profits and security. 2 ed.

    Energy Technology Data Exchange (ETDEWEB)

    Randall, S.J.

    2005-07-01

    This book provided a historical context for United States global oil politics, with a focus on the goals, accomplishments and challenges of United States foreign oil policy, as well as on the relationship between the state and private sectors. This second edition has integrated developments in global politics since the end of the Cold War. It was suggested that many factors have provided the context for oil policy formation: a succession of crises in Iran since the 1950s; 2 wars in Iraq; U.S. intervention in Afghanistan; the threat of international terrorism since September 11, 2001; ongoing conflicts between Israel and the Arab nations in the Middle East; political instability in Saudi Arabia and in Venezuela and the trend towards trade and investment liberalization in Latin America in the 1990s. In addition, the emergence of oil sands reserves in Canada and other sources of non-conventional oil were discussed. Nationalism and oil policies in the Depression and World War 2 were examined. The structure of decision-making in oil policies was examined. Domestic and offshore resources were reviewed, and an outline of international agreements and relationships was presented. Issues concerning OPEC countries and the Iranian Revolution were examined. It was concluded that the United States has become more and not less vulnerable, despite its military strength. The author suggested that the main policy challenge to the United States may well be the tension between its commitment to Israel and its determination to avoid alienating the Arab oil-producing states. refs., tabs., figs.

  18. Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies.

    Science.gov (United States)

    Rosenfeld, Lisa; Torous, John; Vahia, Ipsit V

    2017-08-01

    Despite tremendous growth in the number of health applications (apps), little is known about how well these apps protect their users' health-related data. This gap in knowledge is of particular concern for apps targeting people with dementia, whose cognitive impairment puts them at increased risk of privacy breaches. In this article, we determine how many dementia apps have privacy policies and how well they protect user data. Our analysis included all iPhone apps that matched the search terms "medical + dementia" or "health & fitness + dementia" and collected user-generated content. We evaluated all available privacy policies for these apps based on criteria that systematically measure how individual user data is handled. Seventy-two apps met the above search teams and collected user data. Of these, only 33 (46%) had an available privacy policy. Nineteen of the 33 with policies (58%) were specific to the app in question, and 25 (76%) specified how individual-user as opposed to aggregate data would be handled. Among these, there was a preponderance of missing information, the majority acknowledged collecting individual data for internal purposes, and most admitted to instances in which they would share user data with outside parties. At present, the majority of health apps focused on dementia lack a privacy policy, and those that do exist lack clarity. Bolstering safeguards and improving communication about privacy protections will help facilitate consumer trust in apps, thereby enabling more widespread and meaningful use by people with dementia and those involved in their care. Copyright © 2017. Published by Elsevier Inc.

  19. CHALLENGES TO ILLEGAL MIGRATION POLICIES AND NATIONAL SECURITY OF MEXICO: ANALYSIS FROM THE MANAGEMENT CONDUCTED BETWEEN 2001 AND 2014 AND THE CASE CONCERNING INTERNATIONAL REFERENCES

    Directory of Open Access Journals (Sweden)

    PEDRO RODRÍGUEZ MORENO

    2017-09-01

    Full Text Available This article discusses the issue of political-legal, social and human rights challenges imposed by irregular migration to Mexico, a nation that has been converted into an important area of destination and transit to the United States. The criminalization of the phenomenon and, therefore, the securitization of immigration policy, endorsed by the National Security Policy, has led to social and humanitarian conditions that are deplorable for undocumented migrants most of the times. It then examines the situation of Mexico between 2001 and 2014 and the reality of international benchmarks in the field. One of the challenges recognized for Immigration and National Security policies on the social level is the stigmatization suffered by irregular migrants both adults and children. In the political-legal arena to challenge the institutionalization of irregular migration as a threat that affects national security and overcomes the disjunction between the established regulations and their implementation. Key

  20. The Economics of the Security Dilemma in the Eastern Baltic Economic Dilemmas of the Security Policy of the Eastern Baltic Countries

    Directory of Open Access Journals (Sweden)

    Mezhevich N. M.

    2018-05-01

    Full Text Available This article considers military security in the Eastern Baltic. The research focuses on the economic sustainability of Estonia, Latvia, and Lithuania in the context of military spending. The authors maintain that an increase in military spending can either strengthen or weaken national economic and technological potential. In Germany or Sweden, military spending accounts for a smaller proportion of the GDP or budget revenues, but it is integrated into the general model of innovative and technological development. In the case of the Baltics, it is advisable to estimate military spending as a proportion of budget revenues rather than that of GDP — this recommendation applies to all smaller states. The authors stress that the central component of any national military and economic development is a focus on general national objectives rather than solely military ones. Economically advanced countries integrate defence spending into their investment and innovation strategies and industrial policies. Smaller countries — and the Baltics are no exception — do not apply this principle. Their military spending does not contribute to the technological and economic agenda. The article shows that the military spending of Lithuania, Latvia and Estonia undermines their investment potential and serves as a critical factor in their national and governmental development. The authors suggest estimating military spending as a proportion of budget revenues rather than that of GDP.

  1. Policy for securing human resources in the nuclear industry of Japan

    International Nuclear Information System (INIS)

    Takeuchi, S.

    1993-01-01

    The shortage of human resources in the field of nuclear industry in Japan is due to: structural difficulty resulting from the prevailing labor shortage in Japan, difficulties from the ever-intensifying adverse wind against nuclear power, and difficulties specific to R and D organizations. A practical plan is proposed for securing qualified personnel: approach to be directly made on campuses; effective/advanced management of human resources; better treatment and fringe benefit; promoting the nuclear industry attractiveness; expanding the scope of basic and fundamental researches; regaining the public confidence; closer cooperation between the government and the nuclear power groups. 6 figs

  2. Southeast Asian Perceptions of U.S. Security Policy in the Post-Cold War Era

    Science.gov (United States)

    1993-06-01

    personnel to be stationed in Singapore. Alimin’s statement came the day following Malaysia’s Defense Minister Najib Tun Razak had also declared Kuala Lumpur’s...military concerns. Malaysian Defense Minister Datuk Sri Mohamed Najib Razak has said: "The question of security should not be viewed from a narrow...region."" In November 1991, Defense Minister Najib Razak offered the use of the Royal Malaysian Naval Base in Lumut as a maintenance and repair depot for

  3. Putting Safety in the Frame

    Directory of Open Access Journals (Sweden)

    Valerie Jean O’Keeffe

    2015-06-01

    Full Text Available Current patient safety policy focuses nursing on patient care goals, often overriding nurses’ safety. Without understanding how nurses construct work health and safety (WHS, patient and nurse safety cannot be reconciled. Using ethnography, we examine social contexts of safety, studying 72 nurses across five Australian hospitals making decisions during patient encounters. In enacting safe practice, nurses used “frames” built from their contextual experiences to guide their behavior. Frames are produced by nurses, and they structure how nurses make sense of their work. Using thematic analysis, we identify four frames that inform nurses’ decisions about WHS: (a communicating builds knowledge, (b experiencing situations guides decisions, (c adapting procedures streamlines work, and (d team working promotes safe working. Nurses’ frames question current policy and practice by challenging how nurses’ safety is positioned relative to patient safety. Recognizing these frames can assist the design and implementation of effective WHS management.

  4. Timor-Leste’s Foreign Policy: Securing State Identity in the Post-Independence Period

    Directory of Open Access Journals (Sweden)

    Selver B. Sahin

    2014-01-01

    Full Text Available This paper examines some of the major ideational aspects of Timor-Leste’s foreign policy orientation in the post-independence period. Drawing upon the constructivist accounts of state behaviour, the paper situates Timorese leaders’ foreign policy decisions in the broader context of their search to position the fledging nation in the global political order. It argues that Timor-Leste’s insecure state identity has shaped its leaders’ foreign policy preferences in the post-independence period. This identity can be examined by separating it into two parts: the construction of spatial boundaries and the creation of a temporal “other”. The former is evidenced by the leadership’s rhetorical emphasis on the country’s Portuguese heritage and their prioritisation of ASEAN membership, both of which are closely related to the consolidation of the young nation’s political and cultural identity. The creation of a temporal other, as illustrated by the rise of political discourse emphasising sovereignty, reflects a wider transitional process that is embedded in the country’s transformation from colony to independent state under international supervision as well as the state’s transformation from “fragile” or “failing” to “stable”. A detailed analysis of the basic aspects of Timor-Leste’s insecurities as a constitutive element of its foreign policy becomes instrumental to understanding the country’s nation-state-building experience since its separation from Indonesia in 1999, as it enters a new phase of socio-political structuring following the withdrawal of the international security presence in 2012.

  5. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2011-04-15

    banks existed during Taliban era. Some limited credit card use. Some Afghan police now paid by cell phone (E-Paisa). Access to Electricity 15%-20...another policy review, taking into account the McChrystal recommendations and the marred August 20, 2009, presidential election. Some senior U.S...seen as a prelude to a broader and more complex bilateral free trade agreement, but negotiations on an FTA have not yet begun. On December 13, 2004

  6. U.S. Refugee Policy In The Era Of Homeland Security: A Comparative Government Analysis

    Science.gov (United States)

    2017-12-01

    comparative analysis with Canada and Germany, both of which are democratic Western societies facing similar issues. It answers the question of what...with Canada and Germany, both of which are democratic Western societies facing similar issues. It answers the question of what U.S. policy makers can...Refugee Crisis and the Need for U.S. Leadership (New York: Human Rights First, 2016), https://www.humanrightsfirst.org/sites/default/files

  7. Policy Analysis in National Security Affairs: New Methods for a New Era

    Science.gov (United States)

    2006-01-01

    Basic Books, 1982); Lee S. Friedman, Microeconomic Policy Analysis (New York: McGraw-Hill, 1984); Duncan Macrae, Jr., and Dale Whittington , Expert...that part of the an- swer lies in scuttling the Stryker brigades and the FCS effort, but this step would deprive the Army of main transformation...about whether too many soldiers were being allocated to logistic support, depriving the U.S. Army and European forces of adequate combat formations

  8. Political Influence on Japanese Nuclear and Security Policy: New Forces Face Large Obstacles

    Science.gov (United States)

    2014-02-01

    supported and sometimes even led by a strong bureaucracy, with oversight by but also much deference from the broader LDP majority in the Diet . During the...Research Council (PARC), a “shadow Diet committee” system in which DPJ legislators could engage in bureaucrat-led “study sessions,” something...303- 328. 62 Katsuhisa Furukawa, “Japan’s Policy and Views on Nuclear Weapons: A Historical Perspective,” Jebat: Malaysian Journal of History

  9. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Directory of Open Access Journals (Sweden)

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  10. National Security and International Policy Challenges in a Post Stuxnet World

    Directory of Open Access Journals (Sweden)

    Butrimas Vytautas

    2014-12-01

    Full Text Available The international community has focused too much on addressing cybercrime and cyber hacktivist questions. The list of usual suspects responsible for cyber incidents associated with attacks involving the theft of intellectual property, sensitive private data, money and disruption of web services unfortunately has grown beyond the attention seeking student hacker, cybercriminal or social hacktivist. The public appearance of the Stuxnet family of malware designed to destroy specifically targeted critical infrastructure components in June of 2010 gave perhaps the first indication that States have entered cyberspace as one of the perpetrators of malicious cyber activity. The problem of States actively preparing and executing cyber-attacks against the critical infrastructures of other States has been largely ignored by the international community. These attacks raise national security issues concerning threats to the economic and social well-being of States. However the pervasive presence of cyber space as the common environment where all modern industrial processes take place and the interrelations developed among the critical infrastructure of other States raise cross-border security issues as well. The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts. Three solutions and a possible model are proposed to manage this disruptive activity of States in cyberspace at the international level.

  11. A Nuclear Submarine in the South Atlantic: The Framing of Threats and Deterrence

    Directory of Open Access Journals (Sweden)

    Mônica Herz

    Full Text Available Abstract In this article, we analyse one aspect of Brazilian nuclear policy during the tenure of the Workers Party (2003–2016: the development of a nuclear-propelled submarine. We propose that the project of building a nuclear-propelled submarine has become possible partly because of the mobilisation of a set of arguments for the construction of the South Atlantic as a strategic area, framed in terms of security and development. On the other hand, we contend that the need for a nuclear-propelled submarine is framed through the mobilisation of a specific notion of deterrence. In other words, we claim that the notions of ‘strategic area’, ‘general deterrence’, ‘conventional deterrence’, and ‘deterrence by denial’ can help us analyse the fundamental aspects involved in the framing of the South Atlantic as a security concern, justifying the nuclear-propelled submarine project.

  12. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  13. The Model of Gas Supply Capacity Simulation In Regional Energy Security Framework: Policy Studies PT. X Cirebon Area

    Science.gov (United States)

    Nuryadin; Ronny Rahman Nitibaskara, Tb; Herdiansyah, Herdis; Sari, Ravita

    2017-10-01

    The needs of energy are increasing every year. The unavailability of energy will cause economic losses and weaken energy security. To overcome the availability of gas supply in the future, planning are cruacially needed. Therefore, it is necessary to approach the system, so that the process of gas distribution is running properly. In this research, system dynamic method will be used to measure how much supply capacity planning is needed until 2050, with parameters of demand in industrial, household and commercial sectors. From the model obtained PT.X Cirebon area in 2031 was not able to meet the needs of gas customers in the Cirebon region, as well as with Businnes as usual scenario, the ratio of gas fulfillment only until 2027. The implementation of the national energy policy that is the use of NRE as government intervention in the model is produced up to 2035 PT.X Cirebon area is still able to supply the gas needs of its customers.

  14. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  15. Studying policy implementation using a macro, meso and micro frame analysis: the case of the Collaboration for Leadership in Applied Health Research & Care (CLAHRC) programme nationally and in North West London.

    Science.gov (United States)

    Caldwell, Sarah E M; Mays, Nicholas

    2012-10-15

    The publication of Best research for best health in 2006 and the "ring-fencing" of health research funding in England marked the start of a period of change for health research governance and the structure of research funding in England. One response to bridging the 'second translational gap' between research knowledge and clinical practice was the establishment of nine Collaborations for Leadership in Applied Health Research and Care (CLAHRCs). The goal of this paper is to assess how national-level understanding of the aims and objectives of the CLAHRCs translated into local implementation and practice in North West London. This study uses a variation of Goffman's frame analysis to trace the development of the initial national CLAHRC policy to its implementation at three levels. Data collection and analysis were qualitative through interviews, document analysis and embedded research. Analysis at the macro (national policy), meso (national programme) and micro (North West London) levels shows a significant common understanding of the aims and objectives of the policy and programme. Local level implementation in North West London was also consistent with these. The macro-meso-micro frame analysis is a useful way of studying the transition of a policy from high-level idea to programme in action. It could be used to identify differences at a local (micro) level in the implementation of multi-site programmes that would help understand differences in programme effectiveness.

  16. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  17. The Supply of Medical Radioisotopes. Policy Options for Ensuring Long-term Supply Security of Molybdenum-99 and/or Technetium-99m Produced Without Highly Enriched Uranium Targets

    International Nuclear Information System (INIS)

    Westmacott, Chad; Cameron, Ron

    2012-01-01

    Following the shortages of the key medical radioisotopes, molybdenum-99 ( 99 Mo) and its daughter technetium-99m (' 99m Tc), the OECD-Nuclear Energy Agency (NEA) created the High-level Group on the Security of Supply of Medical Radioisotopes (HLG-MR). Since 2009, this group has identified the reasons for the isotope shortages and developed a policy approach to address the challenges to a long-term secure supply of these important medical isotopes. On top of the ongoing concerns related to long-term reliability, all current long-term major 99 Mo-producing nations have agreed to convert to using low-enriched uranium (LEU) targets for the production of 99 Mo. This decision was made based on important nonproliferation reasons; however, the conversion will have potential impacts on the global supply chain - both in terms of costs and available capacity. Recognising that conversion is important and will occur, and also recognising the need to ensure a long-term secure supply of 99 Mo/' 99m Tc, the NEA, along with stakeholders, examined potential policy options that could be used by to ensure a reliable supply of 99 Mo and/or ' 99m Tc produced without highly enriched uranium (HEU), consistent with the time frames and policies of the HLG-MR. This discussion paper provides the various policy options available to governments to encourage a reliable supply of 99 Mo and/or ' 99m Tc produced without HEU. The examination of these options was done through the lens of ensuring a reliable supply, consistent with the time frames and policies of the HLG-MR. The options described in this document are meant to meet this objective by taking one of three general actions: - Making the option of purchasing or producing non-HEU-based 99 Mo and/or ' 99m Tc more attractive. - Making the option of purchasing or producing HEU-based 99 Mo and/or ' 99m Tc less attractive. - Limiting access to HEU-based 99 Mo and/or ' 99m Tc. This paper presents the options in each category and provides some views

  18. Dr. Inside and Dr. Outside: Physicists Involved With National Security and Foreign Policy

    Science.gov (United States)

    Zimmerman, Peter D.

    2009-05-01

    Physicists have had a special interest in American national security and arms control since at least the Manhattan Project. They have served our country in uniform and in the career civil service. Some have left academic careers for brief periods to work as political appointees, consultants, or resident scholars and then returned to an academic life, but often with changed goals. Some have tried government life and left nearly immediately, while others dipped a toe in and decided to stay. I will look at real-life examples, mostly using real names, drawn from my career and circle of colleagues to try to explain why some physicists have been extremely successful, why others have not, and what happens to a physicist who moved to Washington and decides to stay. I will also discuss routes into public service for those interesting in giving it a try.

  19. Iceland and the EU’s Common Security and Defence Policy: Challenge or Opportunity?

    Directory of Open Access Journals (Sweden)

    Alyson J.K. Bailes

    2012-06-01

    Full Text Available Iceland had initial misgivings about the EU’s capacity created in 1999 for military crisis management. In the current debate over Iceland’s EU application, questions have been raised about the possible impact of CSDP on the nation’s non-military status. In fact the CSDP is designed to respect national choices in defence; requires unanimity on new actions; and allows case-by-case decisions on participation. Preliminary study of six other small states in the EU suggests that none of them has been obliged by membership to abandon national preferences in this field, though all have made special efforts to support EU police and civilian operations - an area where Iceland is also well qualified to contribute. The more significant effects of EU membership for Icelandic security might in fact come in other, ‘softer’ areas including EU obligations for mutual assistance in civil emergencies.

  20. It's more than money: policy options to secure medical specialist workforce for regional centres.

    Science.gov (United States)

    May, Jennifer; Walker, Judi; McGrail, Mathew; Rolley, Fran

    2017-12-01

    Objectives Regional centres and their rural hinterlands support significant populations of non-metropolitan Australians. Despite their importance in the settlement hierarchy and the key medical services provided from these centres, little research has focused on their issues of workforce supply and long-term service requirements. In addition, they are a critical component of the recent growth of 'regional' hub-and-spoke specialist models of service delivery. Methods The present study interviewed 62 resident specialists in four regional centres, seeking to explore recruitment and retention factors important to their location decision making. The findings were used to develop a framework of possible evidence-informed policies. Results This article identifies key professional, social and locational factors, several of which are modifiable and amenable to policy redesign, including work variety, workplace culture, sense of community and spousal employment; these factors that can be targeted through initiatives in selection, training and incentives. Conclusions Commonwealth, state and local governments in collaboration with communities and specialist colleges can work synergistically, with a multiplicity of interdigitating strategies, to ensure a positive approach to the maintenance of a critical mass of long-term rural specialists. What is known about the topic? Rural origin increases likelihood of long-term retention to rural locations, with rural clinical school training associated with increased rural intent. Recruitment and retention policy has been directed at general practitioners in rural communities, with little focus on regional centres or medical specialists. What does this study add? Rural origin is associated with regional centre recruitment. Professional, social and locational factors are all moderately important in both recruitment and retention. Specialist medical training for regional centres ideally requires both generalist and subspecialist skills

  1. Corrigendum to: It's more than money: policy options to secure medical specialist workforce for regional centres.

    Science.gov (United States)

    May, Jennifer; Walker, Judi; McGrail, Mathew; Rolley, Fran

    2017-12-01

    Objectives Regional centres and their rural hinterlands support significant populations of non-metropolitan Australians. Despite their importance in the settlement hierarchy and the key medical services provided from these centres, little research has focused on their issues of workforce supply and long-term service requirements. In addition, they are a critical component of the recent growth of 'regional' hub-and-spoke specialist models of service delivery. Methods The present study interviewed 62 resident specialists in four regional centres, seeking to explore recruitment and retention factors important to their location decision making. The findings were used to develop a framework of possible evidence-informed policies. Results This article identifies key professional, social and locational factors, several of which are modifiable and amenable to policy redesign, including work variety, workplace culture, sense of community and spousal employment; these factors that can be targeted through initiatives in selection, training and incentives. Conclusions Commonwealth, state and local governments in collaboration with communities and specialist colleges can work synergistically, with a multiplicity of interdigitating strategies, to ensure a positive approach to the maintenance of a critical mass of long-term rural specialists. What is known about the topic? Rural origin increases likelihood of long-term retention to rural locations, with rural clinical school training associated with increased rural intent. Recruitment and retention policy has been directed at general practitioners in rural communities, with little focus on regional centres or medical specialists. What does this study add? Rural origin is associated with regional centre recruitment. Professional, social and locational factors are all moderately important in both recruitment and retention. Specialist medical training for regional centres ideally requires both generalist and subspecialist skills

  2. Frames in the Ethiopian Debate on Biofuels

    Directory of Open Access Journals (Sweden)

    Brigitte Portner

    2013-01-01

    Full Text Available Biofuel production, while highly contested, is supported by a number of policies worldwide. Ethiopia was among the first sub-Saharan countries to devise a biofuel policy strategy to guide the associated demand toward sustainable development. In this paper, I discuss Ethiopia’s biofuel policy from an interpretative research position using a frames approach and argue that useful insights can be obtained by paying more attention to national contexts and values represented in the debates on whether biofuel production can or will contribute to sustainable development. To this end, I was able to distinguish three major frames used in the Ethiopian debate on biofuels: an environmental rehabilitation frame, a green revolution frame and a legitimacy frame. The article concludes that actors advocating for frames related to social and human issues have difficulties entering the debate and forming alliances, and that those voices need to be included in order for Ethiopia to develop a sustainable biofuel sector.

  3. Policy-based secure communication with automatic key management for industrial control and automation systems

    Science.gov (United States)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    2016-11-22

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one or more other devices in the industrial process control and automation system in order to control communications to or from the specified device.

  4. The moderating effect of prior attitudes on framing effects and their combined contribution to the public politicization of EU immigration policy

    NARCIS (Netherlands)

    van Klingeren, M.; Boomgaarden, H.G.; de Vreese, C.H.

    2012-01-01

    This study investigates the effects of news frames on public politicization (i.e., salience and polarization) and the moderating role of prior attitudes on this relationship. An experiment was set-up among a representative sample of the Dutch population between June and July 2011. The results yield

  5. Does Variation in the Extent of Generalized Trust, Individual Education and Extensiveness of Social Security Policies Matter for Maximization of Subjective Well-Being?

    Science.gov (United States)

    Valeeva, Rania F.

    2016-01-01

    In this paper, I examine whether generalized trust and education, as well as social security policies of welfare state institutions matter for cross-national differences in subjective well-being (SWB), because knowledge on this issue is still lacking. For this purpose I integrated the insights of two sociological theories: Social Function…

  6. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  7. Securing Gender Equality through a Nexus of Energy Policy Performance and Relative Political Performance

    Science.gov (United States)

    Perkins-Ozuagiemhe, Andrea Christen

    that, in fact, that women are not impacted equally by energy policy preferences as men and that women in developing countries benefit from increased access to modern household energy. Thus, gender-differentiated energy usage illustrates why treating population as a homogenous group fails to capture how energy policy preferences and energy policy performance can affect different subgroups of population in terms of individual choices and how those differences can affect an overall economic growth and development. Fundamental theoretical implications emerge from this dissertation's empirical findings. First, improving gender equality through technological advancements in household electricity facilitates the progress of demographic transition in terms of reducing fertility rates. Time altering effects of increased access and use of household electricity modify intra-household relations by diminishing differing roles between men and women. When women gain greater autonomy facilitated by increasing time via access to modern household electricity for more economically and educationally productive activities, fertility rates and child births tend to decrease by altering choice in family size with increased investments in children. The effect that the reduction in fertility generated by increased gender equality has upon demographic transition is that it alters the change in age structure in a developing country by decreasing youth dependency ratios generating the demographic dividend. Gender equality-generated fertility reductions may also facilitate the return to human capital by lessening the burden of non-SNA work and activities including reducing child care, increasing female labor force participation rates.

  8. Public Policy Issues in Transport. Taxes and standards for energy security and greenhouse gas objectives

    Energy Technology Data Exchange (ETDEWEB)

    Eskeland, Gunnar (Cicero, Oslo (Norway))

    2008-07-01

    The direct case for fuel economy standards on a stand alone basis dies in the textbook on the basis of first principles: the fuel tax is a better targeted instrument. In practice, the fuel economy standard, is killed by the 'rebound effect'. Vehicle users will, once they have more fuel efficient vehicles, respond to lower marginal costs by increased vehicle use. If an important part of negative externalities from transport are associated with vehicle kilometres (accidents, congestion, road wear) rather than fuel consumption, the rebound effect increases negative externalities from transport. The more direct way of addressing negative externalities from transport is to increase fuel taxes, and depending on their prior level, this is our first recommendation. But higher fuel taxes often raise political resistance. The fuel efficiency of existing cars is an important way by which people have adapted to present fuel taxes, determining their resistance to increases. A higher fuel efficiency standard is an instrument that faces little political resistance and which - over time - reduces the political resistance to increased fuel taxes. In efforts to reduce the fuel intensity of an economy, this interplay between an activity's fuel intensity, like gallons per vehicle mile, and the activity level, vehicle miles travelled or transported, nicely illustrates some important empirical questions and public policy issues: i) the first best policy proposition to reduce fuel related externalities is fuel taxes. Indeed, at the right level of fuel taxes, the externalities are zero: they are internalized. ii) the part of an economy's ability to shed fuel consumption lies in increased fuel efficiency in the individual activities, and this part can be stimulated with fuel efficiency standards. The other part, the activity level, should then be addressed with fuel tax increases. iv) We speculate that it may be difficult credibly to raise expected fuel taxes more than

  9. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...... structures and the decision-making processes in the Ministry of Defence (MoD) have also adapted to the ESDP. The latter example emphasises the strength of top-down Europeanisation as a possible explanation of domestic administrative changes in member states. It is argued that Europeanisation per se...

  10. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  11. Market principles in health care and social security policy in Japan.

    Science.gov (United States)

    Akiyama, Hiroshi

    2004-01-01

    Although health care in Japan is under the management of an obligatory insurance system, it is within the framework of a capitalist economy, and has helped achieve longevity during the post-war period. However, average lifetime has been improving in western European and Asian countries that have developed later. It has also been said that higher longevity is not necessarily due only to health care but also to the enhancement of environmental health achieved by economic improvements. On the other hand, the so-called 'development' led by capitalism and the market economy, and the luxuries that sometimes can be construed as uncultured, have caused unnecessary environmental destruction and disparities in wealth. Is it too cynical to think that the extended lifespan of the advanced countries has been achieved at the expense of the epidemics, refugee problems and wars which have resulted in a reduced lifespan in developing countries? It is said that capitalism is an economic ideology that includes many contradictions and is following a path of destruction. In addition, under the name of globalization, capitalism has continuously and rapidly caused vicious cycles of corruption, which are features commonly seen in today's world. It is still common that financial failures and threats are indirectly solved by initiating wars--a method completely inimical to health care. Along with environmental factors and the logic of this market doctrine, we have been trying to reform our financially-collapsed health care system. However, we cannot count on the 'durability' of any reform conducted without some awareness of our economic mistakes. It is often said that it is only because of the existence of the economy that we have health care. However, it is more realistic to say that stable health care and social security lead to a stable economy. Health care did not collapse. It was the market economy upon which health care depended that collapsed. Therefore, one must not consider that

  12. Recovering and Framing the George I. Sanchez Legacy of Chicana/o Student and Policy Advocacy: Utilizing Data for Social Change

    Science.gov (United States)

    Rodríguez, Cristóbal

    2014-01-01

    Recovering and critically examining the pioneering scholarship and history of George I. Sanchez provides an interpretation toward a legacy of a Chicana/o student and policy advocacy framework for Chicana/o scholars to consider. The author of this work applies a critical policy theoretical analysis by Frank Fischer to develop a Chicana/o student…

  13. Informing National Food and Water Security Policy through Water Footprint Assessment: the Case of Iran

    Directory of Open Access Journals (Sweden)

    Fatemeh Karandish

    2017-10-01

    Full Text Available Iran’s focus on food self-sufficiency has led to an emphasis on increasing water volumes available for irrigation with little attention to water use efficiency, and no attention at all to the role of consumption and trade. To better understand the development of water consumption in relation to food production, consumption, and trade, we carried out the first comprehensive water footprint assessment (WFA for Iran, for the period 1980–2010, and estimated the water saving per province associated with interprovincial and international crop trade. Based on the AquaCrop model, we estimated the green and blue water footprint (WF related to both the production and consumption of 26 crops, per year and on a daily basis, for 30 provinces of Iran. We find that, in the period 1980–2010, crop production increased by 175%, the total WF of crop production by 122%, and the blue WF by 20%. The national population grew by 92%, and the crop consumption per capita by 20%, resulting in a 130% increase in total food consumption and a 110% increase in the total WF of national crop consumption. In 2010, 26% of the total water consumption in the semi-arid region served the production of crops for export to other regions within Iran (mainly cereals or abroad (mainly fruits and nuts. Iran’s interprovincial virtual water trade grew by a factor of 1.6, which was mainly due to increased interprovincial trade in cereals, nuts, and fruits. Current Iranian food and water policy could be enriched by reducing the WFs of crop production to certain benchmark levels per crop and climatic region and aligning cropping patterns to spatial differences in water availability and productivities, and by paying due attention to the increasing food consumption per capita in Iran.

  14. Prospective analysis of energy security: A practical life-cycle approach focused on renewable power generation and oriented towards policy-makers

    International Nuclear Information System (INIS)

    García-Gusano, Diego; Iribarren, Diego; Garraín, Daniel

    2017-01-01

    Highlights: • Formulation and application of the Renewable Energy Security Index (RESI). • Prospective analysis combining Energy Systems Modelling and Life Cycle Assessment. • Feasibility proven through two case studies of power generation in Spain and Norway. • Good coverage of key energy security aspects (availability, affordability, etc.). • Novel and easy-to-report index suitable for energy policy-making. - Abstract: Energy security is a wide-ranging term to encompass issues such as security of supply, reliability of infrastructures, affordability and environmental friendliness. This article develops a robust indicator – the Renewable Energy Security Index, RESI – to enrich the body of knowledge associated with the presence of renewable energy technologies within national electricity production mixes. RESI is built by combining environmental life cycle assessment and techno-economic energy systems modelling. Spain and Norway are used as illustrative case studies for the prospective analysis of power generation from an energy security standpoint. In the Spanish case, with a diversified electricity production mix and a growing presence of renewable technologies, RESI favourably “evolves” from 0.36 at present to 0.65 in 2050 in a business-as-usual scenario, reaching higher values in a highly-restricted CO_2 scenario. The Norwegian case study attains RESI values similar to 1 due to the leading role of renewable electricity (mainly hydropower) regarding both satisfaction of national demand and exportation of electricity surplus. A widespread use of RESI as a quantifiable energy security index of national power generation sectors is found to be feasible and practical for both analysts and energy policy-makers, covering a significant number of energy security aspects.

  15. The “geotoxicology” of airborne particulate matter: implications for public health, public policy, and environmental security (Invited)

    Science.gov (United States)

    Plumlee, G. S.; Morman, S. A.

    2009-12-01

    substantial public health risk. PM is at the core of diverse policy issues related to air quality, public health, and environmental security, at scales from local to global. Interdisciplinary earth and health science investigations are crucial to the development of effective policy. For example, earth science input will be key for understanding and managing potential risks associated with living on or near asbestos-containing rocks. Particularly in dry climates, a better understanding of the roles of geogenic PM versus anthropogenic PM as triggers of disease is needed in the development of appropriate air quality regulations at local to regional scales; this issue will only increase in importance in the future as human inhabitation increases in some arid regions, and as arid regions expand or shift due to climate change or human-induced stresses. Over the last decade, it has been recognized that dusts can transport contaminants and pathogens between continents. Hence, human practices and policies that influence dust generation in one continent or country may ultimately have an impact on public health, policy, and environmental security in distant downwind countries.

  16. A study on energy security and nuclear energy role

    International Nuclear Information System (INIS)

    Ujita, Hiroshi

    2011-01-01

    Energy security was a major concern for OECD governments in the early 1970s. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. Here, an energy security concept has been proposed, which is defined by time frame and space frame as well. Wide-meaning energy security is divided broadly into two categories. One is short-term (∼10 y) energy crisis, which is narrow-meaning energy security. Short-term energy crisis is further divided into contingent crisis, such as energy supply chain (sealane) interruption due to conflict, accident, terrorism, etc., and structural crisis, such as price fluctuations, supply shortage, energy demand increase in Asia, technology development stagnation, etc. The other is long-term (∼100 y) energy crisis and global energy problems, such as fossil fuel exhaustion and global warming. (author)

  17. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  18. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  19. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  20. Framing Climate Change to Account for Values

    Science.gov (United States)

    Hassol, S. J.

    2011-12-01

    Belief, trust and values are important but generally overlooked in efforts to communicate climate change. Because climate change has often been framed too narrowly as an environmental issue, it has failed to engage segments of the public for whom environmentalism is not an important value. Worse, for some of these people, environmentalism and the policies that accompany it may be seen as a threat to their core values, such as the importance of personal freedoms and the free market. Climate science educators can improve this situation by more appropriately framing climate change as an issue affecting the economy and our most basic human needs: food, water, shelter, security, health, jobs, and the safety of our families. Further, because people trust and listen to those with whom they share cultural values, climate change educators can stress the kinds of values their audiences share. They can also enlist the support of opinion leaders known for holding these values. In addition, incorporating messages about solutions to climate change and their many benefits to economic prosperity, human health, and other values is an important component of meeting this challenge. We must also recognize that local impacts are of greater concern to most people than changes that feel distant in place and time. Different audiences have different concerns, and effective educators will learn what their audiences care about and tailor their messages accordingly.