WorldWideScience

Sample records for prevent unauthorized access

  1. Detection and response to unauthorized access to a communication device

    Science.gov (United States)

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  2. 75 FR 6790 - Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and...

    Science.gov (United States)

    2010-02-10

    ... for Unauthorized Access to Customer Information and Customer Notice AGENCY: Office of Thrift... for Unauthorized Access to Customer Information and Customer Notice. OMB Number: 1550-0110. Form...) Ensure the security and confidentiality of customer records and information; (2) protect against any...

  3. 77 FR 30972 - Empowering Consumers to Prevent and Detect Billing for Unauthorized Charges (“Cramming...

    Science.gov (United States)

    2012-05-24

    .... 98-170; FCC 12-42] Empowering Consumers to Prevent and Detect Billing for Unauthorized Charges... (Commission or FCC) proposes additional rules to help consumers prevent and detect the placement of... ``cramming.'' Several commenters in this proceeding support additional measures to prevent cramming...

  4. Design of Detection and Prevention System of Unauthorized Data Sending from the Local Network

    Directory of Open Access Journals (Sweden)

    D. A. Moskvin

    2010-03-01

    Full Text Available Malware often aims at breaking confidentiality. A malicious program gets inside the local network, finds out necessary data and then illegally transfers this data to the intruder. Prevention of unauthorized data transfer requires development of a special software product, which will detect and prevent leak of information from the local network.

  5. Profiling unauthorized natural resource users for better targeting of conservation interventions.

    Science.gov (United States)

    Harrison, Mariel; Baker, Julia; Twinamatsiko, Medard; Milner-Gulland, E J

    2015-12-01

    Unauthorized use of natural resources is a key threat to many protected areas. Approaches to reducing this threat include law enforcement and integrated conservation and development (ICD) projects, but for such ICDs to be targeted effectively, it is important to understand who is illegally using which natural resources and why. The nature of unauthorized behavior makes it difficult to ascertain this information through direct questioning. Bwindi Impenetrable National Park, Uganda, has many ICD projects, including authorizing some local people to use certain nontimber forest resources from the park. However, despite over 25 years of ICD, unauthorized resource use continues. We used household surveys, indirect questioning (unmatched count technique), and focus group discussions to generate profiles of authorized and unauthorized resource users and to explore motivations for unauthorized activity. Overall, unauthorized resource use was most common among people from poor households who lived closest to the park boundary and farthest from roads and trading centers. Other motivations for unauthorized resource use included crop raiding by wild animals, inequity of revenue sharing, and lack of employment, factors that created resentment among the poorest communities. In some communities, benefits obtained from ICD were reported to be the greatest deterrents against unauthorized activity, although law enforcement ranked highest overall. Despite the sensitive nature of exploring unauthorized resource use, management-relevant insights into the profiles and motivations of unauthorized resource users can be gained from a combination of survey techniques, as adopted here. To reduce unauthorized activity at Bwindi, we suggest ICD benefit the poorest people living in remote areas and near the park boundary by providing affordable alternative sources of forest products and addressing crop raiding. To prevent resentment from driving further unauthorized activity, ICDs should be

  6. Regime of preventing, detecting and responding to unauthorized actions in Mecklenburg-Vorpommern (M-V)

    International Nuclear Information System (INIS)

    Gomoll, L.; Gegusch, M.

    2001-01-01

    Full text: In the Federal Republic of Germany (FRG) the ensuring of safety for the population is at first the task of the countries. It also imposes to minimize the radiation risk to the public. Mecklenburg-Vorpommern is a country in northeast of the FRG with coast length of 1470 km and 78 km boundary of European Community. M-V is a sparsely populated area with nearly 2 million people in 23,500 km 2 . Concurrent with law ordinances and regulations by the Federal Government in M-V a system for preventing, detecting and responding to unauthorized actions with radioactive materials is prescribed by ordinance. This regime of preventing, detecting and responding to unlawful uses of radioactive material exists independent of the national system for the accountability, control and security of the materials. 1. Responsibility - The authorities of defence - police and fire service - have to secure the place where the radioactive material is found or laid down together with a bomb. The authorities for atomic supervision are responsible for the clearing and elimination of the radioactive material, to combat illicit situation. 2. To be reachable - In cases of finding, recognizing or blackmailing of/in connection with radioactive material, the information arrives on civil way the police centre in the Internal Ministry. There upon the working staff of defence and the staff of atomic supervision/measurement group being on standby duty on call are mobilized. 3. Equipment - The policemen and firemen have dosimeter for self-safety. The measurement group of the atomic supervision uses instruments and analyser for all different radiation situations. In this kind also there is worth mentioning the connection with remote handling systems of the defuser of munitions. Last kind can be important in cases of blackmailing. 4. Whereabouts of unauthorized material - Unauthorized radioactive material with unknown owners must be storied under separate conditions. Confiscated material, which isn

  7. Computational experiment for the purpose of determining the probabilistic and temporal characteristics of information security systems against unauthorized access in automated information systems

    Directory of Open Access Journals (Sweden)

    A. V. Skrypnikov

    2017-01-01

    Full Text Available The article is devoted to the method of experimental estimation of parameters of functioning of standard information protection systems from unauthorized access, certified, widely used in organizations operating automated information systems. In the course of the experiment, statistical data were evaluated in the dynamics of the functioning of information security systems against unauthorized access in automated information systems. Registration of the parameters for the execution time of protective protection functions was carried out using a special utility called ProcessMonitor from the Sysinternals suite of utilities used to filter processes and threads. The loading of the processor and main memory of the computer with the use of special software, specially designed for performing experimental research, simulates the operation of GIS in real-world work for its intended purpose. A special software for simulating the work of a system with high load is developed in "VisualStudio 2015" within the framework of "ConsoleApplication". At the same time, the processor is loaded at a level of 50-70% and 60-80% of the operative memory. The obtained values of the time of implementation of protective functions in conditions of high utilization of resources of computer facilities for their intended purpose will allow us to assess the conflict and dynamic properties of the GIS. In the future, the obtained experimental estimates can be used to develop a model of information security in automated information systems, as well as in the formation of quality requirements (resource intensity, response time to the user's request, availability, etc.. Also, the results of the computational experiment in the future can be used to develop a software package for assessing the dynamic performance of information security systems against unauthorized access in automated information systems

  8. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  9. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. MĂŽm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  10. Modification of CAS-protocol for improvement of security web-applications from unauthorized access

    Directory of Open Access Journals (Sweden)

    Alexey I Igorevich Alexandrov

    2017-07-01

    Full Text Available Dissemination of information technologies and the expansion of their application demand constantly increasing security level for users, operating with confidential information and personal data. The problem of setting up secure user identification is probably one of the most common tasks, which occur in the process of software development. Today, despite the availability of a large amount of authentication tools, new solutions, mechanisms and technologies are being introduced regularly. Primarily, it is done to increase the security level of data protection against unauthorized access. This article describes the experience of using central user authentication service based on CAS-protocol (CAS – Central Authentication Service and free open source software, analyzing its main advantages and disadvantages and describing the possibility of its modification, which would increase security of web-based information systems from being accessed illegally. The article contains recommendations for setting a maximum time limit for users working on services, integrated with central authentication; and, analyses the research of implementing modern web-technologies while using user authentication system based on CAS-protocol. In addition, it describes the ways of CAS-server modernization for developing additional modules: a module for collecting and analyzing the use of information systems, and another one, for a user management system. Furthermore, CAS-protocol can be used at universities and other organizations for creating a unified information environment in education.

  11. Vehicle barrier with access delay

    Science.gov (United States)

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  12. Unauthorized Appropriations and Expiring Authorizations

    Science.gov (United States)

    2015-01-15

    Unauthorized FY 2015 Appropriations: Not Available Organ Donation and Recovery Improvement ActP.L. 108-216 Reimbursement of travel and subsistence...FY 2013 Appropriation Authorized: Indefinite Unauthorized FY 2015 Appropriations: Not Available Capital investment grants to support intercity ...priority rail corridor projects necessary to reduce congestion or facilitate ridership growth in intercity rail passenger transportation * FY 2013

  13. 32 CFR 776.57 - Unauthorized practice of law.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Unauthorized practice of law. 776.57 Section 776... Rules of Professional Conduct § 776.57 Unauthorized practice of law. (a) Unauthorized practice of law. A... law in a jurisdiction where doing so is prohibited by the regulations of the legal profession in that...

  14. 36 CFR 327.20 - Unauthorized structures.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Unauthorized structures. 327... CHIEF OF ENGINEERS § 327.20 Unauthorized structures. The construction, placement, or existence of any structure (including, but not limited to, roads, trails, signs, non-portable hunting stands or blinds, buoys...

  15. 36 CFR 331.21 - Unauthorized structures.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Unauthorized structures. 331... CONSERVATION AREA, KENTUCKY AND INDIANA § 331.21 Unauthorized structures. The construction, placing, or continued existence of any structure of any kind under, upon, in, or over WCA lands or waters is prohibited...

  16. 14 CFR 221.5 - Unauthorized air transportation.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Unauthorized air transportation. 221.5... PROCEEDINGS) ECONOMIC REGULATIONS TARIFFS General § 221.5 Unauthorized air transportation. Tariff publications... Department's granting authority to perform the foreign air transportation covered by such tariff publications...

  17. 36 CFR 262.10 - Impoundment and disposal of unauthorized livestock.

    Science.gov (United States)

    2010-07-01

    ... unauthorized livestock. 262.10 Section 262.10 Parks, Forests, and Public Property FOREST SERVICE, DEPARTMENT OF... unauthorized livestock. Unauthorized livestock or livestock in excess of those authorized by a grazing permit... officer determines that such livestock use is occurring, has definite knowledge of the kind of livestock...

  18. 25 CFR 700.727 - Impoundment and disposal of unauthorized livestock.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Impoundment and disposal of unauthorized livestock. 700... RELOCATION PROCEDURES New Lands Grazing § 700.727 Impoundment and disposal of unauthorized livestock. Unauthorized livestock within any range unit of the New Lands which are not removed therefrom within the...

  19. 25 CFR 168.16 - Impoundment and disposal of unauthorized livestock.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Impoundment and disposal of unauthorized livestock. 168... REGULATIONS FOR THE HOPI PARTITIONED LANDS AREA § 168.16 Impoundment and disposal of unauthorized livestock. Unauthorized livestock within any range unit of the Hopi Partitioned Lands which are not removed therefrom...

  20. 25 CFR 304.1 - Penalties for imitation or unauthorized use.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Penalties for imitation or unauthorized use. 304.1... SILVER, USE OF GOVERNMENT MARK § 304.1 Penalties for imitation or unauthorized use. The use of Government trade-marks in an unauthorized manner, or the colorable imitation of such marks, is subject to the...

  1. 37 CFR 1.939 - Unauthorized papers in inter partes reexamination.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Unauthorized papers in inter... Unauthorized papers in inter partes reexamination. (a) If an unauthorized paper is filed by any party at any...) Unless otherwise authorized, no paper shall be filed prior to the initial Office action on the merits of...

  2. Unauthorized border crossings and migrant deaths: Arizona, New Mexico, and El Paso, Texas, 2002-2003.

    Science.gov (United States)

    Sapkota, Sanjeeb; Kohl, Harold W; Gilchrist, Julie; McAuliffe, Jay; Parks, Bruce; England, Bob; Flood, Tim; Sewell, C Mack; Perrotta, Dennis; Escobedo, Miguel; Stern, Corrine E; Zane, David; Nolte, Kurt B

    2006-07-01

    We examined the major causes of and risk factors for death among migrants who died while making unauthorized border crossings into the United States from Mexico. Decedents were included in the study if (1) their remains were found between January 1, 2002, and December 31, 2003, in any US county along the 650-mi (1040-km) section of the US-Mexican border from Yuma, Ariz, to El Paso, Tex; (2) their immigration status was unauthorized; and (3) they were believed to have died during transit from Mexico to the United States. Characteristics of the decedents and causes of and risk factors for their deaths were examined. Among the 409 decedents meeting our inclusion criteria, environmental heat exposure (n=250; 61.1%) was the leading cause of death, followed by vehicle crashes (n=33; 8.1%) and drownings (n=24; 5.9%). Male decedents (n= 298; 72.8%) outnumbered female decedents (n = 105; 25.6%) nearly 3 to 1. More than half of the decedents were known to be Mexican nationals (n=235; 57.5%) and were aged 20 to 39 years (n=213; 52.0%); the nationality of 148 (36.2%) decedents was undetermined. Deaths among migrants making unauthorized crossings of the US-Mexican border are due to causes that are largely preventable. Prevention strategies should target young Mexican men, and focus on preventing them from conceiving plans to cross the border, discouraging them from using dangerous routes as crossing points, and providing search-and-rescue teams to locate lost or injured migrant crossers.

  3. Unauthorized Border Crossings and Migrant Deaths: Arizona, New Mexico, and El Paso, Texas, 2002–2003

    Science.gov (United States)

    Sapkota, Sanjeeb; Kohl, Harold W.; Gilchrist, Julie; McAuliffe, Jay; Parks, Bruce; England, Bob; Flood, Tim; Sewell, C. Mack; Perrotta, Dennis; Escobedo, Miguel; Stern, Corrine E.; Zane, David; Nolte, Kurt B.

    2006-01-01

    Objectives. We examined the major causes of and risk factors for death among migrants who died while making unauthorized border crossings into the United States from Mexico. Methods. Decedents were included in the study if (1) their remains were found between January 1, 2002, and December 31, 2003, in any US county along the 650-mi (1040-km) section of the US–Mexican border from Yuma, Ariz, to El Paso, Tex; (2) their immigration status was unauthorized; and (3) they were believed to have died during transit from Mexico to the United States. Characteristics of the decedents and causes of and risk factors for their deaths were examined. Results. Among the 409 decedents meeting our inclusion criteria, environmental heat exposure (n=250; 61.1%) was the leading cause of death, followed by vehicle crashes (n=33; 8.1%) and drownings (n=24; 5.9%). Male decedents (n= 298; 72.8%) outnumbered female decedents (n = 105; 25.6%) nearly 3 to 1. More than half of the decedents were known to be Mexican nationals (n=235; 57.5%) and were aged 20 to 39 years (n=213; 52.0%); the nationality of 148 (36.2%) decedents was undetermined. Conclusions. Deaths among migrants making unauthorized crossings of the US–Mexican border are due to causes that are largely preventable. Prevention strategies should target young Mexican men, and focus on preventing them from conceiving plans to cross the border, discouraging them from using dangerous routes as crossing points, and providing search-and-rescue teams to locate lost or injured migrant crossers. PMID:16735618

  4. Protecting unauthorized immigrant mothers improves their children's mental health.

    Science.gov (United States)

    Hainmueller, Jens; Lawrence, Duncan; Martén, Linna; Black, Bernard; Figueroa, Lucila; Hotard, Michael; Jiménez, Tomås R; Mendoza, Fernando; Rodriguez, Maria I; Swartz, Jonas J; Laitin, David D

    2017-09-08

    The United States is embroiled in a debate about whether to protect or deport its estimated 11 million unauthorized immigrants, but the fact that these immigrants are also parents to more than 4 million U.S.-born children is often overlooked. We provide causal evidence of the impact of parents' unauthorized immigration status on the health of their U.S. citizen children. The Deferred Action for Childhood Arrivals (DACA) program granted temporary protection from deportation to more than 780,000 unauthorized immigrants. We used Medicaid claims data from Oregon and exploited the quasi-random assignment of DACA eligibility among mothers with birthdates close to the DACA age qualification cutoff. Mothers' DACA eligibility significantly decreased adjustment and anxiety disorder diagnoses among their children. Parents' unauthorized status is thus a substantial barrier to normal child development and perpetuates health inequalities through the intergenerational transmission of disadvantage. Copyright © 2017 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  5. 25 CFR 11.422 - Unauthorized use of credit cards.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  6. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  7. 27 CFR 70.332 - Unauthorized use or sale of stamps.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Unauthorized use or sale....332 Unauthorized use or sale of stamps. Any person who buys, sells, offers for sale, uses, transfers... Code or in regulations made pursuant thereto, any stamp, coupon, ticket, book, or other device...

  8. Information Security Analysis: A Study to Analyze the Extent to Which Information Security Systems Can Be Utilized to Prevent Intoxicated Individuals from Driving

    Science.gov (United States)

    Pierre, Joseph D.

    2011-01-01

    Information security systems (ISS) have been designed to protect assets from damages and from unauthorized access internally as well as externally. This research is promising similar protection from ISS methods that could prevent intoxicated individuals under the influence of alcohol from driving. However, previous research has shown significant


  9. Expanding Prenatal Care to Unauthorized Immigrant Women and the Effects on Infant Health.

    Science.gov (United States)

    Swartz, Jonas J; Hainmueller, Jens; Lawrence, Duncan; Rodriguez, Maria I

    2017-11-01

    To measure the effect of access to prenatal care on unauthorized and low-income, new legal permanent resident immigrant women and their offspring. We used a difference-in-differences design that leverages the staggered rollout of Emergency Medicaid Plus by county from 2008 to 2013 as a natural experiment to estimate the effect on health service utilization for women and health outcomes for their infants. Regular Medicaid pregnancies were used as an additional control in a triple difference design. Our sample included pregnancies covered by Emergency Medicaid (35,182), Emergency Medicaid Plus (12,510), and Medicaid (166,054). After expansion of access to prenatal care, there was an increase in prenatal visits (7.2 more visits, 95% CI 6.45-7.96), receipt of adequate prenatal care (28% increased rate, CI 26-31), rates of diabetes screening (61% increased rate, CI 56-66), and fetal ultrasonograms (74% increased rate, CI 72-76). Maternal access to prenatal care was also associated with an increased number of well child visits (0.24 more visits, CI 0.07-0.41), increased rates of recommended screenings and vaccines (0.04 increased probability, CI 0.002-0.074), and reduced infant mortality (-1.01/1,000, CI -1.42 to -0.60) and rates of extremely low birth weight (less than 1,000 g) (-1.33/1,000, CI -2.44 to -0.21). Our results provide evidence of increased utilization and improved health outcomes for unauthorized immigrants and their children who are U.S. citizens after introduction of prenatal care expansion in Oregon. This study contributes to the debate around reauthorization of the Children's Health Insurance Program in 2017.

  10. Measuring attitudes towards unauthorized migration

    NARCIS (Netherlands)

    van der Veer, C.G.; Ommundsen, R.; Krumov, K.; Van Le, H.; Larsen, K.S.

    2008-01-01

    This study reports on the development and cross-national utility of a Likert type scale measuring attitudes toward unauthorized migration into a foreign country in two samples from "migrant-sending" nations. In the first phase a pool of 86 attitude statements were administered to a sample of 505

  11. 7 CFR 766.252 - Unauthorized assistance resulting from submission of false information.

    Science.gov (United States)

    2010-01-01

    ... false information. 766.252 Section 766.252 Agriculture Regulations of the Department of Agriculture... Unauthorized Assistance § 766.252 Unauthorized assistance resulting from submission of false information. A... behalf, submits information to the Agency that the borrower knows to be false. ...

  12. 28 CFR 16.51 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Security of systems of records. 16.51... Security of systems of records. (a) Each component shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent unauthorized disclosure of records, and...

  13. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.; Radaydeh, Redha Mahmoud; Alouini, Mohamed-Slim

    2013-01-01

    access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a

  14. Attitudes toward unauthorized immigrants, authorized immigrants, and refugees.

    Science.gov (United States)

    Murray, Kate E; Marx, David M

    2013-07-01

    Rates of human migration are steadily rising and have resulted in significant sociopolitical debates over how to best respond to increasing cultural diversity and changing migration patterns. Research on prejudicial attitudes toward immigrants has focused on the attitudes and beliefs that individuals in the receiving country hold about immigrants. The current study enhances this literature by examining how young adults view authorized and unauthorized immigrants and refugees. Using a between-groups design of 191 undergraduates, we found that participants consistently reported more prejudicial attitudes, greater perceived realistic threats, and greater intergroup anxiety when responding to questions about unauthorized compared with authorized immigrants. Additionally, there were differences in attitudes depending on participants' generational status, with older-generation participants reporting greater perceived realistic and symbolic threat, prejudice, and anxiety than newer-generation students. In some instances, these effects were moderated by participant race/ethnicity and whether they were evaluating authorized or unauthorized immigrants. Lastly, perceived realistic threat, symbolic threat, and intergroup anxiety were significant predictors of prejudicial attitudes. Overall, participants reported positive attitudes toward refugees and resettlement programs in the United States. These findings have implications for future research and interventions focused on immigration and prejudice toward migrant groups. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  15. 32 CFR 855.14 - Unauthorized landings.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Unauthorized landings. 855.14 Section 855.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE... file at HQ USAF/XOOBC. (4) In a foreign country, notifies the local US Defense Attache Office (USDAO...

  16. Beyond DAPA and DACA: Revisiting Legislative Reform in Light of Long-Term Trends in Unauthorized Immigration to the United States

    Directory of Open Access Journals (Sweden)

    Robert Warren

    2015-02-01

    exceeded the number who entered across the southern land border without inspection (EWIs in each year from 2008 to 2012.While the CMS estimates are based on sample data and assumptions that are subject to error, these trends are consistent with the best empirical information available.In November 2014 the Obama Administration announced an unprecedented set of executive action initiatives. At this writing, the Deferred Action for Parental Accountability (DAPA program and the expanded Deferred Action for Childhood Arrivals (DACA program, which would provide work authorization and temporary reprieve from removal to eligible persons, have been preliminarily enjoined. The temporary injunction, which the US Department of Justice plans to appeal to the Fifth Circuit Court of Appeals, comes in response to a legal challenge to the two programs by 26 states under Article II, section 3 of the US Constitution which requires the president to “take Care that the Laws be faithfully executed,” and under the Administrative Procedure Act (APA. In addition, the Republican majorities of the 114th Congress have vowed to prevent the implementation of these programs. However, the administration has expressed confidence that it will ultimately prevail in court and in its battle with Congress over these programs. Meanwhile, nongovernmental organizations (NGOs, community-based organizations (CBOs, and others continue to plan intensively for the DAPA and DACA programs, as well as for other executive action initiatives.This paper provides estimates of those who are potentially eligible for DAPA and DACA. However, it also looks beyond DAPA and DACA to make the case for broad legislative reform in light of long-term trends in unauthorized migration to the United States and the unauthorized resident population. In particular, it argues that substantial declines in the unauthorized population—a goal shared by partisans on both sides of the immigration debate—will require reform of the legal

  17. Interlaboratory validation data on real-time polymerase chain reaction detection for unauthorized genetically modified papaya line PRSV-YK

    Directory of Open Access Journals (Sweden)

    Kosuke Nakamura

    2016-06-01

    Real-time polymerase chain reaction (PCR detection method for unauthorized genetically modified (GM papaya (Carica papaya L. line PRSV-YK (PRSV-YK detection method was developed using whole genome sequence data (DDBJ Sequenced Read Archive under accession No. PRJDB3976. Interlaboratory validation datasets for PRSV-YK detection method were provided. Data indicating homogeneity of samples prepared for interlaboratory validation were included. Specificity and sensitivity test data for PRSV-YK detection method were also provided.

  18. Unauthorized Mexican workers in the 1990 Los Angeles County labour force.

    Science.gov (United States)

    Marcelli, E A; Heer, D M

    1997-01-01

    "By analysing how unauthorized Mexicans compare with seven other ethno-racial groups in Los Angeles County, separately and collectively, by educational attainment and time spent in the U.S., we find that unauthorized Mexicans had relatively fewer years of formal education (either in the U.S. or in Mexico) and had been in the U.S. a relatively fewer number of years than in-migrants of other ethno-racial backgrounds in 1990. These findings are then used as proxies to compare the human capital endowments of different ethno-racial groups. We next estimate the number of unauthorized Mexicans by occupation, industry and class of worker, and compare these distributions with the total labour force and with the other ethno-racial groups in Los Angeles County.... Results show that amounts of human capital are positively related to the kinds of occupations filled." (SUMMARY IN FRE AND SPA) excerpt

  19. Prevention literacy: community-based advocacy for access and ownership of the HIV prevention toolkit.

    Science.gov (United States)

    Parker, Richard G; Perez-Brumer, Amaya; Garcia, Jonathan; Gavigan, Kelly; Ramirez, Ana; Milnor, Jack; Terto, Veriano

    2016-01-01

    Critical technological advances have yielded a toolkit of HIV prevention strategies. This literature review sought to provide contextual and historical reflection needed to bridge the conceptual gap between clinical efficacy and community effectiveness (i.e. knowledge and usage) of existing HIV prevention options, especially in resource-poor settings. Between January 2015 and October 2015, we reviewed scholarly and grey literatures to define treatment literacy and health literacy and assess the current need for literacy related to HIV prevention. The review included searches in electronic databases including MEDLINE, PsycINFO, PubMed, and Google Scholar. Permutations of the following search terms were used: "treatment literacy," "treatment education," "health literacy," and "prevention literacy." Through an iterative process of analyses and searches, titles and/or abstracts and reference lists of retrieved articles were reviewed for additional articles, and historical content analyses of grey literature and websites were additionally conducted. Treatment literacy was a well-established concept developed in the global South, which was later partially adopted by international agencies such as the World Health Organization. Treatment literacy emerged as more effective antiretroviral therapies became available. Developed from popular pedagogy and grassroots efforts during an intense struggle for treatment access, treatment literacy addressed the need to extend access to underserved communities and low-income settings that might otherwise be excluded from access. In contrast, prevention literacy is absent in the recent surge of new biomedical prevention strategies; prevention literacy was scarcely referenced and undertheorized in the available literature. Prevention efforts today include multimodal techniques, which jointly comprise a toolkit of biomedical, behavioural, and structural/environmental approaches. However, linkages to community advocacy and mobilization

  20. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  1. 48 CFR 1501.602-3 - Ratification of unauthorized commitments.

    Science.gov (United States)

    2010-10-01

    ... to present its claim to the General Accounting Office in accordance with the instructions contained... commitments, whether oral or written and without regard to dollar value. Examples of unauthorized commitments...

  2. Mercury Toxicity Following Unauthorized Siddha Medicine Intake - A Mimicker of Acquired Neuromyotonia - Report of 32 Cases.

    Science.gov (United States)

    Gnanashanmugam, G; Balakrishnan, R; Somasundaram, S P; Parimalam, N; Rajmohan, P; Pranesh, M B

    2018-01-01

    Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. This is a retrospective study to analyze inpatients in a tertiary care center, admitted with mercury toxicity following Siddha medicine intake from August 2012 to October 2016. We analyzed the clinical features, laboratory data including mercury, arsenic and lead levels in blood, and serum voltage-gated potassium channels (VGKC)-CASPR2 Ab in selected patients. Thirty-two patients who had high blood mercury levels following Siddha medicine intake were included in the study. All patients (100%) had severe intractable neuropathic pain predominantly involving lower limbs. Twenty-six (81.25%) patients had fasciculations and myokymia. Fifteen patients (46.86%) had autonomic dysfunction (postural hypotension and resting tachycardia). Nine (28.12%) patients had encephalopathic features such as dullness, apathy, drowsiness, or delirium. Anti-VGKC Ab was positive in 12 patients with myokymia. All the patients in the study consumed Siddha medicines obtained from unauthorized dealers. Mercury toxicity following Siddha medicine intake closely mimics acquired neuromyotonia; severe intolerable neuropathic pain is the hallmark feature; Positive VGKC-CASPR2 antibody in some patients must be due to triggered autoimmunity secondary to mercury toxicity due to Siddha medicine intake. The government should establish licensing system to prevent distribution of unauthorized Siddha medicines.

  3. Mercury toxicity following unauthorized siddha medicine intake – A mimicker of acquired neuromyotonia - Report of 32 cases

    Directory of Open Access Journals (Sweden)

    G Gnanashanmugam

    2018-01-01

    Full Text Available Context: Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. Subjects and Methods: This is a retrospective study to analyze inpatients in a tertiary care center, admitted with mercury toxicity following Siddha medicine intake from August 2012 to October 2016. We analyzed the clinical features, laboratory data including mercury, arsenic and lead levels in blood, and serum voltage-gated potassium channels (VGKC-CASPR2 Ab in selected patients. Results: Thirty-two patients who had high blood mercury levels following Siddha medicine intake were included in the study. All patients (100% had severe intractable neuropathic pain predominantly involving lower limbs. Twenty-six (81.25% patients had fasciculations and myokymia. Fifteen patients (46.86% had autonomic dysfunction (postural hypotension and resting tachycardia. Nine (28.12% patients had encephalopathic features such as dullness, apathy, drowsiness, or delirium. Anti-VGKC Ab was positive in 12 patients with myokymia. All the patients in the study consumed Siddha medicines obtained from unauthorized dealers. Conclusions: Mercury toxicity following Siddha medicine intake closely mimics acquired neuromyotonia; severe intolerable neuropathic pain is the hallmark feature; Positive VGKC-CASPR2 antibody in some patients must be due to triggered autoimmunity secondary to mercury toxicity due to Siddha medicine intake. The government should establish licensing system to prevent distribution of unauthorized Siddha medicines.

  4. Mercury Toxicity Following Unauthorized Siddha Medicine Intake – A Mimicker of Acquired Neuromyotonia - Report of 32 Cases

    Science.gov (United States)

    Gnanashanmugam, G.; Balakrishnan, R.; Somasundaram, S. P.; Parimalam, N.; Rajmohan, P.; Pranesh, M. B.

    2018-01-01

    Context: Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. Subjects and Methods: This is a retrospective study to analyze inpatients in a tertiary care center, admitted with mercury toxicity following Siddha medicine intake from August 2012 to October 2016. We analyzed the clinical features, laboratory data including mercury, arsenic and lead levels in blood, and serum voltage-gated potassium channels (VGKC)-CASPR2 Ab in selected patients. Results: Thirty-two patients who had high blood mercury levels following Siddha medicine intake were included in the study. All patients (100%) had severe intractable neuropathic pain predominantly involving lower limbs. Twenty-six (81.25%) patients had fasciculations and myokymia. Fifteen patients (46.86%) had autonomic dysfunction (postural hypotension and resting tachycardia). Nine (28.12%) patients had encephalopathic features such as dullness, apathy, drowsiness, or delirium. Anti-VGKC Ab was positive in 12 patients with myokymia. All the patients in the study consumed Siddha medicines obtained from unauthorized dealers. Conclusions: Mercury toxicity following Siddha medicine intake closely mimics acquired neuromyotonia; severe intolerable neuropathic pain is the hallmark feature; Positive VGKC-CASPR2 antibody in some patients must be due to triggered autoimmunity secondary to mercury toxicity due to Siddha medicine intake. The government should establish licensing system to prevent distribution of unauthorized Siddha medicines. PMID:29720798

  5. Youth suicide prevention: does access to care matter?

    Science.gov (United States)

    Campo, John V

    2009-10-01

    Recent increases in adolescent suicide rates after a decade of decline highlight the relevance of pediatric suicide prevention. Existing strategies to intervene with youth at risk for suicide are largely based on the premise that access to effective services is of critical importance. This review aims to examine the relationship between youth suicide and access to care. Promising reductions in suicidal thinking and behavior have been associated with the application of manualized psychotherapies, collaborative interventions in primary care, lithium for mood-disordered adults, and clozapine in schizophrenia. Suicide rates correlate inversely with indices of care access across the lifespan, including antidepressant prescription rates. Suicide is a preventable cause of death, and any public health relevant effort to prevent youth suicide must include improving access to effective care for at-risk youth as a strategy. Education and training of professionals and consumers, the integration of mental health services in primary care, and the use of novel technologies to track and maintain contact with at-risk youth are worthy of study. Additional research on the relationship between specific treatments, especially antidepressants, and youth suicide risk reduction is desperately needed.

  6. Cannabis for therapeutic purposes: patient characteristics, access, and reasons for use.

    Science.gov (United States)

    Walsh, Zach; Callaway, Robert; Belle-Isle, Lynne; Capler, Rielle; Kay, Robert; Lucas, Philippe; Holtzman, Susan

    2013-11-01

    The authorized and unauthorized use of cannabis for therapeutic purposes (CTP) has increased dramatically in recent years, and physicians have called for further research to better clarify the parameters of effective and appropriate use. We report findings from a large cross-sectional study of the use of CTP in Canada and compare use across medical conditions and across authorized and unauthorized users. We examined cannabis use history, medical conditions and symptoms, patterns of current use of CTP, modes of access and perceived effectiveness among 628 self-selected Canadians consumers of CTP. Participants were recruited from medical cannabis dispensaries and from organizations that assist users of CTP. Patients reported using cannabis to treat multiple symptoms, with sleep, pain, and anxiety being the most common. Cannabis was perceived to provide effective symptoms relief across medical conditions. Patterns of use were also consistent across medical conditions. Notable differences were observed with regard to modes of access. Across medical conditions respondents reported using cannabis to effectively address diverse symptoms. Results indicate a substantial disconnect between the therapeutic use of cannabis and research on the risks and benefits of such use; particularly with regard to the anxiolytic and sedative use of cannabis. Authorized and unauthorized users exhibited few meaningful differences with regard to medical conditions and patterns of use, but faced substantial differences regarding access. Copyright © 2013 Elsevier B.V. All rights reserved.

  7. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  8. Detection, Localization, and Tracking of Unauthorized UAS and Jammers

    Science.gov (United States)

    Guvenc, Ismail; Ozdemir, Ozgur; Yapici, Yavuz; Mehrpouyan, Hani; Matolak, David

    2017-01-01

    Small unmanned aircraft systems (UASs) are expected to take major roles in future smart cities, for example, by delivering goods and merchandise, potentially serving as mobile hot spots for broadband wireless access, and maintaining surveillance and security. Although they can be used for the betterment of the society, they can also be used by malicious entities to conduct physical and cyber attacks to infrastructure, private/public property, and people. Even for legitimate use-cases of small UASs, air traffic management (ATM) for UASs becomes of critical importance for maintaining safe and collusion-free operation. Therefore, various ways to detect, track, and interdict potentially unauthorized drones carries critical importance for surveillance and ATM applications. In this paper, we will review techniques that rely on ambient radio frequency signals (emitted from UASs), radars, acoustic sensors, and computer vision techniques for detection of malicious UASs. We will present some early experimental and simulation results on radar-based range estimation of UASs, and receding horizon tracking of UASs. Subsequently, we will overview common techniques that are considered for interdiction of UASs.

  9. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  10. Nanopore sequencing technology: a new route for the fast detection of unauthorized GMO.

    Science.gov (United States)

    Fraiture, Marie-Alice; Saltykova, Assia; Hoffman, Stefan; Winand, Raf; Deforce, Dieter; Vanneste, Kevin; De Keersmaecker, Sigrid C J; Roosens, Nancy H C

    2018-05-21

    In order to strengthen the current genetically modified organism (GMO) detection system for unauthorized GMO, we have recently developed a new workflow based on DNA walking to amplify unknown sequences surrounding a known DNA region. This DNA walking is performed on transgenic elements, commonly found in GMO, that were earlier detected by real-time PCR (qPCR) screening. Previously, we have demonstrated the ability of this approach to detect unauthorized GMO via the identification of unique transgene flanking regions and the unnatural associations of elements from the transgenic cassette. In the present study, we investigate the feasibility to integrate the described workflow with the MinION Next-Generation-Sequencing (NGS). The MinION sequencing platform can provide long read-lengths and deal with heterogenic DNA libraries, allowing for rapid and efficient delivery of sequences of interest. In addition, the ability of this NGS platform to characterize unauthorized and unknown GMO without any a priori knowledge has been assessed.

  11. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  12. 48 CFR 2901.602-3 - Ratification of unauthorized commitments.

    Science.gov (United States)

    2010-10-01

    ... preclude further unauthorized commitments (e.g., ethics, purchase card, or administrative procedures...) Steps to be followed Below the micro-purchase threshold Head of the Contracting Office 1 through 5 & 7... placed on notice by the contracting officer, in writing, that the purchase may be inappropriate because...

  13. Complications of an implantable venous access port: Prevention and treatment

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Tae Seok; Song, Myung Gyu [Dept. of Radiology, Guro Hospital, Korea University College of Medicine, Seoul (Korea, Republic of); Cha, In Ho [Dept. Radiology, Chungang University Hospital, Chungang University College of Medicine, Seoul (Korea, Republic of)

    2016-11-15

    Placement of an implantable venous access port (IVAP) is a popular procedure for repeated and intermittent chemotherapy in patients with malignancy. In this article, we present various IVAP related complications. In addition, we review the technical tips to prevent and manage the complications. It is important that the operator should keep the mechanism of the complications in mind, perform a careful procedure for prevention, and manage the complication properly and immediately in case of its development for safety and satisfaction of the patients Complications of an implantable venous access port: Prevention and treatment.

  14. The Effects of DACAmentation: The Impact of Deferred Action for Childhood Arrivals on Unauthorized Immigrants

    OpenAIRE

    Pope, Nolan G.

    2016-01-01

    As the largest immigration policy in 25 years, Deferred Action for Childhood Arrivals (DACA) made deportation relief and work authorization available to 1.7 million unauthorized immigrants. This paper looks at how DACA affects DACA-eligible immigrants' labor market outcomes. I use a difference-in-differences design for unauthorized immigrants near the criteria cutoffs for DACA eligibility. I find DACA increases the likelihood of working by increasing labor force participation and decreasing t...

  15. How Can We Better Detect Unauthorized GMOs in Food and Feed Chains?

    Science.gov (United States)

    Fraiture, Marie-Alice; Herman, Philippe; De Loose, Marc; Debode, Frédéric; Roosens, Nancy H

    2017-06-01

    Current GMO detection systems have limited abilities to detect unauthorized genetically modified organisms (GMOs). Here, we propose a new workflow, based on next-generation sequencing (NGS) technology, to overcome this problem. In providing information about DNA sequences, this high-throughput workflow can distinguish authorized and unauthorized GMOs by strengthening the tools commonly used by enforcement laboratories with the help of NGS technology. In addition, thanks to its massive sequencing capacity, this workflow could be used to monitor GMOs present in the food and feed chain. In view of its potential implementation by enforcement laboratories, we discuss this innovative approach, its current limitations, and its sustainability of use over time. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. 8 CFR 274a.3 - Continuing employment of unauthorized aliens.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Continuing employment of unauthorized aliens. 274a.3 Section 274a.3 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROL OF EMPLOYMENT OF ALIENS Employer Requirements § 274a.3 Continuing employment of...

  17. Violence Prevention, Access to Justice, and Economic ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Solutions to empower women, reduce violence Researchers will identify and analyze interventions in Colombia, Guatemala, Mexico, and Peru. They will assess the impact of efforts on: -preventing violence against women -reducing victimization -improving women's access to justice The results will guide governments, civil ...

  18. 78 FR 16045 - Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders

    Science.gov (United States)

    2013-03-13

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2013-0019; Notice No. 13-03] Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA), DOT. ACTION: Safety Advisory...

  19. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  20. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  1. Education Information Security: Improvements Made But Control Weaknesses Remain

    National Research Council Canada - National Science Library

    2001-01-01

    To assess the effectiveness of information system general controls in place to prevent unauthorized access, disclosure, and disruption to Education's primary accounting and payment system (i.e., EDCAPS...

  2. Detecting un-authorized genetically modified organisms (GMOs) and derived materials.

    Science.gov (United States)

    Holst-Jensen, Arne; Bertheau, Yves; de Loose, Marc; Grohmann, Lutz; Hamels, Sandrine; Hougs, Lotte; Morisset, Dany; Pecoraro, Sven; Pla, Maria; Van den Bulcke, Marc; Wulff, Doerte

    2012-01-01

    Genetically modified plants, in the following referred to as genetically modified organisms or GMOs, have been commercially grown for almost two decades. In 2010 approximately 10% of the total global crop acreage was planted with GMOs (James, 2011). More than 30 countries have been growing commercial GMOs, and many more have performed field trials. Although the majority of commercial GMOs both in terms of acreage and specific events belong to the four species: soybean, maize, cotton and rapeseed, there are another 20+ species where GMOs are commercialized or in the pipeline for commercialization. The number of GMOs cultivated in field trials or for commercial production has constantly increased during this time period. So have the number of species, the number of countries involved, the diversity of novel (added) genetic elements and the global trade. All of these factors contribute to the increasing complexity of detecting and correctly identifying GMO derived material. Many jurisdictions, including the European Union (EU), legally distinguish between authorized (and therefore legal) and un-authorized (and therefore illegal) GMOs. Information about the developments, field trials, authorizations, cultivation, trade and observations made in the official GMO control laboratories in different countries around the world is often limited, despite several attempts such as the OECD BioTrack for voluntary dissemination of data. This lack of information inevitably makes it challenging to detect and identify GMOs, especially the un-authorized GMOs. The present paper reviews the state of the art technologies and approaches in light of coverage, practicability, sensitivity and limitations. Emphasis is put on exemplifying practical detection of un-authorized GMOs. Although this paper has a European (EU) bias when examples are given, the contents have global relevance. Copyright © 2012 Elsevier Inc. All rights reserved.

  3. 31 CFR 601.5 - Penalty for unauthorized control or possession.

    Science.gov (United States)

    2010-07-01

    ... CURRENCY AND OTHER SECURITIES § 601.5 Penalty for unauthorized control or possession. The Secretary of the... heretofore adopted for the printing of paper currency or other obligations or securities of the United States, is and will be subject to the provisions of 18 U.S.C. 474A which provides, in part, that it is...

  4. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2008

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2008 by period of entry, region and country of...

  5. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2007

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2007 by period of entry, region and country of...

  6. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2012

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2012 by period of entry, region and...

  7. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2009

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2009 by period of entry, region and country of...

  8. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2006

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2006 by period of entry, region and country of...

  9. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2011

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2011 by period of entry, region and...

  10. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2010

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2010 by period of entry, region and...

  11. Piracy among Undergraduate and Graduate Students: Influences on Unauthorized Book Copies

    Science.gov (United States)

    Dionisio, Pedro; Leal, Carmo; Pereira, Helia; Salgueiro, Maria Fatima

    2013-01-01

    The unauthorized duplication of books through photocopies and Internet downloads, especially in the case of academic books, is currently one of the most challenging problems facing the publishing industry. Photocopying has become widespread with these texts, apparently without major ethical concerns on the part of students. The purpose of this


  12. Practitioner Perceptions of Patients Wearing Decorative Contact Lenses Purchased Through Unauthorized Sellers.

    Science.gov (United States)

    Gaiser, Hilary; Ho, Connie; Janier, Nicole; Wee, Amy; Johnson, Catherine; Watanabe, Ronald

    2017-03-01

    To describe practitioner experiences regarding ocular complications in patients wearing decorative contact lenses, and to investigate the compliance of unauthorized distributors of decorative contact lenses to current Food and Drug Administration (FDA) and Federal Trade Commission (FTC) regulations. Also, to provide data to support a more targeted public health approach to reducing the incidence of illegal contact lens sales and associated ocular complications. An institutional review board-approved online survey was distributed through mass email to a list of 98 optometrists in the Boston, MA area. Concurrently, an empirical evaluation of independent, online decorative contact lens sellers who were not associated with FDA-approved contact lens manufacturers was performed to determine their adherence to FDA and FTC guidelines. The first 18 noncoincidental websites that resulted from a Google search for "costume contact lens sellers" and "cosmetic contact lens sellers" were examined as to the brands and parameters of lenses being sold, whether or not a valid prescription was required or verified, and if consumer education was provided. Twenty-two optometrists completed the online survey. Seventy-seven percent of respondents reported having patients with complications from decorative contact lenses that were purchased both legally and illegally. The most common age group for complications was 18 to 25 years (61%). One third of complications were seen in first-time lens wearers, half of whom never received proper care instructions or were unaware that care instructions existed. One quarter of the lenses were purchased illegally with unlicensed stores being the most common place of purchase. Of the 18 online sites examined, 72% of sellers failed to adhere to FTC and FDA regulations. A significant number of individuals who obtain contact lenses illegally from unauthorized sources are young adults. Most unauthorized sellers reviewed did not adhere to the proper protocol

  13. HEALTH INFORMATION TECHNOLOGY IN EXCHANGE OF HEALTH INFORMATION

    Directory of Open Access Journals (Sweden)

    Jordan Deliversky

    2016-06-01

    Full Text Available Health information technology involves the exchange of health information in an electronic environment. Data protection is comprised of many elements, including where the data resides, how it is used, and who has access to it. Individually identifiable health information should be protected with reasonable administrative, technical, and physical safeguards to ensure its confidentiality, integrity, and availability and to prevent unauthorized access, use, or disclosure. Health records are among the most sensitive records available containing information concerning an individual. The unauthorized disclosure of a medical condition or diagnosis could negatively impact an individual’s personal and professional life.

  14. 21 CFR 1311.205 - Pharmacy application requirements.

    Science.gov (United States)

    2010-04-01

    ... memory to prevent the unauthorized access to, or use of, the private key. (v) The pharmacy application... prescription data into a database or spreadsheet that is readable and sortable. (13) The pharmacy application...

  15. Framing migration and the process of crimmigration: A systematic analysis of the media representation of unauthorized immigrants in the Netherlands.

    Science.gov (United States)

    Brouwer, Jelmer; van der Woude, Maartje; van der Leun, Joanne

    2017-01-01

    In this article we examine whether the proposal to criminalize illegal stay in the Netherlands was preceded by increased negative media attention for unauthorized immigrants. Using a corpus linguistics approach, we carried out a quantitative discourse analysis of all newspaper articles on unauthorized migrants over a period of 15 years. Our results show that the amount of media coverage actually strongly decreased in the years before the proposal, and this coverage was moreover increasingly less negative. This study thus nuances the somewhat popular belief that unauthorized migrants are increasingly portrayed in negative ways and shows that the framing of migrants as criminals is a more diffuse process in which the media seem to follow rather than fuel politics and policy.

  16. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  17. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    Science.gov (United States)

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and


  18. In-State-Tuition for Unauthorized Residents: Teaching a Person to Fish

    Science.gov (United States)

    Dryden, Joe; Martinez, Cristina

    2014-01-01

    Illegal immigration has become one of the most important issues we face as a nation, and as greater attention is focused on the sociological and economic impact of illegal immigration, policies related to in-state-tuition for unauthorized residents are in a state of flux. Since 2005, the number of states offering in-state-tuition for unauthorized


  19. Facial and Periorbital Cellulitis due to Skin Peeling with Jet Stream by an Unauthorized Person.

    Science.gov (United States)

    Kaptanoglu, Asli Feride; Mullaaziz, Didem; Suer, Kaya

    2014-01-01

    Technologies and devices for cosmetic procedures are developing with each passing day. However, increased and unauthorized use of such emerging technologies may also lead to increases in unexpected results and complications as well. Here, we report a case of facial cellulitis after a "beauty parlor" session of skin cleaning with jet stream peeling device in 19-year old female patient for the first time. Complications due to improper and unauthorized use of jet stream peeling devices may also cause doubts about the safety and impair the reputation of the technology as well. In order to avoid irreversible complications, local authorities should follow the technology and update the regulations where the dermatologists should take an active role.

  20. 13 CFR 102.33 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...

  1. 49 CFR 1546.205 - Acceptance and screening of cargo.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance and screening of cargo. 1546.205... SECURITY Operations § 1546.205 Acceptance and screening of cargo. (a) Preventing or deterring the carriage... aircraft. (2) Prevents access by unauthorized persons other than an authorized foreign air carrier employee...

  2. Exploring the Meaning and Paths of Advocacy for Undocumented Students' Access to Education

    Science.gov (United States)

    Crawford, Emily R.; Arnold, Noelle Witherspoon

    2016-01-01

    There is widespread national debate over how to address and advocate for undocumented immigrants in the United States. Education is key to the economic, occupational, and social mobility of young unauthorized immigrants, but policies and practices can hinder or open their access to education. Educators pursue a range of activities to support


  3. Unauthorized Immigration to the United States: Annual Estimates and Components of Change, by State, 1990 to 2010

    Science.gov (United States)

    Warren, Robert; Warren, John Robert

    2013-01-01

    We describe a method for producing annual estimates of the unauthorized immigrant population in the United Sates and components of population change, for each state and D.C., for 1990 to 2010. We quantify a sharp drop in the number of unauthorized immigrants arriving since 2000, and we demonstrate the role of departures from the population (emigration, adjustment to legal status, removal by the Department of Homeland Security (DHS), and deaths) in reducing population growth from one million in 2000 to population losses in 2008 and 2009. The number arriving in the U.S. peaked at more than one million in 1999 to 2001, and then declined rapidly through 2009. We provide evidence that population growth stopped after 2007 primarily because entries declined and not because emigration increased during the economic crisis. Our estimates of the total unauthorized immigrant population in the U.S. and in the top ten states are comparable to those produced by DHS and the Pew Hispanic Center. For the remaining states and D.C., our data and methods produce estimates with smaller ranges of sampling error. PMID:23956482

  4. Unauthorized Immigration to the United States: Annual Estimates and Components of Change, by State, 1990 to 2010.

    Science.gov (United States)

    Warren, Robert; Warren, John Robert

    2013-06-01

    We describe a method for producing annual estimates of the unauthorized immigrant population in the United Sates and components of population change, for each state and D.C., for 1990 to 2010. We quantify a sharp drop in the number of unauthorized immigrants arriving since 2000, and we demonstrate the role of departures from the population (emigration, adjustment to legal status, removal by the Department of Homeland Security (DHS), and deaths) in reducing population growth from one million in 2000 to population losses in 2008 and 2009. The number arriving in the U.S. peaked at more than one million in 1999 to 2001, and then declined rapidly through 2009. We provide evidence that population growth stopped after 2007 primarily because entries declined and not because emigration increased during the economic crisis. Our estimates of the total unauthorized immigrant population in the U.S. and in the top ten states are comparable to those produced by DHS and the Pew Hispanic Center. For the remaining states and D.C., our data and methods produce estimates with smaller ranges of sampling error.

  5. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    Science.gov (United States)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  6. Development of unauthorized airborne emission source identification procedure

    Science.gov (United States)

    Shtripling, L. O.; Bazhenov, V. V.; Varakina, N. S.; Kupriyanova, N. P.

    2018-01-01

    The paper presents the procedure for searching sources of unauthorized airborne emissions. To make reasonable regulation decisions on airborne pollutant emissions and to ensure the environmental safety of population, the procedure provides for the determination of a pollutant mass emission value from the source being the cause of high pollution level and the search of a previously unrecognized contamination source in a specified area. To determine the true value of mass emission from the source, the minimum of the mean-root-square mismatch criterion between the computed and measured pollutant concentration in the given location is used.

  7. Access to Employee Wellness Programs and Use of Preventive Care Services Among U.S. Adults.

    Science.gov (United States)

    Isehunwa, Oluwaseyi O; Carlton, Erik L; Wang, Yang; Jiang, Yu; Kedia, Satish; Chang, Cyril F; Fijabi, Daniel; Bhuyan, Soumitra S

    2017-12-01

    There is little research at the national level on access to employee wellness programs and the use of preventive care services. This study examined the use of seven preventive care services among U.S working adults with access to employee wellness programs. The study population comprised 17,699 working adults aged ≄18 years, obtained from the 2015 National Health Interview Survey. Multivariate logistic regression models examined the relationship between access to employee wellness programs and use of seven preventive care services: influenza vaccination, blood pressure check, diabetes check, cholesterol check, Pap smear test, mammogram, and colon cancer screening. Data analysis began in Fall 2016. Overall, 46.6% of working adults reported having access to employee wellness programs in 2015. Working adults with access to employee wellness programs had higher odds of receiving influenza vaccination (OR=1.57, 95% CI=1.43, 1.72, pemployee wellness programs and the use of Pap smear test and colon cancer screening services. Using a nationally representative sample of individuals, this study found a positive association between access to employee wellness programs and the use of preventive care services. The results support favorable policies to encourage implementing wellness programs in all worksites, especially those with employees. Copyright © 2017 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  8. Facial and Periorbital Cellulitis due to Skin Peeling with Jet Stream by an Unauthorized Person

    Directory of Open Access Journals (Sweden)

    Asli Feride Kaptanoglu

    2014-01-01

    Full Text Available Technologies and devices for cosmetic procedures are developing with each passing day. However, increased and unauthorized use of such emerging technologies may also lead to increases in unexpected results and complications as well. Here, we report a case of facial cellulitis after a “beauty parlor” session of skin cleaning with jet stream peeling device in 19-year old female patient for the first time. Complications due to improper and unauthorized use of jet stream peeling devices may also cause doubts about the safety and impair the reputation of the technology as well. In order to avoid irreversible complications, local authorities should follow the technology and update the regulations where the dermatologists should take an active role.

  9. 25 CFR 542.12 - What are the minimum internal control standards for table games?

    Science.gov (United States)

    2010-04-01

    ... this section, if a gaming operation uses plastic cards (not plastic-coated cards), the cards may be... distribution, use, and control. Personnel from the cashier or pit departments shall have no access to the... cards and dice shall be maintained in a secure location to prevent unauthorized access and to reduce the...

  10. Elvis is returning to the building: understanding a decline in unauthorized file sharing

    NARCIS (Netherlands)

    Poort, J.; Weda, J.

    2015-01-01

    A set of representative consumer surveys shows that in the Netherlands unauthorized file sharing of music has declined substantially between 2008 and 2012. It decreased slightly for games, but almost doubled for films and TV series. Overall, file sharing dropped from 38% to 27% of the population.

  11. 36 CFR 261.22 - Unauthorized use of “Smokey Bear” and “Woodsy Owl” symbol.

    Science.gov (United States)

    2010-07-01

    ..., DEPARTMENT OF AGRICULTURE PROHIBITIONS General Prohibitions § 261.22 Unauthorized use of “Smokey Bear” and “Woodsy Owl” symbol. (a) Manufacture, importation, reproduction, or use of “Smokey Bear” except as...

  12. Access to information and decision making on teenage pregnancy prevention by females in Tshwane

    Directory of Open Access Journals (Sweden)

    J.P.F. Masemola-Yende

    2015-11-01

    Full Text Available Background: The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. Objective: To explore and describe access to information and decision making on teenage pregnancy prevention by females using a primary healthcare clinic in Tshwane, South Africa. Method: In this study, the researchers used a descriptive qualitative and exploratory research design to explore and describe the verbal reports regarding prevention of teenage pregnancy by females using a primary healthcare clinic in Tshwane, South Africa. Face-to-face semistructured interviews were conducted with 15 female participants aged between 15 and 26, who had been pregnant once or more during their teens. Results: Two themes emerged, namely, access to information and decision making by female teenagers. Five categories that emerged were: access to information on pregnancy prevention; ignoring of provided information; the use of alternative medicine with hormonal contraception; personal reasons for use and non-use of contraception; and decisions made by teenagers to not fall pregnant. Females in this study fell pregnant in their teens, even though they had access to information. Conclusion: Given the complexity of this problem, female teenagers should use their families as primary sources of information for reproductive health promotion and educational institutions should build on this to aid the prevention of teenage pregnancy.

  13. Access to information and decision making on teenage pregnancy prevention by females in Tshwane.

    Science.gov (United States)

    Masemola-Yende, J P F; Mataboge, Sanah M

    2015-11-05

    The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. To explore and describe access to information and decision making on teenage pregnancy prevention by females using a primary healthcare clinic in Tshwane, South Africa. In this study, the researchers used a descriptive qualitative and exploratory research design to explore and describe the verbal reports regarding prevention of teenage pregnancy by females using a primary healthcare clinic in Tshwane, South Africa. Face-to-face semistructured interviews were conducted with 15 female participants aged between 15 and 26, who had been pregnant once or more during their teens. Two themes emerged, namely, access to information and decision making by female teenagers. Five categories that emerged were: access to information on pregnancy prevention; ignoring of provided information; the use of alternative medicine with hormonal contraception; personal reasons for use and non-use of contraception; and decisions made by teenagers to not fall pregnant. Females in this study fell pregnant in their teens, even though they had access to information. Given the complexity of this problem, female teenagers should use their families as primary sources of information for reproductive health promotion and educational institutions should build on this to aid the prevention of teenage pregnancy.

  14. Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools

    Science.gov (United States)

    Fleming, Antoine

    2017-01-01

    Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are


  15. The Probability of Detection in the Telephone Line of Device of the Unauthorized Removal of Information

    Directory of Open Access Journals (Sweden)

    I. V. Svintsov

    2011-06-01

    Full Text Available The article discusses the theory of quantitative description of the possible presence in the telephone line devices unauthorized removal of information, investigated with the help of probability theory.

  16. Inspection report of unauthorized possession and use of unsealed americium-241 and subsequent confiscation, J.C. Haynes Company, Newark, Ohio

    International Nuclear Information System (INIS)

    1985-11-01

    This US Nuclear Regulatory Commission report documents the circumstances surrounding the March 26, 1985, confiscation and subsequent decontamination activities related to the use of unauthorized quantities of americium-241 at the John C. Haynes Company (licensee) of Newark, Ohio. It focuses on the period from early February to July 26, 1985. The incident started when NRC Region III recieved information that John C. Haynes possessed unauthorized quantities of americium-241 and was conducting unauthorized activities (diamond irradiation). By July 26, 1985, the decontamination activities at the licensee's laboratory were concluded. The licensee's actions with diamond irradiation resulted in contamination in restricted and unrestricted areas of the facility. The confiscation and decontamination activities required the combined efforts of NRC, Federal Bureau of Investigation, US Department of Energy, Oak Ridge Associated Universities, the State of Ohio, and the US Environmental Protection Agency. The report describes the factual information and significant findings associated with the confiscation and decontamination activities

  17. Undocumented migrants lack access to pregnancy care and prevention

    Directory of Open Access Journals (Sweden)

    Andreoli Nicole

    2008-03-01

    Full Text Available Abstract Background Illegal migration is an increasing problem worldwide and the so-called undocumented migrants encounter major problems in access to prevention and health care. The objective of the study was to compare the use of preventive measures and pregnancy care of undocumented pregnant migrants with those of women from the general population of Geneva, Switzerland. Methods Prospective cohort study including pregnant undocumented migrants presenting to the University hospital from February 2005 to October 2006. The control group consisted of a systematic sample of pregnant women with legal residency permit wishing to deliver at the same public hospital during the same time period. Results 161 undocumented and 233 control women were included in the study. Mean ages were 29.4 y (SD 5.8 and 31.1 y (SD 4.8 (p Conclusion Compared to women who are legal residents of Geneva, undocumented migrants have more unintended pregnancies and delayed prenatal care, use fewer preventive measures and are exposed to more violence during pregnancy. Not having a legal residency permit therefore suggests a particular vulnerability for pregnant women. This study underscores the need for better access to prenatal care and routine screening for violence exposure during pregnancy for undocumented migrants. Furthermore, health care systems should provide language- and culturally-appropriate education on contraception, family planning and cervical cancer screening.

  18. Rural-Urban Differences in Access to Preventive Health Care Among Publicly Insured Minnesotans.

    Science.gov (United States)

    Loftus, John; Allen, Elizabeth M; Call, Kathleen Thiede; Everson-Rose, Susan A

    2018-02-01

    Reduced access to care and barriers have been shown in rural populations and in publicly insured populations. Barriers limiting health care access in publicly insured populations living in rural areas are not understood. This study investigates rural-urban differences in system-, provider-, and individual-level barriers and access to preventive care among adults and children enrolled in a public insurance program in Minnesota. This was a secondary analysis of a 2008 statewide, cross-sectional survey of publicly insured adults and children (n = 4,388) investigating barriers associated with low utilization of preventive care. Sampling was stratified with oversampling of racial/ethnic minorities. Rural enrollees were more likely to report no past year preventive care compared to urban enrollees. However, this difference was no longer statistically significant after controlling for demographic and socioeconomic factors (OR: 1.37, 95% CI: 1.00-1.88). Provider- and system-level barriers associated with low use of preventive care among rural enrollees included discrimination based on public insurance status (OR: 2.26, 95% CI: 1.34-2.38), cost of care concerns (OR: 1.72, 95% CI: 1.03-2.89) and uncertainty about care being covered by insurance (OR: 1.70, 95% CI: 1.01-2.85). These and additional provider-level barriers were also identified among urban enrollees. Discrimination, cost of care, and uncertainty about insurance coverage inhibit access in both the rural and urban samples. These barriers are worthy targets of interventions for publicly insured populations regardless of residence. Future studies should investigate additional factors associated with access disparities based on rural-urban residence. © 2017 National Rural Health Association.

  19. Design of controllable multicast for IPTV over EPON

    Science.gov (United States)

    Zhang, Chuanhao; Liu, Deming; Zhang, Li; Wu, Guangsheng

    2007-11-01

    The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services such as IPTV. In this paper we focus on security mechanisms that should be available to groups that specifically request it, and therefore are willing to pay the extra cost of implementing those mechanisms. We concentrate on two issues: how unauthorized multicast traffic can be prevented by means of multicast transit traffic control; how a group's susceptibility is likely to be reduced by means of multicast group access control. We have proposed a novel scheme that should be available to multicast groups that desire precautionary measures be taken to avert the threats of Invalid source and unauthorized access.

  20. 14 CFR 1213.106 - Preventing release of classified information to the media.

    Science.gov (United States)

    2010-01-01

    ... ADMINISTRATION RELEASE OF INFORMATION TO NEWS AND INFORMATION MEDIA § 1213.106 Preventing release of classified... interviews, audio/visual) to the news media is prohibited. The disclosure of classified information to unauthorized individuals may be cause for prosecution and/or disciplinary action against the NASA employee...

  1. HEALTH RECORDS AND INFORMATION TECHNOLOGY IN SUPPORT OF EXCHANGE OF HEALTH INFORMATION

    Directory of Open Access Journals (Sweden)

    Jordan Deliversky

    2017-05-01

    Full Text Available The exchange of health information in conditions directly related to electronic environment is referred as health information technology. Usually the protection of personal health related data is comprised of various elements such as ways of information usage and access to sensitive health information. The protection of individually identifiable health information is possible with combination of measures. Protective measures include administrative, technical and physical elements. Through such protective measures is possible to ensure confidentiality, integrity and availability of the information, while at the same time could be guaranteed the prevention of unauthorized access. Sensitive records usually contain personal health information. Personal medical data requires high level of protection, as its content includes medical condition or diagnosis, where unauthorized access could have negative impact on one’s personal and professional life.

  2. Beyond Culture and Language: Access to Diabetes Preventive Health Services among Somali Women in Norway.

    Science.gov (United States)

    Gele, Abdi A; Torheim, Liv Elin; Pettersen, Kjell Sverre; Kumar, Bernadette

    2015-01-01

    Despite the high prevalence of type 2 diabetes in some immigrant and refugee communities in Norway, there is very little information available on their utilization of diabetes prevention interventions, particularly for women from Somali immigrant communities. A qualitative study of 30 Somali immigrant women aged 25 years and over was carried out in the Oslo area. Unstructured interviews were used to explore women's knowledge of diabetes, their access to preventive health facilities, and factors impeding their reception of preventive health programs targeted for the prevention of type 2 diabetes. The study participants were found to have a good knowledge of diabetes. They knew that a sedentary lifestyle and unhealthy diet are among the risk factors for diabetes. Regardless of their knowledge, participants reported a sedentary lifestyle accompanied with the consumption of an unhealthy diet. This was attributed to a lack of access to tailored physical activity services and poor access to health information. Considering gender-exclusive training facilities for Somali immigrant women and others with similar needs, in addition to access to tailored health information on diet, may encourage Somali women to adopt a healthy lifestyle, and it will definitely contribute to a national strategy for the prevention of diabetes.

  3. Beyond Culture and Language: Access to Diabetes Preventive Health Services among Somali Women in Norway

    Directory of Open Access Journals (Sweden)

    Abdi A. Gele

    2015-01-01

    Full Text Available Despite the high prevalence of type 2 diabetes in some immigrant and refugee communities in Norway, there is very little information available on their utilization of diabetes prevention interventions, particularly for women from Somali immigrant communities. A qualitative study of 30 Somali immigrant women aged 25 years and over was carried out in the Oslo area. Unstructured interviews were used to explore women’s knowledge of diabetes, their access to preventive health facilities, and factors impeding their reception of preventive health programs targeted for the prevention of type 2 diabetes. The study participants were found to have a good knowledge of diabetes. They knew that a sedentary lifestyle and unhealthy diet are among the risk factors for diabetes. Regardless of their knowledge, participants reported a sedentary lifestyle accompanied with the consumption of an unhealthy diet. This was attributed to a lack of access to tailored physical activity services and poor access to health information. Considering gender-exclusive training facilities for Somali immigrant women and others with similar needs, in addition to access to tailored health information on diet, may encourage Somali women to adopt a healthy lifestyle, and it will definitely contribute to a national strategy for the prevention of diabetes.

  4. Detection and Prevention of Insider Threats in Database Driven Web Services

    Science.gov (United States)

    Chumash, Tzvi; Yao, Danfeng

    In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider both insider and outsider attacks in the third-party web hosting scenarios. We present SafeWS, a modular solution that is inserted between server side scripts and databases in order to prevent and detect website hijacking and unauthorized access to stored data. To achieve the required security, SafeWS utilizes a combination of lightweight cryptographic integrity and encryption tools, software engineering techniques, and security data management principles. We also describe our implementation of SafeWS and its evaluation. The performance analysis of our prototype shows the overhead introduced by security verification is small. SafeWS will allow business owners to significantly reduce the security risks and vulnerabilities of outsourcing their sensitive customer data to third-party providers.

  5. Issues With Access to Acquisition Data and Information in the Department of Defense

    Science.gov (United States)

    2017-01-01

    retailers scored 670 (Sternstein, 2015).1 One way that enterprises, and possibly DoD, can deal with collecting, storing , accessing, and sharing an...intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to...management strategy.2 Data warehouses store vast quantities of structured data using a multidimensional approach but do not allow data quality

  6. 78 FR 15006 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-08

    ... experience in DA&M, total years of work experience, job level, job competencies, and competency level), education (e.g., degrees, training, coursework), job title, pay plan, job series, job grade, feedback on... and PIN prevents unauthorized access. Retention and disposal: Destroy three (3) years after...

  7. Staffing and Technology Maximize Dorm Security.

    Science.gov (United States)

    George, Stephen C.

    1996-01-01

    Loyola University of Chicago uses uniformed guards and electronic monitoring to prevent unauthorized entry into its 11 residence halls. Access to all residence halls is regulated by bar-code readers. Student ID cards also have color-coded stickers corresponding to specific residence halls. (MLF)

  8. Consequences of Arizona's Immigration Policy on Social Capital among Mexican Mothers with Unauthorized Immigration Status

    Science.gov (United States)

    Valdez, Carmen R.; Padilla, Brian; Valentine, Jessa Lewis

    2013-01-01

    This study explores the consequences of increasingly restrictive immigration policies on social capital among Mexican mothers with unauthorized immigrant status in Arizona. Three focus groups conducted in Arizona explore how mothers' experiences with immigration policies have affected their neighborhood, community, and family ties. Focus group


  9. MIP-based enhanced mid-session macro-mobility for IMS-controlled state-full applications

    DEFF Research Database (Denmark)

    Renier, Thibault Julien; Fathi, Hanane; Schwefel, Hans-Peter

    2007-01-01

    , e.g., block unauthorized visiting users. The 3GPP IP Multimedia Subsystem (IMS) is a platform standardized towards network-independent access and session control. The current IMS specifications do not allow for any change of the user's current IP address during an ongoing session, which prevents...

  10. 21 CFR 1311.120 - Electronic prescription application requirements.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Electronic prescription application requirements. 1311.120 Section 1311.120 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE... application must clear the plain text password from the application memory to prevent the unauthorized access...

  11. Designing a Physical Security System for Risk Reduction in a Hypothetical Nuclear Facility

    International Nuclear Information System (INIS)

    Saleh, A.A.; Abd Elaziz, M.

    2017-01-01

    Physical security in a nuclear facility means detection, prevention and response to threat, the ft, sabotage, unauthorized access and illegal transfer involving radioactive and nuclear material. This paper proposes a physical security system designing concepts to reduce the risk associated with variant threats to a nuclear facility. This paper presents a study of the unauthorized removal and sabotage in a hypothetical nuclear facility considering deter, delay and response layers. More over, the study involves performing any required upgrading to the security system by investigating the nuclear facility layout and considering all physical security layers design to enhance the weakness for risk reduction

  12. Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

    Directory of Open Access Journals (Sweden)

    Sandeep Gupta

    2018-01-01

    Full Text Available Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking pictures, and e-mailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing. However, on the other side, they also pose security and privacy threats to the users’ stored data. User authentication is the first line of defense to prevent unauthorized access to the smartphone. Several authentication schemes have been proposed over the years; however, their presentation might be perplexing to the new researchers to this domain, under the shade of several buzzwords, for example, active, continuous, implicit, static, and transparent, being introduced in academic papers without comprehensive description. Moreover, most of the reported authentication solutions were evaluated mainly in terms of accuracy, overlooking a very important aspect—the usability. This paper surveys various types and ways of authentication, designed and developed primarily to secure the access to smartphones and attempts to clarify correlated buzzwords, with the motivation to assist new researchers in understanding the gist behind those concepts. We also present the assessment of existing user authentication schemes exhibiting their security and usability issues.

  13. 49 CFR 176.130 - Magazine stowage Type A.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Magazine stowage Type A. 176.130 Section 176.130... Requirements for Class 1 (Explosive) Materials Stowage § 176.130 Magazine stowage Type A. (a) In addition to protecting the Class 1 (explosive) materials and preventing unauthorized access, magazine stowage type A...

  14. The Effect of Child Access Prevention Laws on Non-Fatal Gun Injuries

    OpenAIRE

    Jeff DeSimone; Sara Markowitz

    2005-01-01

    Many states have passed child access prevention (CAP) laws, which hold the gun owner responsible if a child gains access to a gun that is not securely stored. Previous CAP law research has focused exclusively on gun-related deaths even though most gun injuries are not fatal. We use annual hospital discharge data from 1988-2001 to investigate whether CAP laws decrease non-fatal gun injuries. Results from Poisson regressions that control for various hospital, county and state characteristics, i...

  15. Quantifying the impact of accessibility on preventive healthcare in sub-Saharan Africa using mobile phone data.

    Science.gov (United States)

    Wesolowski, Amy; O'Meara, Wendy Prudhomme; Tatem, Andrew J; Ndege, Samson; Eagle, Nathan; Buckee, Caroline O

    2015-03-01

    Poor physical access to health facilities has been identified as an important contributor to reduced uptake of preventive health services and is likely to be most critical in low-income settings. However, the relation among physical access, travel behavior, and the uptake of healthcare is difficult to quantify. Using anonymized mobile phone data from 2008 to 2009, we analyze individual and spatially aggregated travel patterns of 14,816,521 subscribers across Kenya and compare these measures to (1) estimated travel times to health facilities and (2) data on the uptake of 2 preventive healthcare interventions in an area of western Kenya: childhood immunizations and antenatal care. We document that long travel times to health facilities are strongly correlated with increased mobility in geographically isolated areas. Furthermore, we found that in areas with equal physical access to healthcare, mobile phone-derived measures of mobility predict which regions are lacking preventive care. Routinely collected mobile phone data provide a simple and low-cost approach to mapping the uptake of preventive healthcare in low-income settings.

  16. Project WP#422: Consolidated Research Program, Right of Way Automated Monitoring Threat Prevention (Topic Area #1); Leak Detection (Topic Area #2)

    Science.gov (United States)

    2012-08-30

    Preventing unauthorized intrusions on pipeline Right of Ways (ROWs) and mechanical damage due to third party strikes by machinery is a constant challenge for the pipeline industry. Equally important for safety and environmental protection is the dete...

  17. Preventing Smoking in Young People: A Systematic Review of the Impact of Access Interventions

    Directory of Open Access Journals (Sweden)

    Karin Humphries

    2009-04-01

    Full Text Available Aims: To examine existing evidence on the effectiveness of interventions that are designed to prevent the illegal sale of tobacco to young people. The review considers specific sub-questions related to the factors that might influence effectiveness, any differential effects for different sub-populations of youth, and barriers and facilitators to implementation. Methods: A review of studies on the impact of interventions on young people under the age of 18 was conducted. It included interventions that were designed to prevent the illegal sale of tobacco to children and young people. The review was conducted in July 2007, and included 20 papers on access restriction studies. The quality of the papers was assessed and the relevant data was extracted. Results: The evidence obtained from the review indicates that access restriction interventions may produce significant reductions in the rate of illegal tobacco sales to youth. However, lack of enforcement and the ability of youth to acquire cigarettes from social sources may undermine the effectiveness of these interventions. Conclusions: When access interventions are applied in a comprehensive manner, they can affect young people’s access to tobacco. However, further research is required to examine the effects of access restriction interventions on young people’s smoking behaviour.

  18. Access Not Denied? The Role American Localities Can Play

    Directory of Open Access Journals (Sweden)

    Helen B. Marrow

    2010-10-01

    Full Text Available San Francisco represents a unique case in the United States in that it has enacted a set of inclusive policies at the local level to increase unauthorized immigrants’ access to and utilization of health care. Based on interviews conducted with 36 primary care providers working in the city’s public safety net in 2009, I examine how this inclusive local policy environment both reinforces and constrains their aspirational views of unauthorized immigrants as morally “deserving” patients, and how it operates to help provide care to unauthorized immigrants. On one hand, this environment reinforces safety-net providers’ aspirational views by creating a more legal-status-blind environment that encourages unauthorized immigrants to come in for care, and by facilitating their abilities to offer key services to and advocate for unauthorized immigrant patients. At the same time, this environment constrains their aspirational views by operating through an institutional structure whose bureaucratic rules effectively deter some unauthorized immigrants from accessing care, and by explicitly delimiting unauthorized immigrants’ access to care to the realm of select primary medical services. These results highlight the great potential of, but also the limitations and internal dilemmas constituting, local “right to care” strategies that seek to ameliorate unauthorized immigrants’ health vulnerability in what is still a hostile U.S. federal context.En matiĂšre d’accĂšs aux soins des immigrants illĂ©gaux, San Francisco constitue aux Etats-Unis un cas Ă  part. La municipalitĂ© californienne a en effet votĂ© un ensemble de politiques inclusives au niveau local visant Ă  Ă©largir cet accĂšs. Sur la base d’entretiens rĂ©alisĂ©s auprĂšs de 36 prestataires de soins primaires qui travaillaient dans le systĂšme de protection sociale de la ville en 2009, j’ai examinĂ© d’une part la maniĂšre dont ces politiques locales inclusives renforcent et

  19. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  20. Inequities in access to HIV prevention services for transgender men: results of a global survey of men who have sex with men.

    Science.gov (United States)

    Scheim, Ayden I; Santos, Glenn-Milo; Arreola, Sonya; Makofane, Keletso; Do, Tri D; Hebert, Patrick; Thomann, Matthew; Ayala, George

    2016-01-01

    Free or low-cost HIV testing, condoms, and lubricants are foundational HIV prevention strategies, yet are often inaccessible for men who have sex with men (MSM). In the global context of stigma and poor healthcare access, transgender (trans) MSM may face additional barriers to HIV prevention services. Drawing on data from a global survey of MSM, we aimed to describe perceived access to prevention services among trans MSM, examine associations between stigma and access, and compare access between trans MSM and cisgender (non-transgender) MSM. The 2014 Global Men's Health and Rights online survey was open to MSM (inclusive of trans MSM) from any country and available in seven languages. Baseline data (n=3857) were collected from July to October 2014. Among trans MSM, correlations were calculated between perceived service accessibility and anti-transgender violence, healthcare provider stigma, and discrimination. Using a nested matched-pair study design, trans MSM were matched 4:1 to cisgender MSM on age group, region, and HIV status, and conditional logistic regression models compared perceived access to prevention services by transgender status. About 3.4% of respondents were trans men, of whom 69 were included in the present analysis. The average trans MSM participant was 26 to 35 years old (56.5%); lived in western Europe, North America, or Oceania (75.4%); and reported being HIV-negative (98.6%). HIV testing, condoms, and lubricants were accessible for 43.5, 53.6, and 26.1% of trans MSM, respectively. Ever having been arrested or convicted due to being trans and higher exposure to healthcare provider stigma in the past six months were associated with less access to some prevention services. Compared to matched cisgender controls, trans MSM reported significantly lower odds of perceived access to HIV testing (OR=0.57, 95% CI=0.33, 0.98) and condom-compatible lubricants (OR=0.54, 95% CI=0.30, 0.98). This first look at access to HIV prevention services for trans MSM

  1. Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

    Directory of Open Access Journals (Sweden)

    Davy Preuveneers

    2017-09-01

    Full Text Available Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1 how to constrain data processing workflows with respect to dynamic authorization policies granting or denying access to certain microservice results depending on the flow of the data; (2 how to let multiple microservices contribute to a collective data-driven authorization decision and (3 how to put adequate measures in place such that the data within each individual microservice is protected against illegitimate access from unauthorized users or other microservices. Due to this multifold objective, enforcing access control on the data endpoints to prevent information leakage or preserve one’s privacy becomes far more challenging, as authorization policies can have dependencies and decision outcomes cross-cutting data in multiple microservices. To address this challenge, we present and evaluate a workflow-oriented authorization framework that enforces authorization policies in a decentralized manner and where the delegated policy evaluation leverages feature toggles that are managed at runtime by software circuit breakers to secure the distributed data processing workflows. The benefit of our solution is that, on the one hand, authorization policies restrict access to the data endpoints of the microservices, and on the other hand, microservices can safely rely on other data endpoints to collectively evaluate cross-cutting access control decisions without having to rely on a shared storage backend holding all the necessary information for the policy evaluation.

  2. Unauthorized Immigrant Students in the United States: Educational Policies, Practices, and the Role of School Psychology

    Science.gov (United States)

    Sulkowski, Michael L.

    2017-01-01

    Overlooking Ellis Island, the famous port of entry for millions of U.S. immigrants, is the Statue of Liberty. Miss Liberty's lamp has welcomed millions of immigrants to the United States. However, in light of recent executive orders against immigration as well as efforts to detain and deport millions of unauthorized immigrants, one might wonder


  3. The Defense Science Board Permanent Task Force on Nuclear Weapons Surety. Report on the Unauthorized Movement of Nuclear Weapons

    National Research Council Canada - National Science Library

    Welch, Larry D; Agnew, Harold M; Bien, Lyle G; Crawford, John C; Foster, Jr., John S; Gold, Sydell P; McCarthy, James P; Mies, Richard W; Neary, Thomas H; Selden, Robert L

    2008-01-01

    ...]) and the Commander, U.S. Strategic Command to conduct an independent investigation of the unauthorized transfer of nuclear warheads between Minot Air Force Base, North Dakota, and Barksdale Air Force Base, Louisiana on 30 August 2007...

  4. The educational legacy of unauthorized migration: comparisons across U.S.-immigrant groups in how parents' status affects their offspring.

    Science.gov (United States)

    Bean, Frank D; Leach, Mark A; Brown, Susan K; Bachmeier, James D; Hipp, John R

    2011-01-01

    This research compares several national-origin groups in terms of how parents’ entry, legalization and naturalization (i.e., membership) statuses relate to their children’s educational attainment. In the case of Asian groups, the members of which predominantly come to the United States as permanent legal migrants, we hypothesize (1) that father’s and mother’s statuses will be relatively homogenous and few in number and (2) that these will exert minimal net effects on second-generation attainment. For Mexicans, many of whom initially come as temporary unauthorized migrants, we hypothesize (1) that parental status combinations will be heterogeneous and greater in number and (2) that marginal membership statuses will exert negative net effects on education in the second generation. To assess these ideas, we analyze unique intergenerational data from Los Angeles on the young adult members of second-generation national-origin groups and their parents. The findings show that Asian immigrant groups almost universally exhibit similar father–mother migration statuses and high educational attainment among children. By contrast, Mexicans manifest more numerous discrepant father–mother combinations, with those in which the mother remains unauthorized carrying negative implications for children’s schooling. The paper discusses the theoretical and policy implications of the delays in incorporation that result from Mexican Americans needing extra time and resources compared to the members of other groups to overcome their handicap of marginal membership status (i.e., being more likely to enter and remain unauthorized).

  5. Access to information and decision making on teenage pregnancy prevention by females in Tshwane

    OpenAIRE

    J.P.F. Masemola-Yende; Sanah M. Mataboge

    2015-01-01

    Background: The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. Objective: To explore and describe access to information and decision making...

  6. Age verification cards fail to fully prevent minors from accessing tobacco products.

    Science.gov (United States)

    Kanda, Hideyuki; Osaki, Yoneatsu; Ohida, Takashi; Kaneita, Yoshitaka; Munezawa, Takeshi

    2011-03-01

    Proper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors. We aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards by conducting a nationwide cross-sectional survey of students in Japan. This survey was conducted in 2008. We asked high school students, aged 13-18 years, in Japan about their smoking behaviour, where they purchase cigarettes, if or if not they have used age verification cards, and if yes, how they obtained this card. As the amount smoked increased, the prevalence of purchasing cigarettes from vending machines also rose for both males and females. The percentage of those with experience of using an age verification card was also higher among those who smoked more. Somebody outside of family was the top source of obtaining cards. Surprisingly, around 5% of males and females belonging to the group with highest smoking levels applied for cards themselves. Age verification cards cannot fully prevent minors from accessing tobacco products. These findings suggest that a total ban of tobacco vending machines, not an age verification system, is needed to prevent sales to minors.

  7. Incidents of illicit trafficking and other unauthorized activities involving nuclear and other radioactive materials (1993-2005)

    International Nuclear Information System (INIS)

    2010-01-01

    The confirmed incidents of illicit trafficking and other unauthorized activities involving nuclear and other radioactive materials between 1993-2005 shows that, 27% involved nuclear materials, 62% radioactive materials,7% involved both nuclear and other radioactive materials while the remainder involved other radioactive and non radioactive materials.Also 80% of nuclear material which was recovered during the same period was not reported as stolen or lost.

  8. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  9. Public Health Investment in Team Care: Increasing Access to Clinical Preventive Services in Los Angeles County

    Directory of Open Access Journals (Sweden)

    Tony Kuo

    2018-02-01

    Full Text Available As part of federal and local efforts to increase access to high quality, clinical preventive services (CPS in underserved populations, the Los Angeles County Department of Public Health (DPH partnered with six local health system and community organization partners to promote the use of team care for CPS delivery. Although these partners were at different stages of organizational capacity, post-program review suggests that each organization advanced team care in their clinical or community environments, potentially affecting >250,000 client visits per year. Despite existing infrastructure and DPH’s funding support of CPS integration, partner efforts faced several challenges. They included lack of sustainable funding for prevention services; limited access to community resources that support disease prevention; and difficulties in changing health-care provider behavior. Although team care can serve as a catalyst or vehicle for delivering CPS, downstream sustainability of this model of practice requires further state and national policy changes that prioritize prevention. Public health is well positioned to facilitate these policy discussions and to assist health system and community organizations in strengthening CPS integration.

  10. Association Between Parental Barriers to Accessing a Usual Source of Care and Children's Receipt of Preventive Services.

    Science.gov (United States)

    Bellettiere, John; Chuang, Emmeline; Hughes, Suzanne C; Quintanilla, Isaac; Hofstetter, C Richard; Hovell, Melbourne F

    Preventive health services are important for child development, and parents play a key role in facilitating access to services. This study examined how parents' reasons for not having a usual source of care were associated with their children's receipt of preventive services. We used pooled data from the 2011-2014 National Health Interview Survey (n = 34 843 participants). Parents' reasons for not having a usual source of care were framed within the Penchansky and Thomas model of access and measured through 3 dichotomous indicators: financial barriers (affordability), attitudes and beliefs about health care (acceptability), and all other nonfinancial barriers (accessibility, accommodation, and availability). We used multivariable logistic regression models to test associations between parental barriers and children's receipt of past-year well-child care visits and influenza vaccinations, controlling for other child, family, and contextual factors. In 2014, 14.3% (weighted percentage) of children had at least 1 parent without a usual source of care. Children of parents without a usual source of care because they "don't need a doctor and/or haven't had any problems" or they "don't like, trust, or believe in doctors" had 35% lower odds of receiving well-child care (adjusted odds ratio = 0.65; 95% CI, 0.56-0.74) and 23% lower odds of receiving influenza vaccination (adjusted odds ratio = 0.77; 95% CI, 0.69-0.86) than children of parents without those attitudes and beliefs about health care. Financial and other nonfinancial parental barriers were not associated with children's receipt of preventive services. Results were independent of several factors relevant to children's access to preventive health care, including whether the child had a usual source of care. Parents' attitudes and beliefs about having a usual source of care were strongly associated with their children's receipt of recommended preventive health services. Rates of receipt of child preventive

  11. Access to health information may improve behavior in preventing Avian influenza among women

    Directory of Open Access Journals (Sweden)

    Ajeng T. Endarti

    2011-02-01

    Full Text Available Background: Improving human behavior toward Avian influenza may lessen the chance to be infected by Avian influenza. This study aimed to identify several factors influencing behavior in the community.Method: A cross-sectional study was conducted in July 2008. Behavior regarding Avian influenza was measured by scoring the variables of knowledge, attitude, and practice. Subjects were obtained from the sub district of Limo, in Depok, West Java, which was considered a high risk area for Avian influenza. The heads of household as the sample unit were chosen by multi-stage sampling.Results: Among 387 subjects, 29.5% of them was had good behavior toward Avian influenza. The final model revealed that gender and access to health information were two dominant factors for good behavior in preventing Avian influenza. Compared with men, women had 67% higher risk to have good behavior [adjusted relative risk (RRa = 1.67; 95% confidence interval (CI = 0.92-3.04; P = 0.092]. Compared to those with no access to health information, subjects with access to health information had 3.4 fold increase to good behavior (RRa = 3.40; 95% CI =  0.84-13.76; P = 0.087.Conclusion: Acces to health information concerning Avian influenza was more effective among women in promoting good behavior toward preventing Avian influenza. (Med J Indones 2011; 20:56-61Keywords: avian influenza, behavior, gender, health promotion

  12. Water Quality vs. Sanitation Accessibility: What is the most effective intervention point for preventing cholera in Dhaka, Bangladesh?

    Science.gov (United States)

    Majumder, M. S.; Gute, D.; Faruque, A. S.

    2011-12-01

    Every year, 3 to 5 million individuals contract cholera, an acute diarrheal infection that is caused by the ingestion of food or water containing the Vibrio cholerae bacterium. Because cholera is a waterborne disease, it can be transmitted quickly in environments with inadequate water and sanitation systems where infected waste can easily pollute drinking water. Today, Bangladesh continues to struggle with endemic cholera. Donor organizations address water and sanitation via localized initiatives, including the installation of community water collection sites (i.e. tubewells; water-boiling points; etc.). At this small-scale level, water quality and sanitation accessibility can be improved independently of one another, and when resources are limited, donors must invest in the most effective disease prevention options. This study used laboratory-confirmed cholera incidence data (2000-2009) collected by the International Centre of Diarrheal Disease Research, Bangladesh at their on-site hospital to compare the efficacy of interventions addressing water quality versus sanitation accessibility in Dhaka, Bangladesh. Data regarding use of sanitary latrines and boiling of drinking water were extracted from sequential patient interviews conducted at the Dhaka facility and used as surrogate variables for sanitation accessibility and water quality respectively. Our analysis indicates that boiling water is 10 times more effective at preventing cholera than the use of a sanitary latrine. This finding suggests that regulating water quality is perhaps more critical to cholera prevention than increasing sanitation accessibility in an urban environment like that of Dhaka. At present, WaterAid - one of Bangladesh's most significant water and sanitation donor organizations - invests the majority of its budget on improving sanitation accessibility. The World Health Organization and the United Nations Millennium Development Goals also prioritize sanitation accessibility. However, in

  13. Mercury toxicity following unauthorized siddha medicine intake – A mimicker of acquired neuromyotonia - Report of 32 cases

    OpenAIRE

    G Gnanashanmugam; R Balakrishnan; S P Somasundaram; N Parimalam; P Rajmohan; M B Pranesh

    2018-01-01

    Context: Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. Subjects and Methods: This is a retrospective study to analyze inpatients in a tertiary care center, admitted with m...

  14. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  15. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    Science.gov (United States)

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  16. Health Service Accessibility and Risk in Cervical Cancer Prevention: Comparing Rural Versus Nonrural Residence in New Mexico

    Science.gov (United States)

    McDonald, Yolanda J.; Goldberg, Daniel W.; Scarinci, Isabel C.; Castle, Philip E.; Cuzick, Jack; Robertson, Michael; Wheeler, Cosette M.

    2018-01-01

    Purpose Multiple intrapersonal and structural barriers, including geography, may prevent women from engaging in cervical cancer preventive care such as screening, diagnostic colposcopy, and excisional precancer treatment procedures. Geographic accessibility, stratified by rural and nonrural areas, to necessary services across the cervical cancer continuum of preventive care is largely unknown. Methods Health care facility data for New Mexico (2010-2012) was provided by the New Mexico Human Papillomavirus Pap Registry (NMHPVPR), the first population-based statewide cervical cancer screening registry in the United States. Travel distance and time between the population-weighted census tract centroid to the nearest facility providing screening, diagnostic, and excisional treatment services were examined using proximity analysis by rural and nonrural census tracts. Mann-Whitney test (P < .05) was used to determine if differences were significant and Cohen's r to measure effect. Findings Across all cervical cancer preventive health care services and years, women who resided in rural areas had a significantly greater geographic accessibility burden when compared to nonrural areas (4.4 km vs 2.5 km and 4.9 minutes vs 3.0 minutes for screening; 9.9 km vs 4.2 km and 10.4 minutes vs 4.9 minutes for colposcopy; and 14.8 km vs 6.6 km and 14.4 minutes vs 7.4 minutes for precancer treatment services, all P < .001). Conclusion Improvements in cervical cancer prevention should address the potential benefits of providing the full spectrum of screening, diagnostic and precancer treatment services within individual facilities. Accessibility, assessments distinguishing rural and nonrural areas are essential when monitoring and recommending changes to service infrastructures (eg, mobile versus brick and mortar). PMID:27557124

  17. Legalization Programs and the Integration of Unauthorized Immigrants: A Comparison of S. 744 and IRCA

    Directory of Open Access Journals (Sweden)

    MarĂ­a E. Enchautegui

    2014-02-01

    Full Text Available Experiences under the Immigration Reform and Control Act of 1986 (IRCA may prove to be a poor guide for understanding how smoothly today’s unauthorized immigrants will integrate into the economy under reform proposals such as the Border Security, Economic Opportunity, and Immigration Modernization Act (S. 744. While IRCA provided a relatively quick path to legal permanent resident status, S. 744 proposes a decade long process with much attendant uncertainty.  This and other provisions in S. 744 may adversely affect immigrants’ integration and economic mobility. 

  18. Is additional conditionality preventing EU accession? Serbian democratic 'step back'

    Directory of Open Access Journals (Sweden)

    Milenković Miloơ

    2013-01-01

    Full Text Available European Union integration of Western Balkan countries in conditioned on the fulfilment on the set of criteria aimed at profound societal change. However, there is a number of additional criteria within the EU enlargement policy for the Western Balkans and Serbia in particular. We have already designated this process as 'culturalization' of accession criteria. It comprises of alterations of criteria from initial, identity-neutral and technical issues to coming to terms with the legacy of identity conflicts in the Balkan region. These conditions pose a significant challenge to political institutions in a not yet consolidated democracy. In this article we analyze how, as a result of additional conditioning, the EU accession, instead of enjoying social consensus, has reopened identity issues, divided the society and boosted discourses on 'sovereignty', 'double standards of international community' and 'injustice' perpetrated to Serbia at the time of disintegration of Yugoslavia. Serbia is in a paradoxical situation we refer to as democratic deadlock - it is in need of consolidated democracy in order to achieve political stability and stable government capable to implement EU reforms, while the instability itself is a result of additional criteria for EU accession (and reactions to it. It is a theoretically intriguing case of additional criteria preventing fulfilment of the basic accession requirements. It is further analyzed how this observed tendency can be redirected through slight alteration of beneficiaries of EU incentives aimed at facilitating cultural change. In order to viably change the political community, external assistance process needs to be as inclusive as possible. It is argued that external assistance should not only cover main political, economic and legal actors, but also include cultural actors, especially culturally legitimate elites.

  19. Microsoft¼ Office Accessℱ 2007 Step by Step

    CERN Document Server

    Lambert, Steve; Lambert, Joan

    2009-01-01

    Experience learning made easy-and quickly teach yourself how to build database solutions with Access 2007. With Step By Step, you set the pace-building and practicing the skills you need, just when you need them! Build databases from scratch or from templatesExchange data with other databases and Office documentsCreate forms to simplify data entryUse filters and queries to find and analyze informationDesign rich reports that help make your data meaningfulHelp prevent data corruption and unauthorized access Your all-in-one learning experience includes: Files for building skills and practic

  20. Can a safeguards accountancy system really detect an unauthorized removal

    International Nuclear Information System (INIS)

    Ehinger, M.H.; Ellis, J.H.

    1981-11-01

    Theoretical investigations and system studies indicate safeguards material balance data from reprocessing plants can be used to detect unauthorized removals. Plant systems have been modeled and simulated data used to demonstrate the techniques. But how sensitive are the techniques when used with actual plant data. What is the effect of safeguards applications on plant operability. Can safeguards be acceptable to plant operators, and are there any benefits to be derived. The Barnwell Nuclear Fuel Plant (BNFP) has been devoted to answering these and other questions over the past several years. A computerized system of near-real-time accounting and in-process inventory has been implemented and demonstrated during actual plant test runs. Measured inventories and hourly material balance closures have been made to assess safeguards in an operating plant application. The tests have culminated in actual removals of material from the operating plant to investigate the response and measure the sensitivity of the safeguards and data evaluation system

  1. DNA enrichment approaches to identify unauthorized genetically modified organisms (GMOs).

    Science.gov (United States)

    Arulandhu, Alfred J; van Dijk, Jeroen P; Dobnik, David; Holst-Jensen, Arne; Shi, Jianxin; Zel, Jana; Kok, Esther J

    2016-07-01

    With the increased global production of different genetically modified (GM) plant varieties, chances increase that unauthorized GM organisms (UGMOs) may enter the food chain. At the same time, the detection of UGMOs is a challenging task because of the limited sequence information that will generally be available. PCR-based methods are available to detect and quantify known UGMOs in specific cases. If this approach is not feasible, DNA enrichment of the unknown adjacent sequences of known GMO elements is one way to detect the presence of UGMOs in a food or feed product. These enrichment approaches are also known as chromosome walking or gene walking (GW). In recent years, enrichment approaches have been coupled with next generation sequencing (NGS) analysis and implemented in, amongst others, the medical and microbiological fields. The present review will provide an overview of these approaches and an evaluation of their applicability in the identification of UGMOs in complex food or feed samples.

  2. Intra-accumbens Raclopride Administration Prevents Behavioral Changes Induced by Intermittent Access to Sucrose Solution

    Directory of Open Access Journals (Sweden)

    Josué O. Suårez-Ortiz

    2018-02-01

    Full Text Available Overeating is one of the most relevant clinical features in Binge Eating Disorder and in some obesity patients. According to several studies, alterations in the mesolimbic dopaminergic transmission produced by non-homeostatic feeding behavior may be associated with changes in the reward system similar to those produced by drugs of abuse. Although it is known that binge-eating is related with changes in dopaminergic transmission mediated by D2 receptors in the nucleus accumbens shell (NAcS, it has not been determined whether these receptors may be a potential target for the treatment of eating pathology with binge-eating. Accordingly, the aim of the present study was to evaluate whether sugar binging induced by intermittent access to a sucrose solution produced changes in the structure of feeding behavior and whether blocking D2 receptors prevented these changes. We used the intermittent access model to a 10% sucrose solution (2 h/day for 4 weeks to induce sugar binging in Sprague Dawley female rats. Experimental subjects consumed in a 2-h period more than 50% of the caloric intake consumed by the subjects with ad-lib access to the sweetened solution without any increase in body weight or fat accumulation. Furthermore, we evaluated whether sugar binging was associated to the estrous cycle and we did not find differences in caloric intake (estrous vs. diestrus. Subsequently, we characterized the structure of feeding behavior (microstructural analysis and the motivation for palatable food (breakpoints of the subjects with sugar binging and found that feeding episodes had short latencies, high frequencies, as well as short durations and inter-episode intervals. The intermittent access model did not increase breakpoints, as occurred in subjects with ad-lib access to the sucrose. Finally, we evaluated the effects of D2 receptor blockade in the NAcS, and found that raclopride (18 nM prevented the observed changes in the frequency and duration of

  3. Use of next generation sequencing data to develop a qPCR method for specific detection of EU-unauthorized genetically modified Bacillus subtilis overproducing riboflavin.

    Science.gov (United States)

    Barbau-Piednoir, Elodie; De Keersmaecker, Sigrid C J; Delvoye, Maud; Gau, CĂ©line; Philipp, Patrick; Roosens, Nancy H

    2015-11-11

    Recently, the presence of an unauthorized genetically modified (GM) Bacillus subtilis bacterium overproducing vitamin B2 in a feed additive was notified by the Rapid Alert System for Food and Feed (RASFF). This has demonstrated that a contamination by a GM micro-organism (GMM) may occur in feed additives and has confronted for the first time,the enforcement laboratories with this type of RASFF. As no sequence information of this GMM nor any specific detection or identification method was available, Next GenerationSequencing (NGS) was used to generate sequence information. However, NGS data analysis often requires appropriate tools, involving bioinformatics expertise which is not alwayspresent in the average enforcement laboratory. This hampers the use of this technology to rapidly obtain critical sequence information in order to be able to develop a specific qPCRdetection method. Data generated by NGS were exploited using a simple BLAST approach. A TaqManÂź qPCR method was developed and tested on isolated bacterial strains and on the feed additive directly. In this study, a very simple strategy based on the common BLAST tools that can be used by any enforcement lab without profound bioinformatics expertise, was successfully used toanalyse the B. subtilis data generated by NGS. The results were used to design and assess a new TaqManÂź qPCR method, specifically detecting this GM vitamin B2 overproducing bacterium. The method complies with EU critical performance parameters for specificity, sensitivity, PCR efficiency and repeatability. The VitB2-UGM method also could detect the B. subtilis strain in genomic DNA extracted from the feed additive, without prior culturing step. The proposed method, provides a crucial tool for specifically and rapidly identifying this unauthorized GM bacterium in food and feed additives by enforcement laboratories. Moreover, this work can be seen as a case study to substantiate how the use of NGS data can offer an added value to easily

  4. Factors that Prevent Children from Gaining Access to Schooling: A Study of Delhi Slum Households

    Science.gov (United States)

    Tsujita, Yuko

    2013-01-01

    This paper examines the factors that prevent slum children aged 5-14 from gaining access to schooling in light of the worsening urban poverty and sizable increase in rural-to-urban migration. Bias against social disadvantage in terms of gender and caste is not clearly manifested in schooling, while migrated children are less likely to attend


  5. Application of crime countermeasures for the protection of nuclear materials

    International Nuclear Information System (INIS)

    Bean, C.H.

    1975-01-01

    Federal regulations prepared by the Nuclear Regulatory Commission and published in the Federal Register require licensees to take appropriate action to protect the health and safety of the public from unauthorized use of special nuclear material (SNM), which includes plutonium, uranium-233, and highly enriched uranium. Crime countermeasures for compliance with these regulations are an important part of the guidance that is provided by the NRC's Office of Standards Development. The use of crime countermeasures and protective devices is intended to prevent the unauthorized diversion of material and to aid in the detection of diversion should it be attempted. Plant and equipment designs should incorporate both electronic and physical security measures for protection of SNM. This applies to facilities and equipment for reprocessing, fabrication, and transportation of SNM. The protection systems include physical barriers, access controls, intrusion detection devices, surveillance devices, central alarm stations, communications, and response capability. Acceptable security measures and devices applicable to protected areas, material access areas, vital areas, vital equipment, and transportation vehicles have been presented in Regulatory Guides. (U.S.)

  6. Knowledge and use of unauthorized HIV self-test kits among men who have sex with men in Spain, following approval of an over-the-counter self-test in the U.S: a cross-sectional study.

    Science.gov (United States)

    Koutentakis, Konstantinos; Rosales-Statkus, María Elena; Hoyos, Juan; Fernåndez-Balbuena, Sonia; Ruiz, Mónica; Agustí, Cristina; de la Fuente, Luis; Belza, María José

    2016-07-08

    Shortly after the approval of an over-the-counter HIV self-test in the US, we conducted a study to estimate the proportion of men who have sex with men (MSM) in Spain who knew that unauthorized HIV self-tests could be purchased online, and the proportion that had already used these tests, as well as their socio-demographic and behavioural correlates. Between September 2012 and February 2013, MSM users of gay dating websites were invited to complete an online questionnaire. We calculated estimates of the knowledge and use of unauthorized HIV self-testing and assessed the associated factors by rare event logit regression models. Among 8620 participants, 4.2 % (95 % CI:3.8-4.6) knew they could buy an unauthorized HIV self-test kit online, and 12.7 % (95 % CI:12.0-13.4) thought that such a test might exist, although they had never seen one. Only 0.7 % (95 % CI:0.5-0.9) had ever self-tested. In the multivariable analysis, knowledge of online availability of self-tests was associated with being a non-Latin American foreigner, having at least two previous HIV tests, intending to test for HIV in the next year, and knowing about U.S. approval of self-testing. Ever-use of HIV self-testing was associated with being over 34 years of age, living outside Spain during the last 12 months, and knowing about U.S. approval of self-testing. Both knowledge and use of unauthorized HIV self-testing among MSM in Spain was very low among HIV negative or untested MSM in Spain. The recent approval in the United Kingdom and France might increase the number of MSM seeking such testing and possibly using unauthorized test kits not meeting quality standards.

  7. 77 FR 38467 - Special Conditions: Gulfstream Aerospace LP (GALP), Model Gulfstream G280 Airplane; Isolation or...

    Science.gov (United States)

    2012-06-28

    ... Gulfstream G280 Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized... airplane systems and the passenger entertainment services. Applicability As discussed above, these special... Aircraft Electronic System Security Protection from Unauthorized Internal Access. The applicant must ensure...

  8. The unauthorized Mexican immigrant population and welfare in Los Angeles County: a comparative statistical analysis.

    Science.gov (United States)

    Marcelli, E A; Heer, D M

    1998-01-01

    "Using a unique 1994 Los Angeles County Household Survey of foreign-born Mexicans and the March 1994 and 1995 Current Population Surveys, we estimate the number of unauthorized Mexican immigrants (UMIs) residing in Los Angeles County, and compare their use of seven welfare programs with that of other non-U.S. citizens and U.S. citizens. Non-U.S. citizens were found to be no more likely than U.S. citizens to have used welfare, and UMIs were 11% (14%) less likely than other non-citizens (U.S.-born citizens).... We demonstrate how results differ depending on the unit of analysis employed, and on which programs constitute Âżwelfare'." excerpt

  9. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  10. The use of biometrics in the Personal Health Record (PHR).

    Science.gov (United States)

    Bonney, Wilfred

    2011-01-01

    The emergence of the Personal Health Record (PHR) has made individual health information more readily accessible to a wide range of users including patients, consumers, practitioners, and healthcare providers. However, increased accessibility of PHR threatens the confidentiality, privacy, and security of personalized health information. Therefore, a need for robust and reliable forms of authentication is of prime concern. The concept of biometric authentication is now highly visible to healthcare providers as a technology to prevent unauthorized access to individual health information. Implementing biometric authentication mechanisms to protect PHR facilitates access control and secure exchange of health information. In this paper, a literature review is used to explore the key benefits, technical barriers, challenges, and ethical implications for using biometric authentication in PHR.

  11. Disparities in health care access and receipt of preventive services by disability type: analysis of the medical expenditure panel survey.

    Science.gov (United States)

    Horner-Johnson, Willi; Dobbertin, Konrad; Lee, Jae Chul; Andresen, Elena M

    2014-12-01

    To examine differences in access to health care and receipt of clinical preventive services by type of disability among working-age adults with disabilities. Secondary analysis of Medical Expenditure Panel Survey (MEPS) data from 2002 to 2008. We conducted cross-sectional logistic regression analyses comparing people with different types of disabilities on health insurance status and type; presence of a usual source of health care; delayed or forgone care; and receipt of dental checkups and cancer screening. We pooled annualized MEPS data files across years. Our analytic sample consisted of adults (18-64 years) with physical, sensory, or cognitive disabilities and nonmissing data for all variables of interest. Individuals with hearing impairment had better health care access and receipt than people with other disability types. People with multiple types of limitations were especially likely to have health care access problems and unmet health care needs. There are differences in health care access and receipt of preventive care depending on what type of disability people have. More in-depth research is needed to identify specific causes of these disparities and assess interventions to address health care barriers for particular disability groups. © Health Research and Educational Trust.

  12. 77 FR 67557 - Special Conditions: ATR-GIE Avions de Transport Regional, Models ATR42-500 and ATR72-212A...

    Science.gov (United States)

    2012-11-13

    ..., Models ATR42-500 and ATR72-212A Airplanes; Aircraft Electronic System Security Protection From... exploited by unauthorized access to airplane systems, data buses, and servers. Therefore, these special... ATR42-500 and ATR72-212A airplanes. 1. Airplane Electronic System Security Protection from Unauthorized...

  13. Microsoft¼ Office Accessℱ 2007 Plain & Simple

    CERN Document Server

    Frye, Curtis

    2009-01-01

    Here's WHAT You'll Learn Easily navigate the new user interfaceDesign and build your own databaseBuild forms that help you collect informationCreate charts and reportsExchange data with other databases and documentsHelp prevent unauthorized data access Here's HOW You'll Learn It Jump in wherever you need answersEasy-to-follow STEPS and SCREENSHOTS show exactly what to doHandy TIPS teach new techniques and shortcutsQuick TRY THIS! exercises help you apply what you learn right away

  14. Medieval and Renaissance anatomists: the printing and unauthorized copying of illustrations, and the dissemination of ideas.

    Science.gov (United States)

    Lanska, Douglas J; Lanska, John Robert

    2013-01-01

    The vanguard that began to question Galenic anatomical dogma originated in northern Italy in the latter half of the thirteenth century, and not coincidentally this was where human dissection was introduced, which in turn eventually fostered the origins of realistic anatomical illustration in the late fifteenth century. With the advent of the printing press and moveable type at this time, printed books began to supersede hand-copied medieval manuscripts, and labor-intensive techniques were soon developed to integrate text and illustrations on the printed page. The same technology was used to pirate the illustrations of prior authors with varying fidelity. Specific medieval and Renaissance anatomical illustrations can often be traced from their inceptions through different stages of development to the final printed images, and then through subsequent pirated versions in various abridgements or other compendia. The most important milestone in the development of anatomy and anatomical illustration was the publication in 1543 by Andreas Vesalii of De humani corporis fabrica (On the Fabric of the Human Body), commonly referred to simply as the Fabrica. With this work, Vesalii succeeded in coordinating a publication production team (author, artists, block cutters, publisher, and typesetters) to achieve an unprecedented integration of scientific discourse, medical illustration, and typography. However, despite Vesalii's valiant efforts to prevent unauthorized duplication, the illustrations from the Fabrica were extensively plagiarized. Although Vesalii found such piracy frustrating and annoying, the long-term effect was to make Vesalii's ideas known to a wider readership and to help solidify his own revolutionary contributions to anatomy. © 2013 Elsevier B.V. All rights reserved.

  15. 77 FR 2515 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-01-18

    ... software uses Primary Key Infrastructure (PKI)/Common Access Card (CAC) authentication to lock out... Infrastructure (PKI)/Common Access Card (CAC) authentication to lock out unauthorized access. System software...

  16. 77 FR 94 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-01-03

    ... software uses Primary Key Infrastructure (PKI)/Common Access Card (CAC) authentication to lock out... Infrastructure (PKI)/Common Access Card (CAC) authentication to lock out unauthorized access. System software...

  17. Improving patient access to prevent sight loss: ophthalmic electronic referrals and communication (Scotland).

    Science.gov (United States)

    Khan, A A; Mustafa, M Z; Sanders, R

    2015-02-01

    With the number of people with sight loss predicted to double to four million people in the UK by the year 2050, preventable visual loss is a significant public health issue. Sight loss is associated with an increased risk of falls, accidents and depression and evidence suggests that 50% of sight loss can be avoided. Timely diagnosis is central to the prevention of sight loss. Access to care can be a limiting factor in preventable cases. By improving referrals and access to hospital eye services it is possible to treat and minimise the number of patients with preventable sight loss and the impact this has on wider society. In 2005, NHS Fife took part in a flagship pilot funded by the Scottish government e-health department to evaluate the feasibility, safety, clinical effectiveness, and cost of electronic referral with images of patients directly from community optometrists to Hospital Eye Service (HES). The pilot study showed that electronic referral was feasible, fast, safe, and obviated the need for outpatient appointments in 128 (37%) patients with a high patient satisfaction. The results of the pilot study were presented and in May 2007, the electronic referral system was rolled out regionally in southeast Scotland. Referrals were accepted at a single site with vetting by a trained team and appointments were allocated within 48 hours. Following the implementation of electronic referral, waiting times were reduced from a median of 14 to 4 weeks. Significantly fewer new patients were seen (7462 vs 8714 [p electronic communication between community optometry practices and hospital eye departments. Five electronic forms were specifically designed for cataract, glaucoma, macula, paediatric and general ophthalmic disease. A Virtual Private Network was created which enabled optometrists to connect to the Scottish clinical information gateway system and send referrals to hospital and receive referral status feedback. Numerous hurdles have been encountered and overcome

  18. Discussing Firearm Ownership and Access as Part of Suicide Risk Assessment and Prevention: "Means Safety" versus "Means Restriction".

    Science.gov (United States)

    Stanley, Ian H; Hom, Melanie A; Rogers, Megan L; Anestis, Michael D; Joiner, Thomas E

    2017-01-01

    The goal of this study was to describe the relative utility of the terms "means safety" versus "means restriction" in counseling individuals to limit their access to firearms in the context of a mock suicide risk assessment. Overall, 370 participants were randomized to read a vignette depicting a clinical scenario in which managing firearm ownership and access was discussed either using the term "means safety" or "means restriction." Participants rated the term "means safety" as significantly more acceptable and preferable than "means restriction." Participants randomized to the "means safety" condition reported greater intentions to adhere to clinicians' recommendations to limit access to a firearm for safety purposes (F[1,367] = 7.393, p = .007, [Formula: see text]). The term "means safety" may be more advantageous than "means restriction" when discussing firearm ownership and access in clinical settings and public health-oriented suicide prevention efforts.

  19. Health Service Accessibility and Risk in Cervical Cancer Prevention: Comparing Rural Versus Nonrural Residence in New Mexico.

    Science.gov (United States)

    McDonald, Yolanda J; Goldberg, Daniel W; Scarinci, Isabel C; Castle, Philip E; Cuzick, Jack; Robertson, Michael; Wheeler, Cosette M

    2017-09-01

    Multiple intrapersonal and structural barriers, including geography, may prevent women from engaging in cervical cancer preventive care such as screening, diagnostic colposcopy, and excisional precancer treatment procedures. Geographic accessibility, stratified by rural and nonrural areas, to necessary services across the cervical cancer continuum of preventive care is largely unknown. Health care facility data for New Mexico (2010-2012) was provided by the New Mexico Human Papillomavirus Pap Registry (NMHPVPR), the first population-based statewide cervical cancer screening registry in the United States. Travel distance and time between the population-weighted census tract centroid to the nearest facility providing screening, diagnostic, and excisional treatment services were examined using proximity analysis by rural and nonrural census tracts. Mann-Whitney test (P brick and mortar). © 2016 National Rural Health Association.

  20. The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan.

    Science.gov (United States)

    Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng

    2012-12-01

    This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.

  1. Country Presentation Malawi

    International Nuclear Information System (INIS)

    Kamperewera, A.M; Chiumbuzo, T.M.; Bonongwe, A.

    2010-01-01

    Discusses incidents and developments in illicit trafficking, unauthorized activities involving nuclear materials in Malawi, government systems for prevention and detection of nuclear material trafficking and response to unauthorized activities involving nuclear materials and systems put in place for nuclear trafficking information management and coordination.

  2. Access and Use of Interventions to Prevent and Treat Malaria among Pregnant Women in Kenya and Mali: A Qualitative Study

    NARCIS (Netherlands)

    Hill, Jenny; Kayentao, Kassoum; Achieng, Florence; Diarra, Samba; Dellicour, Stephanie; Diawara, Sory I.; Hamel, Mary J.; Ouma, Peter; Desai, Meghna; Doumbo, Ogobara K.; ter Kuile, Feiko O.; Webster, Jayne

    2015-01-01

    Background Coverage of malaria in pregnancy interventions in sub-Saharan Africa is suboptimal. We undertook a systematic examination of the operational, socio-economic and cultural constraints to pregnant women's access to intermittent preventive treatment (IPTp), long-lasting insecticide-treated

  3. Risk behavior and access to HIV/AIDS prevention services in a community sample of homeless persons entering permanent supportive housing.

    Science.gov (United States)

    Wenzel, Suzanne L; Rhoades, Harmony; Harris, Taylor; Winetrobe, Hailey; Rice, Eric; Henwood, Ben

    2017-05-01

    Homeless persons suffer disproportionately high rates of HIV infection, and moving into permanent supportive housing (PSH) can provide a stable base from which to access needed prevention services. However, little is known about HIV risk or prevention behavior during this critical time of transition. The current study investigated STI and HIV risk and prevention behavior and recent use of prevention and treatment services (i.e., education, testing, medication) among homeless persons preparing to move into PSH. Data come from interviews with 421 homeless adults before they moved into PSH. Thirty-seven percent of the respondents were sexually active; of those, 75.7% reported unprotected sex. Nearly two-thirds (64%) reported past year HIV testing and 40% reported testing for another STI. Fewer than one-third (31%) of respondents reported receiving posttest counseling at their last HIV test. HIV seropositivity was self-reported by 10%. Among those persons who were HIV-positive, 57.1% reported less than 100% antiretroviral (ARV) adherence. Among HIV-negative respondents, less than 1% had been prescribed preexposure prophylaxis (PrEP). Less than half (46.4%) of the sample reported any HIV prevention education in the past year. This population of homeless adults about to move into PSH report high rates of HIV risk behavior, but low rates of HIV prevention education and very little PrEP utilization. Further, low rates of ARV adherence among HIV-positive respondents indicate significant risk for HIV transmission and acquisition. Entering PSH is a period of transition for homeless persons when integrated care is critically important to ensure positive health outcomes, but these data suggest that PrEP and other HIV prevention services are poorly accessed among this population. As such, multipronged services that integrate PrEP and other HIV prevention services are needed to prevent transmission and acquisition of HIV in this high-risk, vulnerable population and ensure the

  4. Standards and Access.

    Science.gov (United States)

    Fox, Tom

    1993-01-01

    Argues that easy claims about the relationship between language mastery and academic or economic access (made by both conservative commentators on education and mainstream writing teachers) are false and obscure real social and political boundaries, such as racism, sexism, elitism, and homophobia, that really do prevent access. (SR)

  5. Working with Facebook

    CERN Document Server

    2014-01-01

    This book enables you to start using Facebook right away. You will learn how to create an account, and how to fill your page with personal information, photos, and stories about the things you have done or are doing. You will learn how to add friends to your network, and which privacy settings to use to prevent unauthorized access to your personal information. The book is written using the Visual Steps method. The step-by-step method with clear instructions and screenshots will tell you exactly what you need to do.

  6. Methods of Profile Cloning Detection in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Zabielski MichaƂ

    2016-01-01

    Full Text Available With the arrival of online social networks, the importance of privacy on the Internet has increased dramatically. Thus, it is important to develop mechanisms that will prevent our hidden personal data from unauthorized access and use. In this paper an attempt was made to present a concept of profile cloning detection in Online Social Networks (OSN using Graph and Networks Theory. By analysing structural similarity of network and value of attributes of user personal profile, we will be able to search for attackers which steal our identity.

  7. Limited access to HIV prevention in French prisons (ANRS PRI2DE: implications for public health and drug policy

    Directory of Open Access Journals (Sweden)

    Blanche JerĂŽme

    2011-05-01

    Full Text Available Abstract Background Overpopulation, poor hygiene and disease prevention conditions in prisons are major structural determinants of increased infectious risk within prison settings but evidence-based national and WHO guidelines provide clear indications on how to reduce this risk. We sought to estimate the level of infectious risk by measuring how French prisons adhere to national and WHO guidelines. Methods A nationwide survey targeting the heads of medical (all French prisons and psychiatric (26 French prisons units was conducted using a postal questionnaire and a phone interview mainly focusing on access to prevention interventions, i.e. bleach, opioid substitution treatment (OST, HBV vaccination and post-exposure prophylaxis (PEP for French prisoners. Two scores were built reflecting adherence to national and WHO international guidelines, ranging from 0 (no adherence to 10 (maximum adherence and 0 to 9 respectively. Results A majority (N = 113 (66% of the 171 prisons answered the questionnaires, representing 74% coverage (46,786 prisoners of the French prison population: 108 were medical units and 12 were psychiatric units. Inmate access to prevention was poor. The median[IQR] score measuring adherence to national guidelines was quite low (4.5[2.5; 5.5] but adherence to WHO guidelines was even lower 2.5[1.5; 3.5]; PEP was absent despite reported risky practices. Unsuitable OST delivery practices were frequently observed. Conclusions A wide gap exists between HIV prevention policies and their application in prisons. Similar assessments in other countries may be needed to guide a global policy reform in prison settings. Adequate funding together with innovative interventions able to remove structural and ideological barriers to HIV prevention are now needed to motivate those in charge of prison health, to improve their working environment and to relieve French prisoners from their currently debilitating conditions.

  8. Structural barriers to HIV prevention among men who have sex with men (MSM) in Vietnam: Diversity, stigma, and healthcare access.

    Science.gov (United States)

    Philbin, Morgan M; Hirsch, Jennifer S; Wilson, Patrick A; Ly, An Thanh; Giang, Le Minh; Parker, Richard G

    2018-01-01

    Men who have sex with men (MSM) in Vietnam experience disproportionate rates of HIV infection. To advance understanding of how structural barriers may shape their engagement with HIV prevention services, we draw on 32 in-depth interviews and four focus groups (n = 31) conducted with MSM in Hanoi between October 2015- March 2016. Three primary factors emerged: (1) Diversity, both in relation to identity and income; Vietnamese MSM described themselves as segregated into BĂłng kĂ­n (hidden, often heterosexually-identified MSM) and BĂłng lộ ('out,' transgender, or effeminate MSM). Lower-income, 'hidden' MSM from rural areas were reluctant to access MSM-targeted services; (2) Stigma: MSM reported being stigmatized by the healthcare system, family, and other MSM; and (3) Healthcare access: this was limited due to economic barriers and lack of MSM-friendly services. Our research suggests the need for multiple strategies to reach diverse types of MSM as well as to address barriers in access to health services such as stigma and costs. While a great deal has been written about the diversity of MSM in relation to gender performance and sexual identities, our research points to the substantial structural-level barriers that must be addressed in order to achieve meaningful and effective HIV prevention for MSM worldwide.

  9. Vascular access and infection prevention and control: a national survey of routine practices in Irish haemodialysis units.

    Science.gov (United States)

    McCann, Margaret; Clarke, Michael; Mellotte, George; Plant, Liam; Fitzpatrick, Fidelma

    2013-04-01

    National and international guidelines recommend the use of effective vascular access (VA) and infection prevention and control practices within the haemodialysis environment. Establishing an arterio-venous fistula (AVF) and preventing central venous catheter (CVC)-related infections are ongoing challenges for all dialysis settings. We surveyed VA and routine infection prevention and control practices in dialysis units, to provide national data on these practices in Ireland. A descriptive survey was emailed to nurse managers at all adult (n = 19) and children (n = 1) outpatient haemodialysis units in the Republic of Ireland. Data collected included AVF formation, CVC insertion and maintenance practices, VA use and surveillance of infection and screening protocols. Nineteen of the 20 units responded to the survey. The AVF prevalence was 49% for 1370 patients in 17 units who provided these data [mean prevalence per unit: 45.7% (SD 16.2)]; the CVC mean prevalence per unit was 52.5% (SD 16.0). Fourteen dialysis units experienced inadequate access to vascular surgical procedures either due to a lack of dedicated theatre time or hospital beds. Six units administered intravenous prophylactic antimicrobials prior to CVC insertion with only two units using a CVC insertion checklist at the time of catheter insertion. In general, dialysis units in Ireland show a strong adherence to national guidelines. Compared with the 12 countries participating in the Dialysis Outcomes Practice Patterns Study (DOPPS 4), in 2010, AVF prevalence in Irish dialysis units is the second lowest. Recommendations include establishing an AVF national prevalence target rate, discontinuing the administration of intravenous prophylactic antimicrobials prior to CVC insertion and promoting the use of CVC insertion checklists.

  10. IP and Data Access | Division of Cancer Prevention

    Science.gov (United States)

    The following outlines the different patent and licensing mechanisms applicable to studies of third-party agents in the PREVENT Program. Please note that the NCI has a variety of agreement mechanisms by which these terms may be applied and will work with the NCI Technology Transfer Center to determine the appropriate agreement for the studies approved by the PREVENT Program. | The section outlines the different patent and licensing mechanisms applicable to studies of third-party agents in the PREVENT Program.

  11. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  12. Piloting the use of indigenous methods to prevent Nipah virus infection by interrupting bats' access to date palm sap in Bangladesh.

    Science.gov (United States)

    Nahar, Nazmun; Mondal, Utpal Kumar; Sultana, Rebeca; Hossain, M Jahangir; Khan, M Salah Uddin; Gurley, Emily S; Oliveras, Elizabeth; Luby, Stephen P

    2013-09-01

    People in Bangladesh frequently drink fresh date palm sap. Fruit bats (Pteropus giganteus) also drink raw sap and may contaminate the sap by shedding Nipah virus through saliva and urine. In a previous study we identified two indigenous methods to prevent bats accessing the sap, bamboo skirts and lime (calcium carbonate). We conducted a pilot study to assess the acceptability of these two methods among sap harvesters. We used interactive community meetings and group discussions to encourage all the sap harvesters (n = 12) from a village to use either bamboo skirts or lime smear that some of them (n = 4) prepared and applied. We measured the preparation and application time and calculated the cost of bamboo skirts. We conducted interviews after the use of each method. The sap harvesters found skirts effective in preventing bats from accessing sap. They were sceptical that lime would be effective as the lime was washed away by the sap flow. Preparation of the skirt took ∌105 min. The application of each method took ∌1 min. The cost of the bamboo skirt is minimal because bamboo is widely available and they made the skirts with pieces of used bamboo. The bamboo skirt method appeared practical and affordable to the sap harvesters. Further studies should explore its ability to prevent bats from accessing date palm sap and assess if its use produces more or better quality sap, which would provide further incentives to make it more acceptable for its regular use.

  13. Escape Excel: A tool for preventing gene symbol and accession conversion errors.

    Science.gov (United States)

    Welsh, Eric A; Stewart, Paul A; Kuenzi, Brent M; Eschrich, James A

    2017-01-01

    Microsoft Excel automatically converts certain gene symbols, database accessions, and other alphanumeric text into dates, scientific notation, and other numerical representations. These conversions lead to subsequent, irreversible, corruption of the imported text. A recent survey of popular genomic literature estimates that one-fifth of all papers with supplementary gene lists suffer from this issue. Here, we present an open-source tool, Escape Excel, which prevents these erroneous conversions by generating an escaped text file that can be safely imported into Excel. Escape Excel is implemented in a variety of formats (http://www.github.com/pstew/escape_excel), including a command line based Perl script, a Windows-only Excel Add-In, an OS X drag-and-drop application, a simple web-server, and as a Galaxy web environment interface. Test server implementations are accessible as a Galaxy interface (http://apostl.moffitt.org) and simple non-Galaxy web server (http://apostl.moffitt.org:8000/). Escape Excel detects and escapes a wide variety of problematic text strings so that they are not erroneously converted into other representations upon importation into Excel. Examples of problematic strings include date-like strings, time-like strings, leading zeroes in front of numbers, and long numeric and alphanumeric identifiers that should not be automatically converted into scientific notation. It is hoped that greater awareness of these potential data corruption issues, together with diligent escaping of text files prior to importation into Excel, will help to reduce the amount of Excel-corrupted data in scientific analyses and publications.

  14. A New Reversible Database Watermarking Approach with Firefly Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Mustafa Bilgehan Imamoglu

    2017-01-01

    Full Text Available Up-to-date information is crucial in many fields such as medicine, science, and stock market, where data should be distributed to clients from a centralized database. Shared databases are usually stored in data centers where they are distributed over insecure public access network, the Internet. Sharing may result in a number of problems such as unauthorized copies, alteration of data, and distribution to unauthorized people for reuse. Researchers proposed using watermarking to prevent problems and claim digital rights. Many methods are proposed recently to watermark databases to protect digital rights of owners. Particularly, optimization based watermarking techniques draw attention, which results in lower distortion and improved watermark capacity. Difference expansion watermarking (DEW with Firefly Algorithm (FFA, a bioinspired optimization technique, is proposed to embed watermark into relational databases in this work. Best attribute values to yield lower distortion and increased watermark capacity are selected efficiently by the FFA. Experimental results indicate that FFA has reduced complexity and results in less distortion and improved watermark capacity compared to similar works reported in the literature.

  15. [How do Prevention Projects Reach their Target Groups? Results of a Survey with Prevention Projects].

    Science.gov (United States)

    Brand, T; Böttcher, S; Jahn, I

    2015-12-01

     The aim of this study was to assess methods used to access target groups in prevention projects funded within the prevention research framework by the German Federal Ministry of Education and Research.  A survey with prevention projects was conducted. Access strategies, communication channels, incentives, programme reach, and successful practical recruitment strategies were explored.  38 out of 60 projects took part in the survey. Most projects accessed their target group within structured settings (e. g., child day-care centers, schools, workplaces). Multiple communication channels and incentives were used, with written information and monetary incentives being used most frequently. Only few projects were able to report their programme reach adequately; programme reach was highest for programmes accessing the target groups in structured settings. The respondents viewed active recruitment via personal communication with the target group and key persons in the settings as the most successful strategy.  The paper provides an overview on recruitment strategies used in current preven-tion projects. More systematic research on programme reach is necessary. © Georg Thieme Verlag KG Stuttgart · New York.

  16. Cascade of access to interventions to prevent HIV mother to child transmission in the metropolitan area of Rio de Janeiro, Brazil

    Directory of Open Access Journals (Sweden)

    Elaine S. Pires Araujo

    2014-05-01

    Conclusions: Access to the full package of interventions for the prevention of HIV vertical transmission was low, with no significant trend of improvement over the years. The vertical transmission rates observed were higher than those found in reference services in the municipality of Rio de Janeiro and in the richest regions of the country.

  17. 78 FR 17386 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-21

    ... System name: Historical Airman Promotion Master Test File (MTF) (June 11, 1997, 62 FR 31793). Changes... of Senior Airman (E-4) to Senior Master Sergeant (E-8).'' Categories of records in the system: Delete... Infrastructure (PKI)/ Common Access Card (CAC) authentication to lock out unauthorized access. Access to the...

  18. Counterfeit Parts Prevention Strategy Guide Product Overview

    Science.gov (United States)

    2014-05-08

    avoidance ‱ Develop a risk assessment methodology when using unauthorized or non- franchised suppliers ‱ Identify methods to ensure and verify sub-tier...comments received – Obtain endorsement across team members for product and follow-on recommendations ‱ Workshop Accomplishments – Obtained buy -in

  19. Teaching children with autism spectrum disorders to mand for the removal of stimuli that prevent access to preferred items.

    Science.gov (United States)

    Shillingsburg, M Alice; Powell, Nicole M; Bowen, Crystal N

    2013-01-01

    Mand training is often a primary focus in early language instruction and typically includes mands that are positively reinforced. However, mands maintained by negative reinforcement are also important skills to teach. These include mands to escape aversive demands or unwanted items. Another type of negatively reinforced mand important to teach involves the removal of a stimulus that prevents access to a preferred activity. We taught 5 participants diagnosed with autism spectrum disorders to mand for the removal of a stimulus in order to access a preferred item that had been blocked. An evaluation was conducted to determine if participants responded differentially when the establishing operations for the preferred item were present versus absent. All participants learned to mand for the removal of the stimulus exclusively under conditions when the establishing operation was present.

  20. Low knowledge and anecdotal use of unauthorized online HIV self-test kits among attendees at a street-based HIV rapid testing programme in Spain.

    Science.gov (United States)

    Belza, M José; Figueroa, Carmen; Rosales-Statkus, M Elena; Ruiz, Mónica; Vallejo, Fernando; de la Fuente, Luis

    2014-08-01

    The objectives of this study were to estimate the percentage of potential users who know that unauthorized HIV self-tests can be purchased online and the percentage of those who have already used them, and to determine socio-demographic and behavioural correlates. A self-administered questionnaire was employed to collect data from attendees at a street-based HIV testing programme. Logistic regression for rare events was performed. Of the 3340 participants, 5.3% (95% confidence interval (CI) 4.5-6.0%) had knowledge of self-tests being sold online and 7.5% (95% CI 6.6-8.5%) thought they existed but had never seen them; only 0.6% (95% CI 0.3-0.9%) had ever used one. Knowing that self-tests are sold online (odds ratio (OR) 3.6, 95% CI 2.4-5.4) and using them (OR 7.3, 95% CI 2.2-23.8) were associated with having undergone more than two previous HIV tests. Use was also associated with being neither Spanish nor Latin American (OR 3.8, 95% CI 1.2-12.0) and with having a university degree (OR 0.2, 95% CI 0.1-0.7). At the time of the study, the impact on the population of issues related to the use of unauthorized tests was very low. However, media coverage following the approval of self-testing in the USA might have changed the situation. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  1. Production of Lawyers in Israel – What Does Unauthorized Practice of Law Have to Do With It?

    Directory of Open Access Journals (Sweden)

    Neta Ziv

    2013-07-01

    Full Text Available Discussions about the "flooding" of the legal profession have focused on jurisprudence and legal culture (how people resolve disputes; accessibility to legal education and the acceleration in the number of law schools; social and cultural factors (professional status, and structural entry barriers to the professional. This paper analyzes the reality of the growing number of lawyers in Israel with reference to an additional factor: the most extensive rules regarding Unauthorized Practice of Law, strictly guarded by the Israeli Bar Association. As law had become an accepted forum for resolving private and public disputes, any kind of activity entailing provision of legal advice, legal documentation or representation is restricted to lawyers only. Consequently, entry into the profession becomes the only way to take part and become engaged in the field of legal services. Los debates sobre la “inundaciĂłn” de la abogacĂ­a se han centrado en la jurisprudencia y la cultura legal (en la forma de resolver disputas; la accesibilidad a la educaciĂłn en derecho y el aumento del nĂșmero de escuelas de derecho; los factores sociales y culturales (estatus profesional, y las barreras de acceso estructurales a la profesiĂłn. Este artĂ­culo analiza la realidad del nĂșmero creciente de abogados en Israel, haciendo referencia a un factor adicional: la normativa mĂĄs amplia relacionada con la prĂĄctica no autorizada del derecho, vigilada estrechamente por la AsociaciĂłn de Abogados de Israel. EstĂĄ asumido que el derecho es el foro en el que resolver disputas privadas y pĂșblicas, por lo que cualquier actividad que implique la provisiĂłn de consejo legal, documentaciĂłn legal, o representaciĂłn, estĂĄ limitada Ășnicamente a los abogados. De esta forma, acceder a la profesiĂłn se convierte en la Ășnica forma de participar e implicarse en el campo de los servicios legales.

  2. Interventions for preventing and managing of skin lesions after radiation.

    Directory of Open Access Journals (Sweden)

    Eleni Bafe

    2017-12-01

    Full Text Available Introduction: Radiotherapy has a pivotal role in the fight against cancer. However 85% of patients, who undergo radiotherapy, will face moderate to severe skin reactions, for the treatment of which various local products, available in the market, are used. Aim: The aim of this systematic literature review was to investigate the prevention and treatment of these skin lesions induced by radiation. Methods: For this purpose 34 articles were collected concerning materials, approved by the FDA, for the prevention and treatment of skin damage due to radiation, preclinical factors tested in animal models, factors involved in the prevention and treatment of moist desquamation and unauthorized agents or with little information about them. Results: According to the study results, the moisturizing and hydrophilic creams, herbal preparations, gels based on hyaluronic acid, and Vitamin E, heparinoid creams and formulations based on oils appear to have a positive effect in preventing dermatitis as well as in providing symptom relief. Patches are suitable for the case of moist desquamation. Vasculotide, agent EUK-207, agent RTA 408, agent ALDH2 and the agent Celecoxib are still in the preclinical stage but may become future therapeutic targets. Conclusion: Skin reactions due to radiation remain a significant problem for patients undergoing radical treatment. However, thanks to the multitude of formulations available in the market and several clinical trials it is possible that early prevention and treatment for actinic dermatitis could be achieved. In conclusion, it is crucial that health professionals are aware of the formulations indicated and contraindicated in case of skin reactions induced by radiation and adjust the treatment for the prevention and management of skin reactions in patients receiving radiation therapy.

  3. Syringe access for the prevention of blood borne infections among injection drug users

    Directory of Open Access Journals (Sweden)

    Rich Josiah D

    2003-11-01

    Full Text Available Abstract Background Approximately one-third of acquired immunodeficiency syndrome cases in the United States are associated with the practice of sharing of injection equipment and are preventable through the once-only use of syringes, needles and other injection equipment. Discussion Sterile syringes may be obtained legally by 4 methods depending on the state. They may be purchased over the counter, prescribed, obtained at syringe exchange programs or furnished by authorized agencies. Each of these avenues has advantages and disadvantages; therefore, legal access through all means is the most likely way to promote the use of sterile syringes. Summary By assisting illicit drug injectors to obtain sterile syringes the primary care provider is able to reduce the incidence of blood borne infections, and educate patients about safe syringe disposal. The provider is also able to initiate discussion about drug use in a nonjudgmental manner and to offer care to patients who are not yet ready to consider drug treatment.

  4. 75 FR 79065 - Privacy Act of 1974, as Amended; Proposed System of Records and Routine Use Disclosures

    Science.gov (United States)

    2010-12-17

    ... includes management and profile information, such as blocked accounts, failed access data, effective date... to which criminal penalties attach; and (b) Representing the Commissioner; or (c) Investigating... the criminal penalties that apply to an unauthorized access to, or disclosure of, PII. Employees and...

  5. A HIPAA-compliant architecture for securing clinical images

    Science.gov (United States)

    Liu, Brent J.; Zhou, Zheng; Huang, H. K.

    2005-04-01

    The HIPAA (Health Insurance Portability and Accountability Act, Instituted April 2003) Security Standards mandate health institutions to protect health information against unauthorized use or disclosure. One approach to addressing this mandate is by utilizing user access control and generating audit trails of the various authorized as well as unauthorized user access of health data. Although most current clinical image systems (eg, PACS) have components that generate log files as a solution to address the HIPAA mandate, there is a lack of methodology to obtain and synthesize the pertinent data from the large volumes of log file data generated by these multiple components within a PACS. We have designed and developed a HIPAA Compliant Architecture specifically for tracking and auditing the image workflow of clinical imaging systems such as PACS. As an initial first step, a software toolkit was implemented based on the HIPAA Compliant architecture. The toolkit was implemented within a testbed PACS Simulator located in the Image Processing and Informatics (IPI) lab at the University of Southern California. Evaluation scenarios were developed where different user types performed legal and illegal access of PACS image data within each of the different components in the PACS Simulator. Results were based on whether the scenarios of unauthorized access were correctly identified and documented as well as normal operational activity.

  6. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  7. General Aspects of some Causes of Web Application Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Mironela Pßrnău

    2015-10-01

    Full Text Available Because web applications are complex software systems in constant evolution, they become real targets for hackers as they provide direct access to corporate or personal data. Web application security is supposed to represent an essential priority for organizations in order to protect sensitive customer data, or those of the employees of a company. Worldwide, there are many organizations that report the most common types of attacks on Web applications and methods for their prevention. While the paper is an overview, it puts forward several typical examples of web application vulnerabilities that are due to programming errors; these may be used by attackers to take unauthorized control over computers.

  8. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  9. Nuclear security of Cuba’s medical facilities

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2016-01-01

    Cuba is a leading hub for medical research and cancer treatment in Latin America and the Caribbean. Physical protection is installed at radiotherapy facilities to detect entry of and delay access to an intruder. This minimizes the likelihood of unauthorized access and maximizes nuclear security.

  10. Secure data management : 6th VLDB workshop, SDM 2009 Lyon, France, August 28, 2009 : proceedings

    NARCIS (Netherlands)

    Jonker, W.; Petkovic, M.

    2009-01-01

    Preface. The new emerging technologies put new requirements on security and data management. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought some privacy concerns. It becomes simpler to collect,

  11. Development of a thematic collection of Musa spp accessions using SCAR markers for preventive breeding against Fusarium oxysporum f. sp cubense tropical race 4.

    Science.gov (United States)

    Silva, P R O; de Jesus, O N; Bragança, C A D; Haddad, F; Amorim, E P; Ferreira, C F

    2016-03-11

    Bananas are one of the most consumed fruits worldwide, but are affected by many pests and diseases. One of the most devastating diseases is Fusarium wilt, caused by Fusarium oxysporum f. sp cubense (Foc). Recently, Fusarium tropical race 4 (Foc TR4) has been causing irreparable damage, especially in Asia and Africa where it has devastated entire plantations, including areas with Cavendish, which is known to be resistant to Foc race 1. Although this race is not yet present in Brazil, results obtained by Embrapa in partnership with the University of Wageningen, The Netherlands, indicate that 100% of the cultivars used by Brazilian growers are susceptible to Foc TR 4. In our study, 276 banana accessions were screened with sequence characterized amplified region (SCAR) markers that have been linked to the resistance of Foc TR 4. Two SCAR primers were tested and the results revealed that SCAR ScaU1001 was efficient at discriminating accessions with possible resistance in 36.6% of the evaluated accessions. This is the first attempt to develop a thematic collection of possible Foc TR 4 resistant banana accessions in Brazil, which could be tested in Asian or African countries to validate marker-assisted selection (MAS), and for use in the preventive breeding of the crop to safeguard our banana plantations against Foc TR 4. We believe that this is an important step towards the prevention of this devastating disease, especially considering that our banana plantations are at risk.

  12. Access and use of interventions to prevent and treat malaria among pregnant women in Kenya and Mali: a qualitative study.

    Science.gov (United States)

    Hill, Jenny; Kayentao, Kassoum; Achieng, Florence; Diarra, Samba; Dellicour, Stephanie; Diawara, Sory I; Hamel, Mary J; Ouma, Peter; Desai, Meghna; Doumbo, Ogobara K; ter Kuile, Feiko O; Webster, Jayne

    2015-01-01

    Coverage of malaria in pregnancy interventions in sub-Saharan Africa is suboptimal. We undertook a systematic examination of the operational, socio-economic and cultural constraints to pregnant women's access to intermittent preventive treatment (IPTp), long-lasting insecticide-treated nets (LLINs) and case management in Kenya and Mali to provide empirical evidence for strategies to improve coverage. Focus group discussions (FGDs) were held as part of a programme of research to explore the delivery, access and use of interventions to control malaria in pregnancy. FGDs were held with four sub-groups: non-pregnant women of child bearing age (aged 15-49 years), pregnant women or mothers of children aged pregnancy, disease prevention in mother and foetus, checking the position of the baby in preparation for delivery, and ensuring admission to a facility in case of complications. Barriers to accessing care related to the quality of the health provider-client interaction, perceived health provider skills and malpractice, drug availability, and cost of services. Pregnant women perceived themselves and their babies at particular risk from malaria, and valued diagnosis and treatment from a health professional, but cost of treatment at health facilities drove women to use herbal remedies or drugs bought from shops. Women lacked information on the safety, efficacy and side effects of antimalarial use in pregnancy. Women in these settings appreciated the benefits of antenatal care and yet health services in both countries are losing women to follow-up due to factors that can be improved with greater political will. Antenatal services need to be patient-centred, free-of-charge or highly affordable and accountable to the women they serve.

  13. Information security of industrial control systems: possible attack vectors and protection methods

    Directory of Open Access Journals (Sweden)

    Ignatiy A. Grachkov

    2018-03-01

    obtaining unauthorized access to industrial control systems using the Shodan search engine is described and recommendations how to ensure information security of the industrial control system are given.

  14. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  15. Youth access to tobacco.

    Science.gov (United States)

    Rigotti, N A

    1999-01-01

    To start smoking, young people need a supply of tobacco products. Reducing youth access to tobacco is a new approach to preventing tobacco use that has been a focus of federal, state, and local tobacco control efforts over the past decade. All 50 states ban tobacco sales to minors, but compliance is poor because laws are not enforced. Consequently, young people have little trouble obtaining tobacco products. Commercial sources of tobacco (stores and vending machines) are important for underage smokers, who often purchase their own cigarettes. Underage youths also obtain tobacco from noncommercial sources such as friends, relatives, older adolescents, and adults. Educating retailers about tobacco sales laws has not produced long-term improvement in their compliance. Active enforcement of tobacco sales laws changes retailer behavior, but whether this reduces young people's access to tobacco or their tobacco use is not clear. The effectiveness of new local, state, and federal actions that aim to reduce youth access to tobacco remains to be determined. Can enforcing tobacco sales laws reduce young people's access to tobacco? If so, will this prevent or delay the onset of their tobacco use? How will youths' sources of tobacco change as commercial sources are restricted? What are the social (noncommercial) sources of tobacco for minors and how can youths' access to tobacco from these sources be reduced? What is the impact of the new federal policies aimed at reducing youth access to tobacco? Do new state and local laws that ban youth possession or use of tobacco have a net positive or negative impact on youth attitudes, access to tobacco, or tobacco use? What is the relative effectiveness and cost-effectiveness of efforts to reduce the supply of tobacco compared to those that aim to reduce demand for tobacco? Will either work alone or are both necessary to achieve reductions in youth smoking?

  16. Improving Reliability of Information Leakage Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    A. V. Mamaev

    2011-03-01

    Full Text Available The problem of protection from deliberate leaks of information is one of the most difficult. Integrated systems of information protection against insider have a serious drawback. Using this disadvantage the offender receives the possibility of unauthorized theft of information from working machine.

  17. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  18. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online


  19. Unauthorized Disclosure: Can Behavioral Indicators Help Predict Who Will Commit Unauthorized Disclosure of Classified National Security Information?

    Science.gov (United States)

    2015-06-01

    Katherine Herbig, Espionage by the Numbers: A Statistical Overview, accessed April 14, 2015, http://www.wright.edu/rsp/Security/Treason/Numbers.htm 5...submitted for top-secret clearances with “derogatory financial information.”43 The debt amount reviewed was $500 in delinquency for at least 120 days, which...Investigative Service’s (DIS) “ delinquent debt criteria with amount of delinquent debt” and Defense Central Index of Investigation’s (DCII) final

  20. 43 CFR 36.10 - Access to inholdings.

    Science.gov (United States)

    2010-10-01

    ... barriers prevent adequate and feasible access to State or private lands or valid interests in lands except across an area(s). Physical barriers include but are not limited to rugged mountain terrain, extensive... method of access would cause significant adverse impacts on natural or other values of the area and...

  1. Identifying barriers to receiving preventive dental services: expanding access to preventive dental hygiene services through affiliated practice.

    Science.gov (United States)

    Gross-Panico, Michelle L; Freeman, Wilbur K

    2012-01-01

    Minority children and children from lower income families are more likely to experience the burden of oral disease. Since oral disease reduces quality of life, it is a priority to utilize preventive dental services. The research questions ask if affiliated practice increases utilization of preventive dental services by underserved children from birth to 18 years of age, and what the barriers to receiving preventive dental services are and their level of importance. A survey was administered to parents/guardians of patients from birth to 18 years of age who received preventive dental services from Catholic Healthcare West East Valley Children's Dental Clinic, an affiliated practice dental clinic in Chandler, Arizona. Thirty-four surveys were completed: 21 completed in English and 13 completed in Spanish. The data was analyzed to provide descriptive statistics and non-parametrically analyzed using the Friedman's, Kendall's W and Wilcoxon Signed Ranks Tests. The cost of preventive dental services is more important to this population than both convenience of appointment time and distance traveled. As the cost increases for preventive dental services, this population will utilize preventive dental services less frequently. The study indicated that the increase of self-reported utilization of preventive dental services by underserved children, ranging in age from birth to 18 years old, in Arizona affiliated practice dental clinics, was primarily impacted by perceived reduced costs of receiving care. Funding efforts, reimbursement mechanisms and legislative policies should support this dental care delivery model to provide care to underserved children, adults and seniors throughout the U.S.

  2. Demonstration of holographic smart card system using the optical memory technology

    Science.gov (United States)

    Kim, JungHoi; Choi, JaeKwang; An, JunWon; Kim, Nam; Lee, KwonYeon; Jeon, SeckHee

    2003-05-01

    In this paper, we demonstrate the holographic smart card system using digital holographic memory technique that uses reference beam encrypted by the random phase mask to prevent unauthorized users from accessing the stored digital page. The input data that include document data, a picture of face, and a fingerprint for identification is encoded digitally and then coupled with the reference beam modulated by a random phase mask. Therefore, this proposed system can execute recording in the order of MB~GB and readout all personal information from just one card without any additional database system. Also, recorded digital holograms can't be reconstructed without a phase key and can't be copied by using computers, scanners, or photography.

  3. Access to Anti-smoking Information among School Children and its Potential Impact on Preventing Smoking Initiation: Results from the Global Youth Tobacco Use Survey (GYTS) 2014 in Viet Nam.

    Science.gov (United States)

    Minh, Hoang Van; Minh, Hoang Van; Giang, Kim Bao; Hai, Phan Thi; Hoang, Trinh Dinh; Huyen, Doan Thu; Khue, Luong Ngoc; Linh, Nguyen Thuy; Lam, Nguyen Tuan; Nga, Pham Thi Quynh

    2016-01-01

    Scientific evidence on all aspects of smoking amongst youth is very important for designing appropriate interventions to reduce smoking among this vulnerable population. This paper describes current access to antismoking information among school children aged 13 to 15 years in Vietnam in 2014 and examines its potential impact on preventing smoking initiation. The data used in this paper were obtained from the 2014 Global Youth Tobacco Survey (GYTS) in Vietnam. Students were asked questions about their level of awareness of anti-smoking information from various sources in the past 30 days and about lessons in school regarding the dangers of tobacco use during the last 12 months. Those who have never smoked were asked "whether or not they thought about avoiding cigarettes because of health warnings on cigarette packages" and answers were analyzed in combination with data on access to anti-smoking information from other sources. The prevalence of exposure to antismoking campaigns was high among school children in Viet Nam: 55.3% of current smokers reported thoughts of smoking cessation because of health warnings on cigarette packages; 60.5% of never smokers avoided initiating smoking because of the same health warnings. The potential impact of graphic health warnings to prevent school-aged children from smoking initiation would be stronger if there was concurrent access to anti-smoking programs on the dangers of tobacco use in schools. However, school education for tobacco prevention and control has not been as strong as expected. A more comprehensive school curriculum on tobacco prevention and control is recommended to reinforce antismoking messages among school children.

  4. Stigma as experienced by women accessing prevention of parent to child transmission of HIV services in Karnataka, India

    Science.gov (United States)

    Rahangdale, Lisa; Banandur, Pradeep; Sreenivas, Amita; Turan, Janet; Washington, Reynold; Cohen, Craig R.

    2010-01-01

    In Karnataka, India only one-third of HIV-infected pregnant women received antiretroviral prophylaxis at delivery in 2007 through the state government’s prevention of parent-to-child HIV transmission (PPTCT) program. The current qualitative study explored the role of HIV-associated stigma as a barrier to accessing PPTCT services in the rural northern Karnataka district of Bagalkot using in depth interviews and focus group discussions with HIV-infected women who had participated in the PPTCT program, male and female family members, and HIV service providers. Participants discussed personal experiences, community perceptions of HIV, and decision-making related to accessing PPTCT services. They described stigma towards HIV-infected individuals from multiple sources: healthcare workers, community members, family and self. Stigma-related behaviors were based on fears of HIV transmission through personal contact and moral judgment. Experience and/or fears of discrimination led pregnant women to avoid using PPTCT interventions. Government, cultural and historical factors are described as the roots of much the stigma-related behavior in this setting. Based on these formative data, PPTCT program planners should consider further research and interventions aimed at diminishing institutional and interpersonal HIV-associated stigma experienced by pregnant women. PMID:20635247

  5. Access and use of interventions to prevent and treat malaria among pregnant women in Kenya and Mali: a qualitative study.

    Directory of Open Access Journals (Sweden)

    Jenny Hill

    Full Text Available Coverage of malaria in pregnancy interventions in sub-Saharan Africa is suboptimal. We undertook a systematic examination of the operational, socio-economic and cultural constraints to pregnant women's access to intermittent preventive treatment (IPTp, long-lasting insecticide-treated nets (LLINs and case management in Kenya and Mali to provide empirical evidence for strategies to improve coverage.Focus group discussions (FGDs were held as part of a programme of research to explore the delivery, access and use of interventions to control malaria in pregnancy. FGDs were held with four sub-groups: non-pregnant women of child bearing age (aged 15-49 years, pregnant women or mothers of children aged <1 year, adolescent women, and men. Content analysis was used to develop themes and sub-themes from the data.Women and men's perceptions of the benefits of antenatal care were generally positive; motivation among women consisted of maintaining a healthy pregnancy, disease prevention in mother and foetus, checking the position of the baby in preparation for delivery, and ensuring admission to a facility in case of complications. Barriers to accessing care related to the quality of the health provider-client interaction, perceived health provider skills and malpractice, drug availability, and cost of services. Pregnant women perceived themselves and their babies at particular risk from malaria, and valued diagnosis and treatment from a health professional, but cost of treatment at health facilities drove women to use herbal remedies or drugs bought from shops. Women lacked information on the safety, efficacy and side effects of antimalarial use in pregnancy.Women in these settings appreciated the benefits of antenatal care and yet health services in both countries are losing women to follow-up due to factors that can be improved with greater political will. Antenatal services need to be patient-centred, free-of-charge or highly affordable and accountable

  6. Evaluation of Secure 802.1X Port-Based Network Access Authentication Over 802.11 Wireless Local Area Networks

    National Research Council Canada - National Science Library

    Ozturk, Huseyin

    2003-01-01

    ... addressed. Failing to examine the security risks of WLAN technology and to take the necessary countermeasures may result in unauthorized entry into the legacy local area networks and other attacks...

  7. Assessing the Efficacy of Restricting Access to Barbecue Charcoal for Suicide Prevention in Taiwan: A Community-Based Intervention Trial

    Science.gov (United States)

    Chen, Ying-Yeh; Chen, Feng; Chang, Shu-Sen; Wong, Jacky; Yip, Paul S F

    2015-01-01

    Objective Charcoal-burning suicide has recently been spreading to many Asian countries. There have also been several cases involving this new method of suicide in Western countries. Restricting access to suicide means is one of the few suicide-prevention measures that have been supported by empirical evidence. The current study aims to assess the effectiveness of a community intervention program that restricts access to charcoal to prevent suicide in Taiwan. Methods and Findings A quasi-experimental design is used to compare method-specific (charcoal-burning suicide, non-charcoal-burning suicide) and overall suicide rates in New Taipei City (the intervention site, with a population of 3.9 million) with two other cities (Taipei City and Kaohsiung City, the control sites, each with 2.7 million residents) before (Jan 1st 2009- April 30th 2012) and after (May 1st 2012-Dec. 31st 2013) the initiation of a charcoal-restriction program on May 1st 2012. The program mandates the removal of barbecue charcoal from open shelves to locked storage in major retail stores in New Taipei City. No such restriction measure was implemented in the two control sites. Generalized linear regression models incorporating secular trends were used to compare the changes in method-specific and overall suicide rates before and after the initiation of the restriction measure. A simulation approach was used to estimate the number of lives saved by the intervention. Compared with the pre-intervention period, the estimated rate reduction of charcoal-burning suicide in New Taipei City was 37% (95% CI: 17%, 50%) after the intervention. Taking secular trends into account, the reduction was 30% (95% CI: 14%, 44%). No compensatory rise in non-charcoal-burning suicide was observed in New Taipei City. No significant reduction in charcoal-burning suicide was observed in the other two control sites. The simulation approach estimated that 91 (95%CI [55, 128]) lives in New Taipei City were saved during the 20

  8. Management of the U.S. Army Center for Military History Exchange-For-Services Agreement

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    ..., transferring, donating and selling munitions list items. Munitions list items are military articles that require special handling and disposal to prevent their unauthorized use by domestic or foreign purchasers...

  9. Access to Preventive Health Care for Undocumented Migrants: A Comparative Study of Germany, The Netherlands and Spain from a Human Rights Perspective

    Directory of Open Access Journals (Sweden)

    Veronika Flegar

    2016-02-01

    Full Text Available The present study analyzes the preventive health care provisions for nationals and undocumented migrants in Germany, the Netherlands and Spain in light of four indicators derived from the United Nations Committee on Economic, Social and Cultural Rights’ General Comment 14 (GC 14. These indicators are (i immunization; (ii education and information; (iii regular screening programs; and (iv the promotion of the underlying determinants of health. It aims to answer the question of what preventive health care services for undocumented migrants are provided for in Germany, the Netherlands and Spain and how this should be evaluated from a human rights perspective. The study reveals that the access to preventive health care for undocumented migrants is largely insufficient in all three countries but most extensive in the Netherlands and least extensive in Germany. The paper concludes that a human rights-based approach to health law and policy can help to refine and concretize the individual rights and state obligations for the preventive health care of undocumented migrants. While the human rights framework is still insufficiently clear in some respects, the research concedes the added value of a rights-based approach as an evaluation tool, advocacy framework and moral principle to keep in mind when adopting or evaluating state policies in the health sector.

  10. MENGAPA BIOSECURITY MENJADI PENTING PADA LABORATORIUM PENYAKIT INFEKSI ?

    Directory of Open Access Journals (Sweden)

    Frans X Suharyanto Halim

    2012-08-01

    Full Text Available Abstract . Laboratory biosecurity is the protection, control and accountability for valuable biological material ( VBM laboratories, in order to prevent their unauthorized access, loss, theft, misuse, diversion or intentional release. The efforts of biosecurity have capability to anticipate the potential probability of releasing biohazard agent from the laboratory, the risk assessment study in the infectious disease laboratories was an effort to know whether biosecurity measures were applied in the laboratory. The usage of modified checklist questionnaire of biosecurity for collecting data and observation was done to identify potential hazard in the infectious disease laboratories according to the conceptional framework of agent, host and environmental principal. The places of this assessment are in the five regional referral infectious disease laboratories , i.e., Universitas Islam Sumatera Utara (UISU Medan, Universitas Indonesia (UI - Jakarta, Balai Pengembangan Laboratorium Kesehatan (BPLK - Bandung, Universitas Diponegoro (UNDIP - Semarang , Universitas Hasanudin (UNHAS - Makassar, one referral hospital , i.e., Rumah Sakit Umum Daerah (RSUD - Tangerang and one national referral laboratory of Center for Biomedical and Pharmaceutical Research and Development, National Institute of Health Research and Development ( NIHRD, Ministry of Health (MOH, Jakarta. The risk assessment study was done in year 2008-2009. Physical security, personnel management and information security as components of biosecurity were not applied properly in the 7 infectious disease laboratories. Applying biosecurity in the infectious disease laboratories was very important and need to be done completely to anticipate their unauthorized access, loss, theft, misuse, diversion or intentional release.Keywords : biosecurity,   bioterrorism , infectious disease laboratory, and valuable biological materials (VBM

  11. Obstacles to preventive care for individuals with disability: Implications for nurse practitioners.

    Science.gov (United States)

    Marrocco, Anna; Krouse, Helene J

    2017-05-01

    Individuals with disabilities have been identified as a population with a significantly lower usage of preventive services. Nurse practitioners (NPs) provide a key access point in the healthcare delivery system for preventive services for vulnerable populations such as those with disabilities. It is essential to understand existing barriers that prohibit access to effective preventive care for this vulnerable population. Systematic search and review of Cumulative Index of Nursing and Allied Health Literature (CINAHL), Medline, PubMed, Google Scholar, and government reports and World Health Organizations reports. Twenty-six articles were included in the review. This literature review confirmed previous notions that people with disabilities are receiving much fewer preventive services than the general population. The studies reviewed identified four major barriers that contributed to the lack of preventive care. These barriers included physical environment and system, transportation, provider knowledge and attitude, and financial. Recognition of the obstacles that this subpopulation faces in accessing preventive care services is the first step to effectively remedying this problem. Preventive services have been identified as one of the cornerstones to improving health and quality of life. By understanding the circumstances that restrict those with disabilities from accessing preventive services, NPs can provide meaningful and effective solutions. ©2017 American Association of Nurse Practitioners.

  12. Increasing Security for Cloud Computing By Steganography in Image Edges

    Directory of Open Access Journals (Sweden)

    Hassan Hadi Saleh

    2017-03-01

    Full Text Available The security of data storage in “cloud” is big challenge because the data keep within resources that may be accessed by particular machines. The managing of these data and services may not be high reliable. Therefore, the security of data is highly challenging. To increase the security of data in data center of cloud, we have introduced good method to ensure data security in “cloud computing” by methods of data hiding using color images which is called steganography. The fundamental objective of this paper is to prevent "Data Access” by unauthorized or opponent users. This scheme stores data at data centers within edges of color images and retrieves data from it when it is wanted.

  13. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  14. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...

  15. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...

  16. SAMARU JOURNALx

    African Journals Online (AJOL)

    USER

    poor air circulation, accumulated dust, and insect infestations have all left their .... 14 Rivers State University of Science and Tech., Port Harcourt. 16. 11. 68.8 ... Unauthorized access to information on computer (hacking). 243. 63.1. 142. 36.9.

  17. 75 FR 33901 - Physical Protection of Byproduct Material

    Science.gov (United States)

    2010-06-15

    ... positioning system (GPS) tracking as a national requirement for vehicles transporting highly radioactive..., Maryland. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly available documents... also proposed to establish physical protection systems to detect, assess, and respond to unauthorized...

  18. 76 FR 65105 - Special Conditions: Gulfstream Aerospace Corporation, Model GIV-X Airplane; Isolation or Aircraft...

    Science.gov (United States)

    2011-10-20

    ...-1140; Special Conditions No. 25-450-SC] Special Conditions: Gulfstream Aerospace Corporation, Model GIV-X Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized Internal Access AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Final special conditions; request for...

  19. Reexamining the association between child access prevention gun laws and unintentional shooting deaths of children.

    Science.gov (United States)

    Webster, D W; Starnes, M

    2000-12-01

    A previous study estimated that child access prevention (CAP) laws, which hold adults criminally liable for unsafe firearm storage in the environment of children, were associated with a 23% decline in unintentional firearm mortality rates among children. To reassess the effects of CAP laws and more fully examine the consistency of the estimated law effects across states. A pooled time-series study of unintentional firearm mortality among children from 1979 through 1997. Setting. The 50 states and the District of Columbia. All children laws enacted before 1998 were aggregated, the laws were associated with a 17% decline unintentional firearm death rates among children. The laws' effects were not equal across states. Florida's CAP law was associated with a 51% decline; however, there were no statistically significant aggregate or state-specific law effects in the other 14 states with CAP laws. Florida's CAP law-1 of only 3 such laws allowing felony prosecution of violators-appears to have significantly reduced unintentional firearm deaths to children. However, there is no evidence of effects in the other 14 states with CAP laws.

  20. Condoms and sexual health education as evidence: impact of criminalization of in-call venues and managers on migrant sex workers access to HIV/STI prevention in a Canadian setting.

    Science.gov (United States)

    Anderson, S; Shannon, K; Li, J; Lee, Y; Chettiar, J; Goldenberg, S; KrĂŒsi, A

    2016-11-17

    Despite a large body of evidence globally demonstrating that the criminalization of sex workers increases HIV/STI risks, we know far less about the impact of criminalization and policing of managers and in-call establishments on HIV/STI prevention among sex workers, and even less so among migrant sex workers. Analysis draws on ethnographic fieldwork and 46 qualitative interviews with migrant sex workers, managers and business owners of in-call sex work venues in Metro Vancouver, Canada. The criminalization of in-call venues and third parties explicitly limits sex workers' access to HIV/STI prevention, including manager restrictions on condoms and limited onsite access to sexual health information and HIV/STI testing. With limited labour protections and socio-cultural barriers, criminalization and policing undermine the health and human rights of migrant sex workers working in -call venues. This research supports growing evidence-based calls for decriminalization of sex work, including the removal of criminal sanctions targeting third parties and in-call venues, alongside programs and policies that better protect the working conditions of migrant sex workers as critical to HIV/STI prevention and human rights.

  1. A role based coordination model in agent systems

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-ying; YOU Jin-yuan

    2005-01-01

    Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents need interaction and communication to achieve their overall goal. Coordination technologies for the Internet typically are concerned with enabling interaction among agents and helping them cooperate with each other.At the same time, access control should also be considered to constrain interaction to make it harmless. Access control should be regarded as the security counterpart of coordination. At present, the combination of coordination and access control remains an open problem. Thus, we propose a role based coordination model with policy enforcement in agent application systems. In this model, coordination is combined with access control so as to fully characterize the interactions in agent systems. A set of agents interacting with each other for a common global system task constitutes a coordination group. Role based access control is applied in this model to prevent unauthorized accesses. Coordination policy is enforced in a distributed manner so that the model can be applied to the open distributed systems such as Intemet. An Internet online auction system is presented as a case study to illustrate the proposed coordination model and finally the performance analysis of the model is introduced.

  2. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  3. A Novel Approach to Many-to-Many User Authentication in Different Information Systems

    Directory of Open Access Journals (Sweden)

    Vitaly Petrov

    2013-01-01

    Full Text Available In this paper, we propose a novel approach to many-to-many user authentication in heterogeneous information systems. The described solution is based on the use of wireless keys – special devices that identify the user by transmitting the requested key information over a wireless network. The key feature of the proposed approach is noninteractive operating mode that allows to use a special encryption algorithm instead of two-way authentication. The algorithm is built on the basis of existing cryptographic primitives that prevents unauthorized system participants from getting access to the data of other users, even with physical access to the memory of the key. This approach does not require computational power or the battery on the key side and does not involve the user in the authentication process that allows implementing a method on passive NFC tags. To proof the concept, software implementation of the described system was developed and a qualitative comparison of the resulting solutions with existing analogues was conducted.

  4. A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

    OpenAIRE

    Atul Patel; Ruchi Kansara; Dr. Paresh Virparia

    2011-01-01

    Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities to access the computer anywhere in neighborhood. However, securing MANETs is highly challenging issue due to their inherent characteristics. Intrusion detection is an importa...

  5. Roadmap on optical security

    NARCIS (Netherlands)

    javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Pérez-Cabré, E.; Millan, M.S.; Nishchal, N.K.; Torroba, R.; Barrera, J.F.; He, W.; Peng, X.; Stern, A.; Rivenson, Y.; Alfalou, A.; Brosseau, C.; Guo, C.; Sheridan, J.T.; Situ, G.; Naruse, M.; Matsumoto, T.; Juvells, I.; Tajahuerce, E.; Lancis, J.; Chen, Wen; Chen, X.; Markman, A.; Mosk, Allard; Pinkse, Pepijn Willemszoon Harry

    2016-01-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical

  6. Digital forensic framework for a cloud environment

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-05-01

    Full Text Available crimes that can be committed in the cloud include unauthorized access to resources in the cloud, money laundering, distributed denial of services attacks, storage of pirated software, music, movies, etc. In this section, two scenarios of criminal...

  7. How do socio-economic factors and distance predict access to prevention and rehabilitation services in a Danish municipality?

    DEFF Research Database (Denmark)

    Hindhede, Anette L; Bonde, Ane; Schipperijn, Jasper

    2016-01-01

    Aim: The aim was to explore to which extent a Danish prevention centre catered for marginalised groups within the catchment area. We examined if the district’s socio-economic vulnerability status and distance from the citizens’ residential sector to the centre influenced referrals of citizens...... to the centre, citizens’ attendance at initial appointment and completion of planned activities at the centre. Background: Disparities in access to health care services is one among many aspects of inequality in health. The determinants within populations (e.g. socio-economic status, ethnicity and education...... was estimated based on the citizens’ educational level, ethnicity, income, and unemployment rate and a socio-economic vulnerability score (SE-score) was calculated. Logistic regression was used to describe the probability that a person was referred to the centre, attended the initial appointment and completed...

  8. [Health services access survey for Colombian households].

    Science.gov (United States)

    Arrivillaga, Marcela; Aristizabal, Juan Carlos; PĂ©rez, Mauricio; Estrada, Victoria Eugenia

    The aim of this study was to design and validate a health services access survey for households in Colombia to provide a methodological tool that allows the country to accumulate evidence of real-life access conditions experienced by the Colombian population. A validation study with experts and a pilot study were performed. It was conducted in the municipality of Jamundi, located in the department of Valle del Cauca, Colombia. Probabilistic, multistage and stratified cluster sampling was carried out. The final sample was 215 households. The survey was composed of 63 questions divided into five modules: socio-demographic profile of the head of the household or adult informant, household socioeconomic profile, access to preventive services, access to curative and rehabilitative services and household out of pocket expenditure. In descriptive terms, the promotion of preventive services only reached 44%; the use of these services was always highest among children younger than one year old and up to the age of ten. The perceived need for emergency medical care and hospitalisation was between 82% and 85%, but 36% perceived the quality of care to be low or very low. Delays were experienced in medical visits with GPs and specialists. The designed survey is valid, relevant and representative of access to health services in Colombia. Empirically, the pilot showed institutional weaknesses in a municipality of the country, indicating that health coverage does not in practice mean real and effective access to health services. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  9. “Enemy Territory”: Immigration Enforcement in the US-Mexico Borderlands

    Directory of Open Access Journals (Sweden)

    Walter A. Ewing

    2014-08-01

    Full Text Available For the last two decades, the guiding strategy of immigration enforcement along the US-Mexico border has been “prevention through deterrence,” or stopping unauthorized immigrants from entering the country rather than apprehending those who have already crossed the border. “Prevention through deterrence” has entailed a massive concentration of enforcement personnel and resources along the border and at ports of entry. It has also led to the detention and removal of increasing numbers of unauthorized immigrants and far greater use of “expedited removal.” As gauged by the doubling in size of the unauthorized immigrant population over the same period, “prevention through deterrence” has not been a successful enforcement strategy. Moreover, it has funneled more migrants to their death in the deserts and mountains of the southwest as they (and smugglers resort to increasingly dangerous routes to evade border enforcement. In addition, there has been public concern over ethnic profiling and the use of extraordinary authority by Border Patrol agents to conduct arbitrary searches within 100 miles of the border. Despite these problems, the federal government continues to spend billions of dollars each year on the “prevention through deterrence” strategy.A first step in overcoming the deficiencies of this border enforcement strategy is to strengthen accountability within the Border Patrol, so that allegations of excessive force and abuse are investigated and adjudicated promptly and appropriately. The culture of the Border Patrol must be transformed to foster respect for rights. More broadly, the mission of the Border Patrol should be to capture dangerous individuals and to disrupt the operations of the transnational criminal organizations that traffic people, drugs, guns, and money. In addition, providing more pathways to legal entry through immigration reform would enhance border security by attenuating the flow of unauthorized

  10. What Remains on Your Mind After You Are Done?: Flexible Regulation of Knowledge Accessibility

    Science.gov (United States)

    Hedberg, Per H.; Higgins, E. Tory

    2011-01-01

    The accessibility of stored knowledge has been found to decline over time after activation without further stimulation. A special case is goal pursuit; goal-related knowledge remains accessible until goal completion, and then its accessibility declines rapidly. We hypothesized that after goal completion the decline in accessibility of goal-related knowledge would be especially rapid for strong promotion-focused individuals because their motivation to eagerly advance beyond the status quo would make accessibility of this knowledge an irrelevant detriment. We hypothesized an opposite effect for strongly prevention-predominant individuals because their motivation to vigilantly maintain a satisfactory state would make accessibility of this knowledge continually relevant. The results of two studies supported both these predicted moderators of accessibility change. Indeed, we found that for strongly prevention-predominant participants, knowledge accessibility actually increased over time after goal completion. We discuss how even basic cognitive mechanisms, like changes in accessibility, can be affected by general motivational concerns. PMID:21765541

  11. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislationñ€”Youth Access. The STATE...

  12. An analysis of flight Quick Access Recorder (QAR) data and its applications in preventing landing incidents

    International Nuclear Information System (INIS)

    Wang, Lei; Wu, Changxu; Sun, Ruishan

    2014-01-01

    A long landing is one type of flight incident that will multiply the risk of a runway excursion. It occurs frequently but receives little attention in research due to difficulty in obtaining the real flight data. The aim of this paper is to discover key flight parameter features of long landing incidents by analyzing Quick Access Recorder (QAR) data and put forward prevention measures from the perspective of pilot operation at the same time. First, 73 flight performance parameter variables and 4 operation parameter variables were defined, covering major landing stages from 1500 ft to touchdown. Then 128 cases of selected QAR data were divided into two groups according to the threshold of identifying normal and long landing. Second, each flight parameter variable of these 128 flights was compared between groups and then the logistic and linear regression models were developed respectively to further examine the links between touchdown distance and these flight parameter variables. Third, potential flight operation causing performance difference of long landing incidents was also analyzed. Finally results indicate that the period of 200 ft to touchdown is the key stage of landing and flare is the most critical operation affecting touchdown distance. It is suggested that the pilot should inspect the ratio of descent rate and groundspeed carefully at the height of 50 ft and pilot's faster and steady pulling up columns is probably helpful for an excellent flare and landing. The findings are expected to be applied into flight operation practice for further preventing long landing incidents and even the runway excursion accidents

  13. Measuring the Development Patterns of Urban Villages in Shenzhen

    NARCIS (Netherlands)

    Hao, P.; Geertman, S.C.M.; Hooimeijer, P.; Sliuzas, R.

    2011-01-01

    Urban villages are widespread in many Chinese cities, providing affordable and accessible housing for rural migrants. These urban villages are developed by the indigenous village population base on a self-help approach and in an unauthorized style. Consequently, urban villages are characterized by

  14. The Classroom, Board Room, Chat Room, and Court Room: School Computers at the Crossroads.

    Science.gov (United States)

    Stewart, Michael

    2000-01-01

    In schools' efforts to maximize technology's benefits, ethical considerations have often taken a back seat. Computer misuse is growing exponentially and assuming many forms: unauthorized data access, hacking, piracy, information theft, fraud, virus creation, harassment, defamation, and discrimination. Integrated-learning activities will help


  15. 76 FR 14794 - Special Conditions: Boeing Model 747-8 Airplanes, Systems and Data Networks Security-Isolation or...

    Science.gov (United States)

    2011-03-18

    ... Networks Security--Isolation or Protection From Unauthorized Passenger Domain Systems Access AGENCY... systems and data networks. The applicable airworthiness regulations do not contain adequate or appropriate... connected networks. The network architecture would be used for a diverse set of functions, including: 1...

  16. 33 CFR 107.200 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... United States; or (iv) A corporation, partnership, association, trust, joint venture, limited liability company, limited liability partnership, or any other legal entity, created and authorized to own vessels... NATIONAL VESSEL AND FACILITY CONTROL MEASURES AND LIMITED ACCESS AREAS Unauthorized Entry Into Cuban...

  17. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  18. A randomized trial of motivational interviewing and facilitated contraceptive access to prevent rapid repeat pregnancy among adolescent mothers.

    Science.gov (United States)

    Stevens, Jack; Lutz, Robyn; Osuagwu, Ngozi; Rotz, Dana; Goesling, Brian

    2017-10-01

    Most interventions designed to reduce teen pregnancy rates have not focused on pregnant and/or parenting adolescents. Therefore, a large randomized controlled trial was conducted regarding a motivational interviewing program entitled Teen Options to Prevent Pregnancy in a low-income sample of adolescent mothers. This program recommended monthly sessions between a participant and a registered nurse over 18 months. This program also featured facilitated birth control access through transportation assistance and a part-time contraceptive clinic. The impact of this program on rapid repeat pregnancies at 18 months after enrollment was evaluated. Five hundred ninety-eight adolescent females were enrolled from 7 obstetrics-gynecology clinics and 5 postpartum units of a large hospital system in a Midwestern city. Each participant was enrolled at least 28 weeks pregnant or less than 9 weeks postpartum. Each participant was randomized to either the Teen Options to Prevent Pregnancy intervention or a usual-care control condition. Intervention participants averaged 4.5 hours of assistance. Participants were contacted by blinded research staff at 6 and 18 months to complete self-report surveys. Differences in outcomes between the intervention and control groups were assessed using ordinary least-squares regression. There was an 18.1% absolute reduction in self-reported repeat pregnancy in the intervention group relative to the control group (20.5% vs 38.6%%; P Teen Options to Prevent Pregnancy program represents one of the few evidence-based interventions to reduce rapid repeat teen pregnancy. This relatively brief intervention may be a viable alternative to more time-intensive programs that adolescent mothers may be unable or unwilling to receive. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. 40 CFR 264.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...

  20. 40 CFR 265.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...

  1. Planar ultra thin glass seals with optical fiber interface for monitoring tamper attacks on security eminent components

    Science.gov (United States)

    Thiel, M.; Flachenecker, G.; Schade, W.; Gorecki, C.; Thoma, A.; Rathje, R.

    2017-11-01

    Optical seals consisting of waveguide Bragg grating sensor structures in ultra thin glass transparencies have been developed to cover security relevant objects for detection of unauthorized access. For generation of optical signature in the seals, femtosecond laser pulses were used. The optical seals were connected with an optical fiber to enable external read out of the seal. Different attack scenarios for getting undetected access to the object, covered by the seal, were proven and evaluated. The results presented here, verify a very high level of security. An unauthorized detaching and subsequent replacement by original or copy of the seals for tampering would be accompanied with a very high technological effort, posing a substantial barrier towards an attacker. Additionally, environmental influences like temperature effects have a strong but reproducible influence on signature, which in context of a temperature reference database increases the level of security significantly.

  2. Using a service sector segmented approach to identify community stakeholders who can improve access to suicide prevention services for veterans.

    Science.gov (United States)

    Matthieu, Monica M; Gardiner, Giovanina; Ziegemeier, Ellen; Buxton, Miranda

    2014-04-01

    Veterans in need of social services may access many different community agencies within the public and private sectors. Each of these settings has the potential to be a pipeline for attaining needed health, mental health, and benefits services; however, many service providers lack information on how to conceptualize where Veterans go for services within their local community. This article describes a conceptual framework for outreach that uses a service sector segmented approach. This framework was developed to aid recruitment of a provider-based sample of stakeholders (N = 70) for a study on improving access to the Department of Veterans Affairs and community-based suicide prevention services. Results indicate that although there are statistically significant differences in the percent of Veterans served by the different service sectors (F(9, 55) = 2.71, p = 0.04), exposure to suicidal Veterans and providers' referral behavior is consistent across the sectors. Challenges to using this framework include isolating the appropriate sectors for targeted outreach efforts. The service sector segmented approach holds promise for identifying and referring at-risk Veterans in need of services. Reprint & Copyright © 2014 Association of Military Surgeons of the U.S.

  3. Mapping the availability and accessibility of healthy food in rural and urban New Zealand--Te Wai o Rona: Diabetes Prevention Strategy.

    Science.gov (United States)

    Wang, Jing; Williams, Margaret; Rush, Elaine; Crook, Nic; Forouhi, Nita G; Simmons, David

    2010-07-01

    Uptake of advice for lifestyle change for obesity and diabetes prevention requires access to affordable 'healthy' foods (high in fibre/low in sugar and fat). The present study aimed to examine the availability and accessibility of 'healthy' foods in rural and urban New Zealand. We identified and visited ('mapped') 1230 food outlets (473 urban, 757 rural) across the Waikato/Lakes areas (162 census areas within twelve regions) in New Zealand, where the Te Wai O Rona: Diabetes Prevention Strategy was underway. At each site, we assessed the availability of 'healthy' foods (e.g. wholemeal bread) and compared their cost with those of comparable 'regular' foods (e.g. white bread). Healthy foods were generally more available in urban than rural areas. In both urban and rural areas, 'healthy' foods were more expensive than 'regular' foods after adjusting for the population and income level of each area. For instance, there was an increasing price difference across bread, meat, poultry, with the highest difference for sugar substitutes. The weekly family cost of a 'healthy' food basket (without sugar) was 29.1% more expensive than the 'regular' basket ($NZ 176.72 v. $NZ 136.84). The difference between the 'healthy' and 'regular' basket was greater in urban ($NZ 49.18) than rural areas ($NZ 36.27) in adjusted analysis. 'Healthy' foods were more expensive than 'regular' choices in both urban and rural areas. Although urban areas had higher availability of 'healthy' foods, the cost of changing to a healthy diet in urban areas was also greater. Improvement in the food environment is needed to support people in adopting healthy food choices.

  4. Consideration on Measures against Insiders Threats in ROK

    International Nuclear Information System (INIS)

    Lee, Seungmin; Yim, Hobin; Hong, Yunjeong

    2015-01-01

    They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. Because of these reasons, IAEA published 'The Implementing Guide Preventive and Protective Measures against Insider Threats, IAEA Nuclear Security Series No. 8' to help understanding of the Member States. This paper focus on the current status of the measures to prevent, detect and respond to potential insiders at nuclear facilities in Republic of KOREA. Insiders are able to take advantage of their access rights and knowledge of facilities where they are working or have worked to bypass dedicated security measures. Therefore, insiders can be the most dangerous threats to cyber security, safety measures, and material control and accountancy of nuclear facilities. Preventive and protective measures against the potential insiders in the nuclear facilities are yet insufficient according to the security inspection results. Especially, preventive and protective measures for unauthorized removal of nuclear material by insiders are the weakest area of whole security systems and should be further strengthened

  5. Consideration on Measures against Insiders Threats in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seungmin; Yim, Hobin; Hong, Yunjeong [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. Because of these reasons, IAEA published 'The Implementing Guide Preventive and Protective Measures against Insider Threats, IAEA Nuclear Security Series No. 8' to help understanding of the Member States. This paper focus on the current status of the measures to prevent, detect and respond to potential insiders at nuclear facilities in Republic of KOREA. Insiders are able to take advantage of their access rights and knowledge of facilities where they are working or have worked to bypass dedicated security measures. Therefore, insiders can be the most dangerous threats to cyber security, safety measures, and material control and accountancy of nuclear facilities. Preventive and protective measures against the potential insiders in the nuclear facilities are yet insufficient according to the security inspection results. Especially, preventive and protective measures for unauthorized removal of nuclear material by insiders are the weakest area of whole security systems and should be further strengthened.

  6. Conventional Cryptography.

    Science.gov (United States)

    Wright, Marie A.

    1993-01-01

    Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)

  7. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  8. Integrated environmental modeling : an SDI - based framework for integrated assessment of agricultural information

    NARCIS (Netherlands)

    Imran, Muhammad; Zurita-Milla, R.; de By, R.A.

    2011-01-01

    Urban villages are widespread in many Chinese cities, providing affordable and accessible hous-ing for rural migrants. These urban villages are developed by the indigenous village population base on a self-help approach and in an unauthorized style. Consequently, urban villages are characterized by

  9. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Science.gov (United States)

    2010-10-01

    ... information, the loss, misuse, or unauthorized access to, or modification of which could adversely affect the... inspection, investigation, and audit to safeguard against threats and hazards to the integrity, availability... Official's written accreditation decision from the COR, maintain the approved level of system security as...

  10. Defense Cybersecurity: Opportunities Exist for DOD to Share Cybersecurity Resources with Small Businesses

    Science.gov (United States)

    2015-09-01

    disrupting the victim. Examples of malware include logic bombs, Trojan Horses, ransomware, viruses, and worms. Phishing/spear phishing A digital form of...which can be used to obtain unauthorized access to sensitive information in a database. War driving Driving a vehicle through cities or

  11. 75 FR 2433 - Special Conditions: Boeing Model 747-8/-8F Airplanes, Systems and Data Networks Security...

    Science.gov (United States)

    2010-01-15

    ... Conditions No. 25-401-SC] Special Conditions: Boeing Model 747-8/-8F Airplanes, Systems and Data Networks Security--Protection of Airplane Systems and Data Networks From Unauthorized External Access AGENCY... that effective electronic system security protection strategies are implemented to protect the airplane...

  12. Material Control and Accounting (MC and A) System Upgrades and Performance Testing at the Russian Federal Nuclear Center-All-Russian Scientific Research Institute of Experimental Physics (RFNC-VNIIEF)

    International Nuclear Information System (INIS)

    Bushmelev, Vadim; Viktorov, Vladimir; Zhikharev, Stanislav; Yuferev, Vladimir; Singh, Surinder Paul; Kuzminski, Jozef; Hogan, Kevin; McKisson, Jacquelin

    2008-01-01

    The All-Russian Scientific Research Institute of Experimental Physics (VNIIEF), founded in 1946 at the historic village of Sarov, in Nizhniy Novgorod Oblast, is the largest nuclear research center in the Rosatom complex. In the framework of international collaboration, the United States (US) Department of Energy/National Nuclear Security Agency, in cooperation with US national laboratories, on the one hand, Rosatom and VNIIEF on the other hand, have focused their cooperative efforts to upgrade the existing material protection control and accountability system to prevent unauthorized access to the nuclear material. In this paper we will discuss the present status of material control and accounting (MC and A) system upgrades and the preliminary results from a pilot program on the MC and A system performance testing that was recently conducted at one technical area.

  13. HIV/AIDS programmes should focus on improved access.

    Science.gov (United States)

    Manning, A

    2000-10-14

    This paper discusses the need for HIV/AIDS programs in sub-Saharan countries to focus more on improved access to information to empower poor people living in remote areas. It is noted that despite Glaxo Wellcome's move to reduce the cost of antiretroviral therapy, it is unlikely to have an impact on most of those infected with or affected by HIV/AIDS, since concerns regarding lack of sustainability, bureaucratic administration, and communication difficulties predominate in the country. In this regard, it is therefore recommended that national HIV/AIDS programs be balanced with the needs of both the community and the individual and in prevention and care. Health workers should be explicit in confronting traditional beliefs, such as those about gender roles and traditional medicine, in prevention campaigns. Moreover, there is also an urgent need to improve access to condoms; strengthen health programs such as directly observed treatment short-term (DOTS) courses for tuberculosis and the syndromic approach to sexually transmitted disease treatment; and improve practical support to communities caring for those who are sick and the orphans. Lastly, all partners working with prevention programs should use the more positive community attitudes towards HIV/AIDS issues seen in many sub-Saharan countries to develop evidence-based programs that focus more on improved access and less on sustainability.

  14. Pediatric central venous access devices: nursing interventions

    Directory of Open Access Journals (Sweden)

    Duffy EA

    2017-05-01

    Full Text Available Elizabeth A Duffy, Kathryn N Nelson Department of Health Behavior and Biological Sciences, The University of Michigan School of Nursing, Ann Arbor, MI, USA Abstract: A central venous catheter (CVC is an indwelling catheter that provides permanent or temporary stable venous access for both acute and chronically ill pediatric patients. These catheters provide stable venous access that can be used for a variety of medical purposes including drawing blood, hemodynamic monitoring, infusion of intravenous medications, infusion of intravenous fluids, chemotherapy, blood products, and parenteral nutrition. Each day, nurses access and care for CVCs in infants, children, and adolescents; the precision of this care can prevent life-threatening complications. The purpose of this review and the case study is to highlight the importance and components of evidence-based nursing practice in pediatric CVC care. A historical perspective of CVC care is provided in conjunction with current national initiatives to improve patient outcomes for children with CVCs. Infection prevention, clinical practice guidelines, quality improvement, and evidence-based care bundles are discussed. Keywords: pediatric nursing, central venous catheters, central line-associated bloodstream infection, care bundles, pediatric case study 

  15. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2017. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislationñ€”Youth Access....

  16. DOE's Pollution Prevention Information Clearinghouse (EPIC)

    International Nuclear Information System (INIS)

    Otis, P.T.

    1994-05-01

    The US Department of Energy's (DOE's) Pollution Prevention Information Clearinghouse (EPIC) is a computer system intended for the exchange of pollution prevention information DOE-wide. EPIC is being developed as a distributed system that will allow access to other databases and applications. The first prototype of EPIC (Prototype I) was put on-line in January 1994. Prototype I contains information on EM-funded pollution prevention projects; relevant laws, regulations, guidance, and policy; facility and DOE contacts; and meetings and conferences. Prototype I also gives users access to the INEL Hazardous Solvent Substitution Data System (HSSDS) and to information contained on the US Environmental Protection Agency's (EPNS) Pollution Prevention Infbrmation Exchange System (PIES) as a test of the distributed system concept. An initial user group of about 35 is testing and providing feedback on Prototype I. Prototype II, with a Graphical User Interface (GUI), is planned for the end of CY94. This paper describes the current state of EPIC in terms of architecture, user interface, and information content. Plans for Prototype II and the final system are then discussed. The EPIC development effort is being coordinated with EPA and US Department of Defense (DoD) efforts to develop or upgrade their pollution prevention information exchange systems

  17. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  18. Code of conduct on the safety and security of radioactive sources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-01

    The objectives of the Code of Conduct are, through the development, harmonization and implementation of national policies, laws and regulations, and through the fostering of international co-operation, to: (i) achieve and maintain a high level of safety and security of radioactive sources; (ii) prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources, so as to reduce the likelihood of accidental harmful exposure to such sources or the malicious use of such sources to cause harm to individuals, society or the environment; and (iii) mitigate or minimize the radiological consequences of any accident or malicious act involving a radioactive source. These objectives should be achieved through the establishment of an adequate system of regulatory control of radioactive sources, applicable from the stage of initial production to their final disposal, and a system for the restoration of such control if it has been lost. This Code relies on existing international standards relating to nuclear, radiation, radioactive waste and transport safety and to the control of radioactive sources. It is intended to complement existing international standards in these areas. The Code of Conduct serves as guidance in general issues, legislation and regulations, regulatory bodies as well as import and export of radioactive sources. A list of radioactive sources covered by the code is provided which includes activities corresponding to thresholds of categories.

  19. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    2004-01-01

    The objectives of the Code of Conduct are, through the development, harmonization and implementation of national policies, laws and regulations, and through the fostering of international co-operation, to: (i) achieve and maintain a high level of safety and security of radioactive sources; (ii) prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources, so as to reduce the likelihood of accidental harmful exposure to such sources or the malicious use of such sources to cause harm to individuals, society or the environment; and (iii) mitigate or minimize the radiological consequences of any accident or malicious act involving a radioactive source. These objectives should be achieved through the establishment of an adequate system of regulatory control of radioactive sources, applicable from the stage of initial production to their final disposal, and a system for the restoration of such control if it has been lost. This Code relies on existing international standards relating to nuclear, radiation, radioactive waste and transport safety and to the control of radioactive sources. It is intended to complement existing international standards in these areas. The Code of Conduct serves as guidance in general issues, legislation and regulations, regulatory bodies as well as import and export of radioactive sources. A list of radioactive sources covered by the code is provided which includes activities corresponding to thresholds of categories

  20. Epidemiology, surveillance, and prevention of bloodstream infections in hemodialysis patients.

    Science.gov (United States)

    Patel, Priti R; Kallen, Alexander J; Arduino, Matthew J

    2010-09-01

    Infections cause significant morbidity and mortality in patients undergoing hemodialysis. Bloodstream infections (BSIs) are particularly problematic, accounting for a substantial number of hospitalizations in these patients. Hospitalizations for BSI and other vascular access infections appear to have increased dramatically in hemodialysis patients since 1993. These infections frequently are related to central venous catheter (CVC) use for dialysis access. Regional initiatives that have shown successful decreases in catheter-related BSIs in hospitalized patients have generated interest in replicating this success in outpatient hemodialysis populations. Several interventions have been effective in preventing BSIs in the hemodialysis setting. Avoiding the use of CVCs in favor of access types with lower associated BSI risk is among the most important. When CVCs are used, adherence to evidence-based catheter insertion and maintenance practices can positively influence BSI rates. In addition, facility-level surveillance to detect BSIs and stimulate examination of vascular access use and care practices is essential to a comprehensive approach to prevention. This article describes the current epidemiology of BSIs in hemodialysis patients and effective prevention strategies to decrease the incidence of these devastating infections.

  1. Barriers to Securing Data on BluetoothÂź-Enabled Mobile Devices: A Phenomenological Study

    Science.gov (United States)

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated


  2. Detecting authorized and unauthorized genetically modified organisms containing vip3A by real-time PCR and next-generation sequencing.

    Science.gov (United States)

    Liang, Chanjuan; van Dijk, Jeroen P; Scholtens, Ingrid M J; Staats, Martijn; Prins, Theo W; Voorhuijzen, Marleen M; da Silva, Andrea M; Arisi, Ana Carolina Maisonnave; den Dunnen, Johan T; Kok, Esther J

    2014-04-01

    The growing number of biotech crops with novel genetic elements increasingly complicates the detection of genetically modified organisms (GMOs) in food and feed samples using conventional screening methods. Unauthorized GMOs (UGMOs) in food and feed are currently identified through combining GMO element screening with sequencing the DNA flanking these elements. In this study, a specific and sensitive qPCR assay was developed for vip3A element detection based on the vip3Aa20 coding sequences of the recently marketed MIR162 maize and COT102 cotton. Furthermore, SiteFinding-PCR in combination with Sanger, Illumina or Pacific BioSciences (PacBio) sequencing was performed targeting the flanking DNA of the vip3Aa20 element in MIR162. De novo assembly and Basic Local Alignment Search Tool searches were used to mimic UGMO identification. PacBio data resulted in relatively long contigs in the upstream (1,326 nucleotides (nt); 95 % identity) and downstream (1,135 nt; 92 % identity) regions, whereas Illumina data resulted in two smaller contigs of 858 and 1,038 nt with higher sequence identity (>99 % identity). Both approaches outperformed Sanger sequencing, underlining the potential for next-generation sequencing in UGMO identification.

  3. Guidelines for prevention in psychology.

    Science.gov (United States)

    2014-04-01

    The effectiveness of prevention to enhance human functioning and reduce psychological distress has been demonstrated. From infancy through adulthood, access to preventive services and interventions is important to improve the quality of life and human functioning and reduce illness and premature death. The importance of prevention is consistent with the Patient Protection and Affordable Care Act of 2010. Even with the increased focus on prevention, psychology training programs rarely require specific courses on prevention. In particular, conceptualizations about best practices in prevention, particularly at the environmental level, are lacking. Therefore, psychologists engaged in prevention can benefit from a set of guidelines that address and inform prevention practices. Accordingly, the Guidelines for Prevention in Psychology are intended to "inform psychologists, the public, and other interested parties regarding desirable professional practices" in prevention. The Prevention Guidelines are recommended based on their potential benefits to the public and the professional practice of psychology. They support prevention as an important area of practice, research, and training for psychologists. The Guidelines give increased attention to prevention within APA, encouraging psychologists to become involved with preventive activities relevant to their area of practice. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  4. Improving access to optometry services for people at risk of preventable sight loss: a qualitative study in five UK locations.

    Science.gov (United States)

    Leamon, S; Hayden, C; Lee, H; Trudinger, D; Appelbee, E; Hurrell, D-L; Richardson, I

    2014-12-01

    Reducing preventable sight loss is an increasing priority for public health and health care providers. We examined the factors affecting people's use of optometry services in population groups at increased risk of sight loss. This is a qualitative study in five UK locations. In England, participants were from the Pakistani and Black Caribbean communities; in Scotland from the Pakistani community; and in Northern Ireland and Wales from white socio-economically deprived communities. Thirty-four focus groups were conducted (n = 289). The study included people who attend optometry services and people not engaged with services. Barriers to access included limited awareness of eye health and eye disease, concern about the cost of spectacles and the appropriateness of optometry in a commercial setting. Attendance at the optometrist was primarily symptom led. A positive previous experience or continuing relationship with the optometrist helped to alleviate the barriers and promote attendance. Addressing the disparity between the broader messages about eye health and the current perception of the function of optometry could help improve access to services. Uptake may be improved through the co-production of interventions that better resonate with local communities. Non-retail service delivery options should be explored. © The Author 2014, Published by Oxford University Press on behalf of Faculty of Public Health.

  5. Wearables for all : development of guidelines to stimulate accessible wearable technology design

    NARCIS (Netherlands)

    Wentzel, Jobke; Velleman, Eric; van der Geest, Thea

    2016-01-01

    In this paper, we present the rationale and approach for establishing guidelines for the development of accessible wearables. Wearable technology is increasingly integrated in our everyday lives. Therefore, ensuring accessibility is pivotal to prevent a digital divide between persons who have and

  6. Survey of Cyber Security Methods for the Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yoo Rark; Lee, Jae Cheol; Choi, Young Soo; Hong, Seok Boong [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2009-10-15

    Cyber security includes the method of protecting information, computer programs, and other computer system assets. Hardware security, which is the security of computer assets and capital equipment, refers to computer location, access control, fire protection, and storage procedures. Such measures as badges, electronic identification keys, alarm systems, and physical barriers at entries are used for this purpose. Software security entails the protection of software assets such as Application Programs, the Operating System, and the Data Base Management System and stored information. Special user numbers and passwords are typically used to prevent unauthorized access to software and data. In addition to security for hardware and software, good internal control also requires that measures be taken to prevent loss or accidental destruction of data. Cyber attacks create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for the digital I and C network of the NPP has been established for years by KINS, but its scope is very broad and conceptual. We will propose a cyber security method based on cryptography and authentication that is developed for the digital I and C network of the NPP.

  7. Survey of Cyber Security Methods for the Nuclear Power Plants

    International Nuclear Information System (INIS)

    Choi, Yoo Rark; Lee, Jae Cheol; Choi, Young Soo; Hong, Seok Boong

    2009-01-01

    Cyber security includes the method of protecting information, computer programs, and other computer system assets. Hardware security, which is the security of computer assets and capital equipment, refers to computer location, access control, fire protection, and storage procedures. Such measures as badges, electronic identification keys, alarm systems, and physical barriers at entries are used for this purpose. Software security entails the protection of software assets such as Application Programs, the Operating System, and the Data Base Management System and stored information. Special user numbers and passwords are typically used to prevent unauthorized access to software and data. In addition to security for hardware and software, good internal control also requires that measures be taken to prevent loss or accidental destruction of data. Cyber attacks create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for the digital I and C network of the NPP has been established for years by KINS, but its scope is very broad and conceptual. We will propose a cyber security method based on cryptography and authentication that is developed for the digital I and C network of the NPP

  8. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  9. Purpose control : did you process the data for the intended purpose?

    NARCIS (Netherlands)

    Petkovic, M.; Prandi, D.; Zannone, N.; Jonker, W.; Petkovic, M.

    2011-01-01

    Data protection legislation requires personal data to be collected and processed only for lawful and legitimate purposes. Unfortunately, existing protection mechanisms are not appropriate for purpose control: they only prevent unauthorized actions from occurring and do not guarantee that the data

  10. 42 CFR 3.102 - Process and requirements for initial and continued listing of PSOs.

    Science.gov (United States)

    2010-10-01

    ... conduct of patient safety activities, will take appropriate security measures to prevent unauthorized... SERVICES GENERAL PROVISIONS PATIENT SAFETY ORGANIZATIONS AND PATIENT SAFETY WORK PRODUCT PSO Requirements... patient safety reporting system to which health care providers (other than members of the entity's...

  11. [Access to intermittent preventive treatment (IPt) in a situation of abolition of user's fee: role of economic welfare].

    Science.gov (United States)

    Faye, A; Manga, N M; Seck, I; Niang, K; Leye, M M; Diagne-Camara, M; Diongue, M; Ba, M; Ndiaye, P; Tal-Dia, A

    2012-08-01

    In Senegal, the free distribution of sulfadoxine pyrimethamine during antenatal care is recommended to remove the disparity in the context of intermittent preventive treatment against malaria. The objective of this study was thus to identify factors influencing access to treatment in a situation of abolition of user fees. It was a cross-sectional and analytical study. It covered a sample of 1906 women aged 15-49 years randomly selected during the national survey on malaria in Senegal. Data were collected during a personal interview. The economic well-being was measured from the characteristics of housing and durable goods. The multivariate analysis was performed using logistic regression. The average age was 27.94 ± 5.34, 64.27% resided in rural area and 71.8% had received no schooling. Among the surveyed women, 23% were in the poorest quintile, while 16.3% were in the richest. Intermittent preventive treatment was performed in 49.3%. IPt were made more in urban areas (OR 1.45 95% [1.17 to 1.72]). It increased with the level of education with an OR of 1.5 and 1.68 in primary and secondary. The completion of the IPt increased with economic welfare. The OR ranged from 1.44 to 2.95 in the second quintile to the richest. Free medication does not necessarily benefit poor people. Other accompanying measures must be developed to facilitate the distribution of drugs particularly at community level with the involvement of people.

  12. 36 CFR 1192.125 - Mobility aid accessibility.

    Science.gov (United States)

    2010-07-01

    ... COMPLIANCE BOARD AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY GUIDELINES FOR TRANSPORTATION VEHICLES... fold or retract into the stowed position. (ii) Exception. Where physical or safety constraints prevent... a lift design of this type if the stowed position is within the passenger compartment and the lift...

  13. Observations on physical protection methods for protecting against unauthorized acts by an insider

    International Nuclear Information System (INIS)

    Ericson, D.M.; Goldman, L.A.; Lobner, R.R.

    1983-01-01

    Two basic approaches have evolved over the past several years for physical protection against sabotage by insiders. One, area-type physical protection, involves the use of access controls at area boundaries. Current practices at nuclear power plants generally fall into this category. The second, component-level physical protection, involves hardware at individual components as well as access controls at the boundary. The area-type physical protection concepts include team, area, and operational zoning. Team zoning requires the formation of multiperson teams that must be used to gain access to vital areas. Area zoning divides the plant into two or more zones, each of which is operated and maintained by separate, dedicated teams. Operational zoning is a closed-loop access control system that permits an initial vital area access, but blocks access to certain other vital areas until the operability of equipment in the first area is verified by test or inspection. Component-level physical protection is also a closed-loop system in which both area and component access are monitored. Each of the above measures can provide effective protection against an insider in certain instances, but each has weaknesses that must be recognized. An approach for protection against the insider is to take the most promising features of each of the above physical protection measures and supplement these capabilities with damage control and design changes as appropriate for a particular plant

  14. Computer Ethics Topics and Teaching Strategies.

    Science.gov (United States)

    DeLay, Jeanine A.

    An overview of six major issues in computer ethics is provided in this paper: (1) unauthorized and illegal database entry, surveillance and monitoring, and privacy issues; (2) piracy and intellectual property theft; (3) equity and equal access; (4) philosophical implications of artificial intelligence and computer rights; (5) social consequences


  15. Review of "The basics of hacking and penetration testing : ethical hacking and penetration testing made easy. P. Engebretson, Syngress Publishing, Waltham, MA, 2011"

    NARCIS (Netherlands)

    Hartel, Pieter H.

    2012-01-01

    This is a book on the “dark side‿ of information technology, as it describes how the vulnerabilities of systems and networks can be exploited to gain unauthorized access. It is important that students and practitioners understand how advanced the state of the art in exploiting vulnerabilities is,

  16. Phlebitis: treatment, care and prevention.

    Science.gov (United States)

    Higginson, Ray; Parry, Andrew

    Peripheral venous catheter-associated phlebitis is caused by inflammation to the vein at a cannula access site. It can have a mechanical, chemical or infectious cause. Good practice when inserting a cannula, including appropriate choice of device and site, can help to prevent phlebitis. Good infection control techniques are also vital in preventing the condition. There are two phlebitis scoring systems, which should be used in routine practice to identify and treat early signs of the Peripheral venous cannulation

  17. A Solution of Data-Level Security Access Control%äž€ç§æ•°æźçș§ćź‰ć…šèźżé—źæŽ§ćˆ¶æ–čæĄˆâ‘ 

    Institute of Scientific and Technical Information of China (English)

    攐ć»ș; ćŸçœĄ; èźžèˆ’äșș

    2013-01-01

    To protect sensitive data in Web applications from unauthorized access, a data access strategy consisting of user set and data access authority is proposed, which is based on traditional role based access control model. The data access strategy is related to function. After parsing the original business SQL, row-level-rules are applied to filter the data records in row level, and column-level-rules are applied to mask the corresponding attributes of the data records. A data security access control framework is designed. Finally, this strategy is implemented in the Agricultural Products Supply Chain Management System of Xinfadi, and the validity and effectiveness of the presented strategy is demonstrated.%äžșäș†æ›Žć„œćœ°äżæŠ€ Web ćș”ç”šçł»ç»Ÿäž­æ•æ„Ÿæ•°æźäžèą«éžæł•èźżé—źă€‚ćœšäŒ ç»Ÿçš„ćŸșäșŽè§’è‰Čçš„èźżé—źæŽ§ćˆ¶æšĄćž‹ćŸșçĄ€äžŠæć‡șäș†ç”±ç”šæˆ·é›†ćˆć’Œæ•°æźèźżé—źæƒé™æž„æˆçš„æ•°æźèźżé—źç­–ç•„ćč¶ć°†æ•°æźèźżé—źç­–ç•„ć…łè”ćˆ°ćŠŸèƒœïŒŒé€šèż‡ćŻčćŽŸæœ‰äžšćŠĄ SQL è§ŁæžïŒŒäœżç”šèĄŒçș§èźżé—źæƒé™ćŻčæ•°æźèź°ćœ•èż›èĄŒèĄŒçș§èż‡æ»€ïŒŒć†æ čæźćˆ—çș§èźżé—źæƒé™ćŻčæ•°æźèź°ćœ•ç›žćș”ć±žæ€§èż›èĄŒć±è”œć€„ç†æ„èż›èĄŒæ•°æźćź‰ć…šèźżé—źæŽ§ćˆ¶ïŒŒćč¶èźŸèźĄäș†æ•°æźćź‰ć…šèźżé—źæŽ§ćˆ¶çš„æĄ†æž¶ă€‚æœ€ćŽć°†èŻ„æ–čæĄˆćș”ç”šćˆ°æ–°ć‘ćœ°ć†œäș§ć“äŸ›ćș”é“ŸçźĄç†ćčłć°äž­ïŒŒéȘŒèŻäș†èŻ„æ–čæĄˆçš„ćŻèĄŒæ€§ć’Œæœ‰æ•ˆæ€§ă€‚

  18. 77 FR 4561 - Meeting of the Community Preventive Services Task Force

    Science.gov (United States)

    2012-01-30

    ... Disease, Mental Health, and Alcohol. Meeting Accessibility: This meeting is open to the public, limited... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the Community Preventive Services Task Force AGENCY: Centers for Disease Control and Prevention (CDC...

  19. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  20. Associations of HIV Testing, Sexual Risk and Access to Prevention Among Female Sex Workers in the Dominican Republic.

    Science.gov (United States)

    Johnston, Lisa G; Bonilla, Luis; Caballero, Tessie; Rodriguez, Martha; Dolores, Yordana; de la Rosa, Miguel Angel; Malla, Annie; Burnett, Janet; Terrero, VĂ­ctor; Martinez, Sam; Morgan, Oliver

    2017-08-01

    The Caribbean region has one of the highest proportions of HIV in the general female population attributable to sex work. In 2008 (n = 1256) and 2012 (n = 1525) in the Dominican Republic, HIV biological and behavioral surveys were conducted among female sex workers (FSW) in four provinces using respondent driven sampling. Participants were ≄15 years who engaged in intercourse in exchange for money in the past 6 months and living/working in the study province. There were no statistically significant changes in HIV and other infections prevalence from 2008 to 2012, despite ongoing risky sexual practices. HIV testing and receiving results was low in all provinces. FSW in 2012 were more likely to receive HIV testing and results if they participated in HIV related information and education and had regular checkups at health centers. Further investigation is needed to understand barriers to HIV testing and access to prevention services.

  1. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  2. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  3. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  4. 49 CFR 38.125 - Mobility aid accessibility.

    Science.gov (United States)

    2010-10-01

    ... Transportation Office of the Secretary of Transportation AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY... fold or retract into the stowed position. (ii) Exception. Where physical or safety constraints prevent... a lift design of this type if the stowed position is within the passenger compartment and the lift...

  5. Collecting costs of community prevention programs: communities putting prevention to work initiative.

    Science.gov (United States)

    Khavjou, Olga A; Honeycutt, Amanda A; Hoerger, Thomas J; Trogdon, Justin G; Cash, Amanda J

    2014-08-01

    Community-based programs require substantial investments of resources; however, evaluations of these programs usually lack analyses of program costs. Costs of community-based programs reported in previous literature are limited and have been estimated retrospectively. To describe a prospective cost data collection approach developed for the Communities Putting Prevention to Work (CPPW) program capturing costs for community-based tobacco use and obesity prevention strategies. A web-based cost data collection instrument was developed using an activity-based costing approach. Respondents reported quarterly expenditures on labor; consultants; materials, travel, and services; overhead; partner efforts; and in-kind contributions. Costs were allocated across CPPW objectives and strategies organized around five categories: media, access, point of decision/promotion, price, and social support and services. The instrument was developed in 2010, quarterly data collections took place in 2011-2013, and preliminary analysis was conducted in 2013. Preliminary descriptive statistics are presented for the cost data collected from 51 respondents. More than 50% of program costs were for partner organizations, and over 20% of costs were for labor hours. Tobacco communities devoted the majority of their efforts to media strategies. Obesity communities spent more than half of their resources on access strategies. Collecting accurate cost information on health promotion and disease prevention programs presents many challenges. The approach presented in this paper is one of the first efforts successfully collecting these types of data and can be replicated for collecting costs from other programs. Copyright © 2014 American Journal of Preventive Medicine. All rights reserved.

  6. Radiation portal evaluation parameters

    International Nuclear Information System (INIS)

    York, R.L.

    1998-01-01

    The detection of the unauthorized movement of radioactive materials is one of the most effective nonproliferation measures. Automatic special nuclear material (SNM) portal monitors are designed to detect this unauthorized movement and are an important part of the safeguard systems at US nuclear facilities. SNM portals differ from contamination monitors because they are designed to have high sensitivity for the low energy gamma-rays associated with highly enriched uranium (HEU) and plutonium. These instruments are now being installed at international borders to prevent the spread of radioactive contamination an SNM. In this paper the parameters important to evaluating radiation portal monitors are discussed. (author)

  7. Đ˜ĐĐąĐ•Đ“Đ Đ˜Đ ĐžĐ’ĐĐĐĐ«Đ™ КОМПЛЕКС Đ—ĐĐ©Đ˜ĐąĐ« ĐŸĐ ĐžĐ“Đ ĐĐœĐœĐĐ«Đ„ ПРОДУКбОВ

    Directory of Open Access Journals (Sweden)

    ПАРАМОНОВ ĐĐœŃ‚ĐŸĐœ ИĐČĐ°ĐœĐŸĐČоч

    2013-06-01

    Full Text Available The problem of against unauthorized use software protection is highlighted in the article. An approach is proposed in the form of an integrated software complex «License Control». The complex consists of modules set: setting (administration, installation, license’s integra-tor and plug-checking licenses. The approach is based on the method of code snippets integra-tion into the executable. Implementation is carried out through the creation of an additional section. The basic principles of integration and control of licenses are describes in this paper. The developed protection system solves the problems of ensuring intellectual property developer and prevents unauthorized use of the software.

  8. Poverty, Access to Health Care Services and Human Capital ...

    African Journals Online (AJOL)

    FIRST LADY

    socio-economic development because it is essential for a virile labour force ... Poverty and access to health care services are major development problems ..... including preventive, curative and palliative intervention, whether directed to.

  9. Access for all: contextualising HIV treatment as prevention in Swaziland

    NARCIS (Netherlands)

    Vernooij, E.; Mehlo, M.; Hardon, A.; Reis, R.

    2016-01-01

    This article explores how notions of the individual and population are evoked in two ongoing HIV treatment as prevention (TasP) implementation studies in Swaziland. By contrasting policy discourses with lived kinship experiences of people living with HIV, we seek to understand how TasP unfolds in

  10. Ergonomics and accessibility for people with visual impairment in hotels.

    Science.gov (United States)

    Dos Santos, Larissa Nascimento; de Carvalho, Ricardo José Matos

    2012-01-01

    This article presents a diagnosis of luxury or superior hotels in the city of Natal, located in the state of Rio Grande do Norte, in northeastern Brazil, in what concerns accessibility to the visually impaired. The main objective is to present the guiding principles to design actions and interventions that must be considered in the preparation or revision of technical standards and manuals of good practice in accessibility related to people with visual impairments who are hotel users. The survey showed that the hotels do not meet the normative indications of accessibility, their facilities are in-accessible (have prevented access) or of reduced accessibility and its employees are not prepared to provide adequate hospital services for people with visual impairment. It was concluded that some of the accessibility problems faced by people with visual impairments are also faced by people in general.

  11. 32 CFR 700.1138 - Responsibilities concerning marijuana, narcotics, and other controlled substances.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Responsibilities concerning marijuana, narcotics... concerning marijuana, narcotics, and other controlled substances. (a) All personnel shall endeavor to prevent and eliminate the unauthorized use of marijuana, narcotics and other controlled substances within the...

  12. Preventing Informal Urban Development

    DEFF Research Database (Denmark)

    Enemark, Stig; McLaren, Robin

    2008-01-01

    . This is directly linked to citizen participation in the process of land use control. Decentralisation should aim to combine responsibility for decision making with accountability for financial, social, and environmental consequences. Decentralisation requires access to appropriate quality of land information......, addresses the main issue of how to prevent informal urban development, especially through the use of adequate and sustainable means of land use control and good governance. Three key means are addressed: Decentralisation: There is a need to separate central policy/regulation making and local decision making...... in the decision making process? Legislation in itself is not enough. A cultural change within society may need to be encouraged. Again, access to participation requires access to land information. Comprehensive planning at local level supported by citizen participation should also enable establishment proper...

  13. 50 CFR 80.26 - Symbols.

    Science.gov (United States)

    2010-10-01

    ... appropriate symbol(s) on areas, such as wildlife management areas and fishing access facilities, acquired..., losses and damages arising out of any allegedly unauthorized use of any patent, process, idea, method or... and also from any claims, suits, losses and damages arising out of alleged defects in the articles or...

  14. Compilation of Abstracts of Theses Submitted by Candidates for Degrees.

    Science.gov (United States)

    1988-08-30

    Engineering Department of June 104 Ma hematics M.F. Platzer Department of Aeronautics and Astronautics 60 FUTHR EVWMNTOF A W-DIM A~FURTHER DEVEM WFAE ED...with more sensitive applications. Unauthorized access could be very detrimental to our nation’s security. The use of biometric measures, one of which is

  15. Family Violence Prevention and Services Programs. Final rule.

    Science.gov (United States)

    2016-11-02

    This rule will better prevent and protect survivors of family violence, domestic violence, and dating violence, by clarifying that all survivors must have access to services and programs funded under the Family Violence Prevention and Services Act. More specifically, the rule enhances accessibility and non-discrimination provisions, clarifies confidentiality rules, promotes coordination among community-based organizations, State Domestic Violence Coalitions, States, and Tribes, as well as incorporates new discretionary grant programs. Furthermore, the rule updates existing regulations to reflect statutory changes made to the Family Violence Prevention and Services Act, and updates procedures for soliciting and awarding grants. The rule also increases clarity and reduces potential confusion over statutory and regulatory standards. The rule codifies standards already used by the program in the Funding Opportunity Announcements and awards, in technical assistance, in reporting requirements, and in sub-regulatory guidance.

  16. [Gender inequity in the access to health care in Chile].

    Science.gov (United States)

    Vega, Jeanette; Bedregal, Paula; Jadue, Liliana; Delgado, Iris

    2003-06-01

    In the last two decades, Chile has experienced advances in economical development and global health indicators. However, gender inequities persist in particular related to access to health services and financing of health insurance. To examine gender inequities in the access to health care in Chile. An analysis of data obtained from a serial national survey applied to assess social policies (CASEN) carried out by the Ministry of Planning. During the survey 45,379 and 48,107 dwellings were interviewed in 1994 and in 1998, respectively. Women use health services 1.5 times more often, their salaries are 30% lower in all socioeconomic strata. Besides, in the private health sector, women pay higher insurance premiums than men. Men of less than two years of age have 2.5 times more preventive consultations than girls. This difference, although of lesser magnitude, is also observed in people over 60 years. Women of high income quintiles and users of private health insurance have a better access to preventive consultations but not to specialized care. An improvement in equitable access of women to health care and financing is recommended. Also, monitoring systems to survey these indicators for women should improve their efficiency.

  17. ACOG Committee Opinion Number 542: Access to emergency contraception.

    Science.gov (United States)

    2012-11-01

    Emergency contraception includes contraceptive methods used to prevent pregnancy in the first few days after unprotected intercourse, sexual assault, or contraceptive failure. Although the U.S. Food and Drug Administration approved the first dedicated product for emergency contraception in 1998, numerous barriers to access to emergency contraception remain. The purpose of this Committee Opinion is to examine the barriers to the use of oral emergency contraception methods and to highlight the importance of increasing access.

  18. Reasons to temper enthusiasm about open access nursing journals.

    Science.gov (United States)

    de Jong, Gideon

    2017-04-01

    Open access is a relatively new phenomenon within nursing science. Several papers from various nursing journals have been published recently on the disadvantages of the traditional model of purchasing proprietary fee-based databases to access scholarly information. Just few nursing scholars are less optimistic about the possible benefits of open access nursing journals. A critical reflection on the merits and pitfalls of open access journals along insights from the literature and personal opinion. Two arguments are discussed, providing justification for tempering enthusiasm about open access journals. First, only research groups with sufficient financial resources can publish in open access journals. Second, open access has conflicting incentives, where the aim is to expand production at the expense of publishing quality articles; a business model that fits well into a neoliberal discourse. There are valid reasons to criticise the traditional publishers for the excessive costs of a single article, therefore preventing the dissemination of scholarly nursing information. On the contrary, the business model of open access publishers is no less imbued with the neoliberal tendency of lining the pockets.

  19. Barriers to Accessing Good Eye Care Services in Nigeria: A Focus ...

    African Journals Online (AJOL)

    Certain forms of blindness can be prevented if the right steps and treatments are applied at the right times, but this is not always possible due to the challenges patients face in accessing eye care services. The aim of this study was to explore and identify the barriers in accessing good eye care services in Anambra State ...

  20. Preventing malaria in pregnancy through community-directed interventions: evidence from Akwa Ibom State, Nigeria

    Directory of Open Access Journals (Sweden)

    Ishola Gbenga

    2011-08-01

    Full Text Available Abstract Background Despite massive anti-malaria campaigns across the subcontinent, effective access to intermittent preventive treatment (IPTp and insecticide-treated nets (ITNs among pregnant women remain low in large parts of sub-Saharan Africa. The slow uptake of malaria prevention products appears to reflect lack of knowledge and resistance to behavioural change, as well as poor access to resources, and limited support of programmes by local communities and authorities. Methods A recent community-based programme in Akwa Ibom State, Nigeria, is analysed to determine the degree to which community-directed interventions can improve access to malaria prevention in pregnancy. Six local government areas in Southern Nigeria were selected for a malaria in pregnancy prevention intervention. Three of these local government areas were selected for a complementary community-directed intervention (CDI programme. Under the CDI programme, volunteer community-directed distributors (CDDs were appointed by each village and kindred in the treatment areas and trained to deliver ITNs and IPTp drugs as well as basic counseling services to pregnant women. Findings Relative to women in the control area, an additional 7.4 percent of women slept under a net during pregnancy in the treatment areas (95% CI [0.035, 0.115], p-value Conclusion The presented results suggest that the inclusion of community-based programmes can substantially increase effective access to malaria prevention, and also increase access to formal health care access in general, and antenatal care attendance in particular in combination with supply side interventions. Given the relatively modest financial commitments they require, community-directed programmes appear to be a cost-effective way to improve malaria prevention; the participatory approach underlying CDI programmes also promises to strengthen ties between the formal health sector and local communities.

  1. Wireless LAN security management with location detection capability in hospitals.

    Science.gov (United States)

    Tanaka, K; Atarashi, H; Yamaguchi, I; Watanabe, H; Yamamoto, R; Ohe, K

    2012-01-01

    In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management. We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags. The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk. We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.

  2. Non-participation in preventive child health examinations at the general practitioner in Denmark

    DEFF Research Database (Denmark)

    SĂžndergaard, Grethe; Biering-SĂžrensen, Sofie; Michelsen, Susan IshĂžy

    2008-01-01

    Objective. To examine demographic and socioeconomic characteristics of parents and children in families not participating in preventive child health examinations at the general practitioner in a society with free and easy access to healthcare. Design. Population-covering register linkage study...... free and easy access to the GP, the utilization of preventive child health examinations is lower among the more deprived part of the population....

  3. Increasing Access to Farmers Markets for Beneficiaries of Nutrition Assistance

    Centers for Disease Control (CDC) Podcasts

    2013-10-22

    In this audio podcast, listen to author Kate Cole, MPH talk about her article on farmers markets and how acceptance of nutrition assistance could increase access to fruits and vegetables to those in low-income communities.  Created: 10/22/2013 by Preventing Chronic Disease (PCD), National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 10/22/2013.

  4. Development and Testing of a Conceptual Model Regarding Men's Access to Health Care.

    Science.gov (United States)

    Leone, James E; Rovito, Michael J; Mullin, Elizabeth M; Mohammed, Shan D; Lee, Christina S

    2017-03-01

    Epidemiologic data suggest men often experience excessive morbidity and early mortality, possibly compromising family and community health over the lifespan. Moreover, the negative financial/economic consequences affected by poor male health outcomes also has been of great concern in the United States and abroad. Early and consistent access to preventative health care may improve health outcomes; however, men are far less likely to access these services. The purpose of this study was to understand what factors preclude men from accessing health care. We surveyed 485 participants using a 58-item online survey built from a conceptual model previously developed by the researchers using hegemonic masculinity theory, the theory of normative contentment, and the health belief model. For men, three items significantly ( ps masculine ideals may play a primary role in how men access preventative health care. Future programming targeting males should consider barriers and plan programs that are gender-sensitive in addition to being gender-specific. Clinical implications are discussed.

  5. Reductions in access to HIV prevention and care services are associated with arrest and convictions in a global survey of men who have sex with men.

    Science.gov (United States)

    Santos, Glenn-Milo; Makofane, Keletso; Arreola, Sonya; Do, Tri; Ayala, George

    2017-02-01

    Men who have sex with men (MSM) are disproportionately impacted by HIV. Criminalisation of homosexuality may impede access to HIV services. We evaluated the effect of the enforcement of laws criminalising homosexuality on access to services. Using data from a 2012 global online survey that was published in a prior paper, we conducted a secondary analysis evaluating differences in perceived accessibility to health services (ie, 'how accessible are ____' services) between MSM who responded 'yes'/'no' to: 'have you ever been arrested or convicted for being gay/MSM?' Of the 4020 participants who completed the study and were included in the analysis, 8% reported ever being arrested or convicted under laws relevant to being MSM. Arrests and convictions were most common in sub-Saharan Africa (23.6% (58/246)), Eastern Europe/Central Asia (18.1% (123/680)), the Caribbean (15% (15/100)), Middle East/North Africa (13.2% (10/76)) and Latin America (9.7% (58/599)). Those arrested or convicted had significantly lower access to sexually transmitted infection treatment (adjusted OR (aOR)=0.81; 95% CI 0.67 to 0.97), condoms (aOR=0.77; 95% CI 0.61 to 0.99) and medical care (aOR=0.70; 95% CI 0.54 to 0.90), compared with other MSM, while accounting for clustering by country and adjusting for age, HIV status, education and country-level income. Arrests and convictions under laws relevant to being MSM have a strong negative association with access to HIV prevention and care services. Creating an enabling legal and policy environment, and increasing efforts to mitigate antihomosexuality stigma to ensure equitable access to HIV services are needed, along with decriminalisation of homosexuality, to effectively address the public health needs of this population. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  6. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing


  7. Crime Prevention through Environmental Design

    Science.gov (United States)

    Draper, Rick; Cadzow, Emma

    2004-01-01

    Applying CPTED (Crime Prevention Through Environmental Design) strategies to schools can significantly contribute to a safer learning environment by influencing the behaviour of students and visitors. CPTED has three overlapping primary concepts that are intended to reduce opportunities for crime as well as fear of crime: access control,


  8. Theory of perceived access to breast health care in African American women.

    Science.gov (United States)

    Garmon, Sandra C

    2012-01-01

    The theory presented in this article proposes an alternative view of access to care on the basis of an African American woman's perception of the necessity, availability, and appropriateness of breast health care. The theory of perceived access to breast health care in African American women may also be useful in framing future research studies exploring the relationship between access to care and utilization of primary, secondary, and tertiary clinical preventive services related to breast health care.

  9. What Prevents Central Asian Migrant Workers from Accessing HIV Testing? Implications for Increasing HIV Testing Uptake in Kazakhstan.

    Science.gov (United States)

    Davis, Alissa; Terlikbayeva, Assel; Terloyeva, Dina; Primbetova, Sholpan; El-Bassel, Nabila

    2017-08-01

    Several barriers prevent key populations, such as migrant workers, from accessing HIV testing. Using data from a cross-sectional study among Central Asian migrant workers (n = 623) in Kazakhstan, we examined factors associated with HIV testing. Overall, 48% of participants had ever received an HIV test. Having temporary registration (AOR 1.69; (95% CI [1.12-2.56]), having an employment contract (AOR 2.59; (95% CI [1.58-4.23]), being able to afford health care services (AOR 3.61; (95% CI [1.86-7.03]) having a medical check-up in the past 12 months (AOR 1.85; 95% CI [1.18-2.89]), and having a regular doctor (AOR 2.37; 95% CI [1.20-4.70]) were associated with having an HIV test. HIV testing uptake among migrants in Kazakhstan falls far short of UNAIDS 90-90-90 goals. Intervention strategies to increase HIV testing among this population may include initiatives that focus on improving outreach to undocumented migrants, making health care services more affordable, and linking migrants to health care.

  10. Basic webliography on health promotion and disease prevention

    Directory of Open Access Journals (Sweden)

    Mario Ferreira Junior

    2009-12-01

    Full Text Available Objectives: To introduce a basic webliography to access highly qualified evidence-based material on health promotion and disease prevention, aiming at the continuing education of health professionals. Methods: By means of GoogleÂź browser, applying the descriptors in sequence to progressively refine the search on Internet and key concepts to be learned, all previously defined by the authors themselves, we proceeded a qualitative analyses of the 20 first listed links for each searched issue and the final selection of the most scientifically relevant ones. Results: The 34 selected links are presented in 4 groups: 23 portals, 5 guides and recommendations, 4 scientific journals and 3 blogs that allow free access to health promotion and disease prevention related subjects, such as: concepts; national and international public policies; epidemiology, statistics and health indicators; diseases screening and prophylaxis; counseling for behavior change of health related habits; and interdisciplinary work. Among the selected links 10 (29% are written in English while the others are in Portuguese. Conclusions: The identification of reading materials on health promotion and disease prevention available on Internet, many in Portuguese, allowed us toselect relevant scientifically qualified literature and turn it accessible to health professionals, enabling the acquisition of new knowledge or quick update.

  11. Family Wellness, Not HIV Prevention

    Science.gov (United States)

    Swendeman, Dallas; Flannery, Diane

    2010-01-01

    HIV exceptionalism (and disease-specific programs generally) garner both unbalanced funding and the most talented personnel, distorting local health priorities. In support of HIV exceptionalism, the successful mobilization of significant global health sector resources was not possible prior to HIV. Both sides of the debate have merits; rather than perpetuating polarization, we suggest that sustained improvements in global health require creating a prevention infrastructure to meet multiple health challenges experienced by local communities. We propose four fundamental shifts in HIV and disease prevention: (1) horizontally integrating prevention at one site locally, with priorities tailored to local health challenges and managed by local community leaders; (2) using a family wellness metaphor for services, not disease prevention; (3) implementing evidence-based prevention programs (EBPP) based on common principles, factors, and processes, rather than replication of specific programs; and (4) utilizing the expertise of private enterprise to re-design EBPP into highly attractive, engaging, and accessible experiences. PMID:19148744

  12. Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    Nuclear material accounting and control (NMAC) works in a complementary fashion with the international safeguards programme and physical protection systems to help prevent, deter or detect the unauthorized acquisition and use of nuclear materials. These three methodologies are employed by Member States to defend against external threats, internal threats and both state actors and non-state actors. This publication offers guidance for implementing NMAC measures for nuclear security at the nuclear facility level. It focuses on measures to mitigate the risk posed by insider threats and describes elements of a programme that can be implemented at a nuclear facility in coordination with the physical protection system for the purpose of deterring and detecting unauthorized removal of nuclear material

  13. Efficient and side-channel resistant authenticated encryption of FPGA bitstreams

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Moradi, Amir; Yalcin, Tolga

    2013-01-01

    AE modes of operation with the same countermeasure. We conclude that the deployment of dedicated AE schemes such as ALE significantly facilitates the real-world efficiency and security of FPGA bitstream protection in practice: Not only our solution enables authenticated encryption for bitstream...... on low-cost FPGAs but it also aims to mitigate physical attacks which have been lately shown to undermine the security of the bitstream protection mechanisms in the field.......State-of-the-art solutions for FPGA bitstream protection rely on encryption and authentication of the bitstream to both ensure its confidentiality, thwarting unauthorized copying and reverse engineering, and prevent its unauthorized modification, maintaining a root of trust in the field. Adequate...

  14. Prevalence and mitigation strategies of HIV/AIDS infection risks in ...

    African Journals Online (AJOL)

    Amongst other results, the data revealed that sexual promiscuity in the hostels was treated as the norm in the majority of cases, unauthorized access to hostel rooms by non-hostel dwellers was rampant, sexual harassment of female students by men who were under the influence of alcohol was reported to be common and ...

  15. Optical encryption with selective computational ghost imaging

    International Nuclear Information System (INIS)

    Zafari, Mohammad; Kheradmand, Reza; Ahmadi-Kandjani, Sohrab

    2014-01-01

    Selective computational ghost imaging (SCGI) is a technique which enables the reconstruction of an N-pixel image from N measurements or less. In this paper we propose an optical encryption method based on SCGI and experimentally demonstrate that this method has much higher security under eavesdropping and unauthorized accesses compared with previous reported methods. (paper)

  16. STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA

    Directory of Open Access Journals (Sweden)

    CRISTINA-MARIA RĂDULESCU

    2015-12-01

    Full Text Available The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc.

  17. Global Web Accessibility Analysis of National Government Portals and Ministry Web Sites

    DEFF Research Database (Denmark)

    Goodwin, Morten; Susar, Deniz; Nietzio, Annika

    2011-01-01

    Equal access to public information and services for all is an essential part of the United Nations (UN) Declaration of Human Rights. Today, the Web plays an important role in providing information and services to citizens. Unfortunately, many government Web sites are poorly designed and have...... accessibility barriers that prevent people with disabilities from using them. This article combines current Web accessibility benchmarking methodologies with a sound strategy for comparing Web accessibility among countries and continents. Furthermore, the article presents the first global analysis of the Web...... accessibility of 192 United Nation Member States made publically available. The article also identifies common properties of Member States that have accessible and inaccessible Web sites and shows that implementing antidisability discrimination laws is highly beneficial for the accessibility of Web sites, while...

  18. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  19. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  20. Improving access to adequate pain management in Taiwan.

    Science.gov (United States)

    Scholten, Willem

    2015-06-01

    There is a global crisis in access to pain management in the world. WHO estimates that 4.65 billion people live in countries where medical opioid consumption is near to zero. For 2010, WHO considered a per capita consumption of 216.7 mg morphine equivalents adequate, while Taiwan had a per capita consumption of 0.05 mg morphine equivalents in 2007. In Asia, the use of opioids is sensitive because of the Opium Wars in the 19th century and for this reason, the focus of controlled substances policies has been on the prevention of diversion and dependence. However, an optimal public health outcome requires that also the beneficial aspects of these substances are acknowledged. Therefore, WHO recommends a policy based on the Principle of Balance: ensuring access for medical and scientific purposes while preventing diversion, harmful use and dependence. Furthermore, international law requires that countries ensure access to opioid analgesics for medical and scientific purposes. There is evidence that opioid analgesics for chronic pain are not associated with a major risk for developing dependence. Barriers for access can be classified in the categories of overly restrictive laws and regulations; insufficient medical training on pain management and problems related to assessment of medical needs; attitudes like an excessive fear for dependence or diversion; and economic and logistical problems. The GOPI project found many examples of such barriers in Asia. Access to opioid medicines in Taiwan can be improved by analysing the national situation and drafting a plan. The WHO policy guidelines Ensuring Balance in National Policies on Controlled Substances can be helpful for achieving this purpose, as well as international guidelines for pain treatment. Copyright © 2015. Published by Elsevier B.V.

  1. Empowering underserved populations through cancer prevention and early detection.

    Science.gov (United States)

    Rivera-ColĂłn, Venessa; Ramos, Roberto; Davis, Jenna L; Escobar, Myriam; Inda, Nikki Ross; Paige, Linda; Palencia, Jeannette; Vives, Maria; Grant, Cathy G; Green, B Lee

    2013-12-01

    It is well documented that cancer is disproportionately distributed in racial/ethnic minority groups and medically underserved communities. In addition, cancer prevention and early detection represent the key defenses to combat cancer. The purpose of this article is to showcase the comprehensive health education and community outreach activities at the H. Lee Moffitt Cancer Center and Research Institute (Moffitt) designed to promote and increase access to and utilization of prevention and early detection services among underserved populations. One of Moffitt's most important conduits for cancer prevention and early detection among underserved populations is through its community education and outreach initiatives, in particular, the Moffitt Program for Outreach Wellness Education and Resources (M-POWER). M-POWER works to empower underserved populations to make positive health choices and increase screening behaviors through strengthening collaboration and partnerships, providing community-based health education/promotion, and increasing access to care. Effective, empowering, and culturally and linguistically competent health education and community outreach, is key to opening the often impenetrable doors of cancer prevention and early detection to this society's most vulnerable populations.

  2. Equal Access Initiative HIV/AIDS Information Resources from NLM

    Energy Technology Data Exchange (ETDEWEB)

    Templin-Branner W. and N. Dancy

    2010-09-11

    The Equal Access Initiative: HIV/AIDS Information Resources from the National Library of Medicine training is designed specifically for the National Minority AIDS Council 2010 Equal Access Initiative (EAI) Computer Grants Program awardees to provide valuable health information resources from the National Library of Medicine and other reliable sources to increase awareness of the wealth of treatment information and educational materials that are available on the Internet and to improve prevention and treatment education for their clients. These resources will also meet the needs of community-based

  3. Native Teen Voices: adolescent pregnancy prevention recommendations.

    Science.gov (United States)

    Garwick, Ann W; Rhodes, Kristine L; Peterson-Hickey, Melanie; Hellerstedt, Wendy L

    2008-01-01

    American Indian adolescent pregnancy rates are high, yet little is known about how Native youth view primary pregnancy prevention. The aim was to identify pregnancy prevention strategies from the perspectives of both male and female urban Native youth to inform program development. Native Teen Voices (NTV) was a community-based participatory action research study in Minneapolis and St. Paul, Minnesota. Twenty focus groups were held with 148 Native youth who had never been involved in a pregnancy. Groups were stratified by age (13-15 and 16-18 years) and sex. Participants were asked what they would do to prevent adolescent pregnancy if they were in charge of programs for Native youth. Content analyses were used to identify and categorize the range and types of participants' recommendations within and across the age and sex cohorts. Participants in all cohorts emphasized the following themes: show the consequences of adolescent pregnancy; enhance and develop more pregnancy prevention programs for Native youth in schools and community-based organizations; improve access to contraceptives; discuss teen pregnancy with Native youth; and use key messages and media to reach Native youth. Native youth perceived limited access to comprehensive pregnancy prevention education, community-based programs and contraceptives. They suggested a variety of venues and mechanisms to address gaps in sexual health services and emphasized enhancing school-based resources and involving knowledgeable Native peers and elders in school and community-based adolescent pregnancy prevention initiatives. A few recommendations varied by age and sex, consistent with differences in cognitive and emotional development.

  4. Development and Testing of a Conceptual Model Regarding Men’s Access to Health Care

    Science.gov (United States)

    Leone, James E.; Rovito, Michael J.; Mullin, Elizabeth M.; Mohammed, Shan D.; Lee, Christina S.

    2016-01-01

    Epidemiologic data suggest men often experience excessive morbidity and early mortality, possibly compromising family and community health over the lifespan. Moreover, the negative financial/economic consequences affected by poor male health outcomes also has been of great concern in the United States and abroad. Early and consistent access to preventative health care may improve health outcomes; however, men are far less likely to access these services. The purpose of this study was to understand what factors preclude men from accessing health care. We surveyed 485 participants using a 58-item online survey built from a conceptual model previously developed by the researchers using hegemonic masculinity theory, the theory of normative contentment, and the health belief model. For men, three items significantly (ps masculine ideals may play a primary role in how men access preventative health care. Future programming targeting males should consider barriers and plan programs that are gender-sensitive in addition to being gender-specific. Clinical implications are discussed. PMID:27698256

  5. 50 CFR 660.312 - Open access fishery-prohibitions.

    Science.gov (United States)

    2010-10-01

    ... ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES West Coast... for the Prevention of Pollution From Ships, 1973 (Annex V of MARPOL 73/78). (2) Fish with dredge gear..., possess, or land groundfish in excess of the landing limit for the open access fishery without having a...

  6. Chosen-plaintext attack on a joint transform correlator encrypting system

    Science.gov (United States)

    Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto

    2010-10-01

    We demonstrate that optical encryption methods based on the joint transform correlator architecture are vulnerable to chosen-plaintext attack. An unauthorized user, who introduces three chosen plaintexts in the accessible encryption machine, can obtain the security key code mask. In this contribution, we also propose an alternative method to eliminate ambiguities that allows obtaining the right decrypting key.

  7. A Security Mechanism for library management system using low cost RFID tags

    Directory of Open Access Journals (Sweden)

    V. Nagalakshmi

    2007-02-01

    Full Text Available Radio Frequency Identification (RFID systems will become pervasive in our daily lives due to their low cost and easy to use characteristics[1]. This paper presents a methodology of using low cost RFID tags for a library management system to protect the books from unauthorized capturing and usage. Every object to be identified in the RFID system is physically labeled with a tag. In the proposed method a book or a magazine or a CD is identified with the RFID tag. Whenever a book is issued to any user of the library, the RFID reader will capture the information of that book and compares it with the related information of the book in the Online Public Access Catalogue (OPAC and issues the book to the user depending on his identity in the database. If any unauthorized person intends to take the book the RFID reader will immediately respond to that and make sure that it was not issued. If any body tries to remove the tag it can be traced with the help of location device. Keywords: RFID, OPAC, Unauthorized user, tag, Reader.

  8. Stress Prevention@Work: a study protocol for the evaluation of a multifaceted integral stress prevention strategy to prevent employee stress in a healthcare organization: a cluster controlled trial.

    Science.gov (United States)

    Hoek, Rianne J A; Havermans, Bo M; Houtman, Irene L D; Brouwers, Evelien P M; Heerkens, Yvonne F; Zijlstra-Vlasveld, Moniek C; Anema, Johannes R; van der Beek, Allard J; Boot, CĂ©cile R L

    2017-07-17

    Adequate implementation of work-related stress management interventions can reduce or prevent work-related stress and sick leave in organizations. We developed a multifaceted integral stress-prevention strategy for organizations from several sectors that includes a digital platform and collaborative learning network. The digital platform contains a stepwise protocol to implement work-related stress-management interventions. It includes stress screeners, interventions and intervention providers to facilitate access to and the selection of matching work-related stress-management interventions. The collaborative learning network, including stakeholders from various organizations, plans meetings focussing on an exchange of experiences and good practices among organizations for the implementation of stress prevention measures. This paper describes the design of an integral stress-prevention strategy, Stress Prevention@Work, and the protocol for the evaluation of: 1) the effects of the strategy on perceived stress and work-related outcomes, and 2) the barriers and facilitators for implementation of the strategy. The effectiveness of Stress Prevention@Work will be evaluated in a cluster controlled trial, in a large healthcare organization in the Netherlands, at six and 12 months. An independent researcher will match teams on working conditions and size and allocate the teams to the intervention or control group. Teams in the intervention group will be offered Stress Prevention@Work. For each intervention team, one employee is responsible for applying the strategy within his/her team using the digital platform and visiting the collaborative learning network. Using a waiting list design, the control group will be given access to the strategy after 12 months. The primary outcome is the employees' perceived stress measured by the stress subscale of the Depression, Anxiety, and Stress Scale (DASS-21). Secondary outcome measures are job demands, job resources and the number

  9. Cybersecurity for Connected Diabetes Devices.

    Science.gov (United States)

    Klonoff, David C

    2015-04-16

    Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. © 2015 Diabetes Technology Society.

  10. Framework For Secure Cloud Data Communication

    Directory of Open Access Journals (Sweden)

    Nitika Aggarwal

    2015-02-01

    Full Text Available Abstract Cloud computing is an emerging technology where all the computing resources are shared on the cloud rather than having local servers or personal devices to handle applications. Encrypting data residing on the cloud database is required to prevent unauthorized access of confidential and critical information and the subsequent modification of the information for personal benefit. As all the organizational information resides on the computers security of this data is of utmost importance. Shamirs secret sharing algorithm is one successful way of encrypting the data. In this research paper we have developed a new encrypting algorithm based on symmetric key cryptography. We have used logical operations like XOR and zero padding. The Shamirs secret sharing algorithm would act on the key generated by our proposed encryption algorithm. This algorithm is an efficient and a simple strategy for secure communication in cloud computing.

  11. Ventanillas de Salud: A Collaborative and Binational Health Access and Preventive Care Program

    Directory of Open Access Journals (Sweden)

    Maria Gudelia Rangel Gomez

    2017-06-01

    Full Text Available While individuals of Mexican origin are the largest immigrant group living in the U.S., this population is also the highest uninsured. Health disparities related to access to health care, among other social determinants, continue to be a challenge for this population. The government of Mexico, in an effort to address these disparities and improve the quality of life of citizens living abroad, has partnered with governmental and non-governmental health-care organizations in the U.S. by developing and implementing an initiative known as Ventanillas de Salud—Health Windows—(VDS. The VDS is located throughout the Mexican Consular network and aim to increase access to health care and health literacy, provide health screenings, and promote healthy lifestyle choices among low-income and immigrant Mexican populations in the U.S.

  12. Ventanillas de Salud: A Collaborative and Binational Health Access and Preventive Care Program.

    Science.gov (United States)

    Rangel Gomez, Maria Gudelia; Tonda, Josana; Zapata, G Rogelio; Flynn, Michael; Gany, Francesca; Lara, Juanita; Shapiro, Ilan; Rosales, Cecilia Ballesteros

    2017-01-01

    While individuals of Mexican origin are the largest immigrant group living in the U.S., this population is also the highest uninsured. Health disparities related to access to health care, among other social determinants, continue to be a challenge for this population. The government of Mexico, in an effort to address these disparities and improve the quality of life of citizens living abroad, has partnered with governmental and non-governmental health-care organizations in the U.S. by developing and implementing an initiative known as Ventanillas de Salud -Health Windows-(VDS). The VDS is located throughout the Mexican Consular network and aim to increase access to health care and health literacy, provide health screenings, and promote healthy lifestyle choices among low-income and immigrant Mexican populations in the U.S.

  13. IMPROVING ACCESS TO DRUGS

    Directory of Open Access Journals (Sweden)

    Max Joseph Herman

    2012-11-01

    Full Text Available Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effective of health policy, and also the implementation process. With the policy development and effective health policy, rational drug uses, sufficient health service budget so a country can overcome the health problems. Besides infrastructures, regulations, distribution and cultural influences; the main obstacles for drug access is drugs affordability if the price of drugs is an important part and determined by many factors, especially the drug status whether is still patent orgenerics that significantly decrease cost of health cares and enhance the drugs affordability. The determination of essential drug prices in developing countries should based on equity principal so that poor people pay cheaper and could afford the essential drugs. WHO predicts two third of world population can not afford the essential drugs in which in developing countries, some are because of in efficient budget allocation in consequence of drug distribution management, including incorrect selection and allocation and also irrational uses. In part these could be overcome by enhancing performances on the allocation pharmacy needs, including the management of information system, inventory management, stock management and the distribution. Key words: access, drugs, essential drugs, generic drugs

  14. Sexual Behaviors, Experiences of Sexual Violence, and Substance Use among Women Who inject Drugs: Accessing Health and Prevention Services in Puerto Rico.

    Science.gov (United States)

    Collazo-Vargas, Erika M; Dodge, Brian; Herbenick, Debby; Guerra-Reyes, Lucia; Mowatt, Rasul; Otero-Cruz, Ilia M; RodrĂ­guez-DĂ­az, Carlos

    2018-06-01

    People who inject drugs (PWID) face numerous gender-specific health risks, which increase their susceptibility to adverse outcomes, including violence. There is a need for research on female PWID to capture their unique experiences and understand behavioral and gender-based differences. This study aimed to understand which drug use and sexual behaviors are the most prevalent among female PWID accessing health services in Puerto Rico and to gather preliminary information on those individuals' experiences of sexual violence. Utilizing a transformative theoretical perspective, a mixed-methods study was conducted with a sample of 90 Puerto Rican women who reported recent (past 12 months) injection drug use (IDU) This manuscript focused on Phase 1, in which participants completed an interviewer-administered survey eliciting information about sexual behaviors, drug use, experiences of sexual violence, and access to healthcare services. Phase 2 involved an in-depth interview focused on sexual health and access to healthcare services. Female PWID were found to engage in a variety of sexual behaviors throughout their lifespans and at their most recent sexual events. There were significant differences across age groups for participants, those being time of most recent sexual event (p = 0.007), partner's sex (p = 0.039), relationship with partner (p = 0.023), contraception method used (p = 0.057), and reports of partner orgasm (p = 0.055). Over half of all participants reported having experienced sexual violence in their lifetime. This study extends the literature on PWID in Puerto Rico by underscoring the diversity of female PWID sexual experiences and needs while illustrating how those experiences are often mediated by drug use. The findings highlight the need for further research on female PWID in Puerto Rico to better develop programs that include sexual violence prevention as part of future interventions for this population.

  15. Dye filled security seal

    International Nuclear Information System (INIS)

    Wilson, D.C.

    1982-01-01

    A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member

  16. Turkish-German Access to Higher Education: An Historical and Democratic Theory Analysis, 1960-2010

    Science.gov (United States)

    Gonzalez, Roger Geertz

    2012-01-01

    This article looks at access to higher education in Germany. For a number of reasons, explained in this article, higher education is presently an elite system that privileges ethnic Germans while preventing Turkish-Germans from gaining sufficient access into academe. If Germany is to become a fully functioning multicultural democracy with equal


  17. Unauthorised building as a factor in the recession. Analysis, strategies and plans for sustainable development

    Directory of Open Access Journals (Sweden)

    Rosa Maria Vitrano

    2011-04-01

    Full Text Available How can we turn the tide on the indiscriminate sale of land? What sort of development would conform to environmental and economic needs? With a view to laying the foundations for effectively redressing criticalities determined by the abuse or improper use of buildings, the University of Palermo has promoted: the APRAE Project (Analysis, Prevention and Recovery of unauthorized construction, the HERA Project (Habitat Recovery Environment, Aegean-Med Project, arose from virtuous collaboration with the Hellenic Ministry of Culture (Greece. The research explored the phenomenological structure of unauthorized building and its negative impact on balance of the «housing system» in depth on one hand; on the other it has identified competitive rehabilitation strategies based on sustainability, innovation and participation.

  18. Prevention of suicide with regulations aimed at restricting access to highly hazardous pesticides

    DEFF Research Database (Denmark)

    Gunnell, David; Knipe, Duleeka; Chang, Shu Sen

    2017-01-01

    Background: Pesticide self-poisoning accounts for 14–20% of suicides worldwide. Regulation aimed at restricting access to pesticides or banning highly hazardous pesticides is one approach to reducing these deaths. We systematically reviewed the evidence of the effectiveness of pesticide regulation...... in reducing the incidence of pesticide suicides and overall suicides. Methods: We did a systematic review of the international evidence. We searched MEDLINE, PsycINFO, and Embase for studies published between Jan 1, 1960, and Dec 31, 2016, which investigated the effect of national or regional bans, and sales...... or import restrictions, on the availability of one or more pesticides and the incidence of suicide in different countries. We excluded other interventions aimed at limiting community access to pesticides. We extracted data from studies presenting pesticide suicide data and overall suicide data from before...

  19. Suicide Prevention Strategies for Improving Population Health.

    Science.gov (United States)

    Wilcox, Holly C; Wyman, Peter A

    2016-04-01

    Suicide is a public health problem that accounts for more than 1 million deaths annually worldwide. This article addresses evidence-based and promising youth suicide prevention approaches at the primary, secondary, and tertiary levels. Coordinated, developmentally timed, evidence-based suicide prevention approaches at all intervention levels are likely to reduce youth suicide. For most youth who die by suicide, there are opportunities for intervention before imminent risk develops. Current research in suicide prevention points to the value of investing in "upstream" universal interventions that build skills and resilience as well as policies that enable access to care and protection from lethal means. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. 49 CFR 543.6 - Petition: Specific content requirements.

    Science.gov (United States)

    2010-10-01

    ... antitheft system, and a diagram showing the location of each of those components within the vehicle; (3) A discussion that explains the means and process by which the device is activated and functions, including any... vehicle by means other than a key, (iv) Prevent the operation of a vehicle which an unauthorized person...

  1. Operational Exercise Integration Recommendations for DoD Cyber Ranges

    Science.gov (United States)

    2015-08-05

    be the precision and recall of a security information and event management (SIEM) system ’s notifications of unauthorized access to that directory...network traffic, port scanning Deplete Resources TCP flooding, memory leak exploitation Injection Cross-site scripting attacks, SQL injection Deceptive...requirements for personnel development; tactics, techniques, and procedures (TTPs) devel- opment; and mission rehearsals . While unique in their own

  2. Method of Pentest Synthesis and Vulnerability Detection

    OpenAIRE

    Hahanova Irina Vitalyevna

    2012-01-01

    The structural method for penetration test generation and vulnerability simulation for infrastructure of telecommunication hardwaresoftware information cybernetic systems (CS), focused to protect against unauthorized access the services defined in the system specification by means of penetrating through legal interfaces of component interaction, which have vulnerabilities, is proposed. A protection service infrastructure is created with cybersystem and maintains it during the life cycle, serv...

  3. Variation in low food access areas due to data source inaccuracies

    OpenAIRE

    Ma, Xiaoguang; Battersby, Sarah E.; Bell, Bethany A.; Hibbert, James D.; Barnes, Timothy L.; Liese, Angela D.

    2013-01-01

    Several spatial measures of community food access identifying so called “food deserts” have been developed based on geospatial information and commercially-available, secondary data listings of food retail outlets. It is not known how data inaccuracies influence the designation of Census tracts as areas of low access. This study replicated the U.S. Department of Agriculture Economic Research Service (USDA ERS) food desert measure and the Centers for Disease Control and Prevention (CDC) non-he...

  4. Collaborative research to prevent HIV among male prison inmates and their female partners.

    Science.gov (United States)

    Grinstead, O A; Zack, B; Faigeles, B

    1999-04-01

    Despite the need for targeted HIV prevention interventions for prison inmates, institutional and access barriers have impeded development and evaluation of such programs. Over the past 6 years, the authors have developed a unique collaborative relationship to develop and evaluate HIV prevention interventions for prison inmates. The collaboration includes an academic research institution (the Center for AIDS Prevention Studies at the University of California, San Francisco), a community-based organization (Centerforce), and the staff and inmate peer educators inside a state prison. In this ongoing collaboration, the authors have developed and evaluated a series of HIV prevention interventions for prison inmates and for women who visit prison inmates. Results of these studies support the feasibility and effectiveness of HIV prevention programs for inmates and their partners both in prison and in the community. Access and institutional barriers to HIV intervention research in prisons can be overcome through the development of collaborative research partnerships.

  5. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  6. Risk assessment for implementing e-services in some ministries in the State of Kuwait

    International Nuclear Information System (INIS)

    Zaied, A.N.H.; Al-Khairalla, F.

    2007-01-01

    The movement to e-government is basically about changing the way people and business interact with government. Kuwait, like any developing country, is currently launching major e-service projects aiming at improving government processes, connect government to citizens, and build interaction within the civil society. The e-services category of e-government applications enables interactions and relationships between the government and citizens, through which the latter gain access to a range of public services. However, the implementation process of e-services involves many factors of risk that could threaten the success of process. Therefore, an effective risk management process is an important component of a successful information security program. This paper investigates and discusses the possibilities of e-services risk areas and assesses the security and privacy protection issues in some ministries in Kuwait. The results show that the total average percentage of applying security and privacy issues in the studied ministries is moderate. The Ministry of Communication (MoC) has the highest percentage of applications, whereas the Ministry of Trading and Industry (MoTI) has the lowest. Physical security is the highest applied variable, while prevention of unauthorized access is the lowest one. (author)

  7. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

    Directory of Open Access Journals (Sweden)

    Nithya Chidambaram

    2016-01-01

    Full Text Available With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access. The files stored in the cloud are encrypted with RSA algorithm and digital fingerprint for the same has been generated through MD5 message digest before storage. The RSA provides unreadability of data to anyone without the private key. MD5 makes it impossible for any changes on data to go unnoticed. After the application of RSA and MD5 before storage, the data becomes resistant to access or modifications by any third party and to intruders of cloud storage system. This application is tested in Amazon Elastic Compute Cloud Web Services.

  8. The Patient Protection and Affordable Care Act and Utilization of Preventive Health Care Services

    Directory of Open Access Journals (Sweden)

    Victor Eno

    2016-02-01

    Full Text Available We examined how (a health insurance coverage, and (b familiarity with the Patient Protection and Affordable Care Act (ACA’s or ObamaCare mandate of cost-free access to preventive health services, affect the use of preventive services by residents of a minority community. It was based on primary data collected from a survey conducted during March to April 2012 among a sample of self-identified African American adults in Tallahassee-Leon County area of northwest Florida. The Statistical Package for the Social Sciences (SPSS Version 22 was used for running frequency analysis on the data set and multivariable regression modeling. The results showed that of 524 respondents, 382 (73% had health insurance while 142 (27% lacked insurance. Majority of insured respondents, 332 (87%, used preventive health services. However, the remaining 13% of respondents did not use preventive services because they were unfamiliar with the ACA provision of free access to preventive services for insured people. Regression analysis showed a high (91.04% probability that, among the insured, the use of preventive health services depended on the person’s age, income, and education. For uninsured residents, the lack of health insurance was the key reason for non-use of preventive health services, while among the insured, lack of knowledge about the ACA benefit of free access contributed to non-use of preventive services. Expansion of Medicaid eligibility can increase insurance coverage rates among African Americans and other minority populations. Health promotion and awareness campaigns about the law’s benefits by local and state health departments can enhance the use of preventive services.

  9. Comparison of methods to monitor the distribution and impacts of unauthorized travel routes in a border park

    Science.gov (United States)

    Esque, Todd C.; Inman, Rich; Nussear, Kenneth E.; Webb, Robert; Girard, M.M.; DeGayner, J.

    2016-01-01

    The distribution and abundance of human-caused disturbances vary greatly through space and time and are cause for concern among land stewards in natural areas of the southwestern border-lands between the USA and Mexico. Human migration and border protection along the international boundary create Unauthorized Trail and Road (UTR) networks across National Park Service lands and other natural areas. UTRs may cause soil erosion and compaction, damage to vegetation and cultural resources, and may stress wildlife or impede their movements. We quantify the density and severity of UTR disturbances in relation to soils, and compare the use of previously established targeted trail assessments (hereafter — targeted assessments) against randomly placed transects to detect trail densities at Coronado National Memorial in Arizona in 2011. While trail distributions were similar between methods, targeted assessments estimated a large portion of the park to have the lowest density category (0–5 trail encounters per/km2), whereas the random transects in 2011 estimated more of the park as having the higher density categories (e.g., 15–20 encounters per km2category). Soil vulnerability categories that were assigned, a priori, based on published soil texture and composition did not accurately predict the impact of UTRs on soil, indicating that empirical methods may be better suited for identifying severity of compaction. While the estimates of UTR encounter frequencies were greater using the random transects than the targeted assessments for a relatively short period of time, it is difficult to determine whether this difference is dependent on greater cross-border activity, differences in technique, or from confounding environmental factors. Future surveys using standardized sampling techniques would increase accuracy.

  10. Employing human rights frameworks to realize access to an HIV cure.

    Science.gov (United States)

    Meier, Benjamin Mason; Gelpi, Adriane; Kavanagh, Matthew M; Forman, Lisa; Amon, Joseph J

    2015-01-01

    The scale of the HIV pandemic - and the stigma, discrimination and violence that surrounded its sudden emergence - catalyzed a public health response that expanded human rights in principle and practice. In the absence of effective treatment, human rights activists initially sought to protect individuals at high risk of HIV infection. With advances in antiretroviral therapy, activists expanded their efforts under international law, advocating under the human right to health for individual access to treatment. As a clinical cure comes within reach, human rights obligations will continue to play a key role in political and programmatic decision-making. Building upon the evolving development and implementation of the human right to health in the global response to HIV, we outline a human rights research agenda to prepare for HIV cure access, investigating the role of human rights law in framing 1) resource allocation, 2) international obligations, 3) intellectual property and 4) freedom from coercion. The right to health is widely recognized as central to governmental, intergovernmental and non-governmental responses to the pandemic and critical both to addressing vulnerability to infection and to ensuring universal access to HIV prevention, treatment, care and support. While the advent of an HIV cure will raise new obligations for policymakers in implementing the right to health, the resolution of past debates surrounding HIV prevention and treatment may inform claims for universal access.

  11. Stress Prevention@Work: a study protocol for the evaluation of a multifaceted integral stress prevention strategy to prevent employee stress in a healthcare organization: a cluster controlled trial

    Directory of Open Access Journals (Sweden)

    Rianne J. A. Hoek

    2017-07-01

    Full Text Available Abstract Background Adequate implementation of work-related stress management interventions can reduce or prevent work-related stress and sick leave in organizations. We developed a multifaceted integral stress-prevention strategy for organizations from several sectors that includes a digital platform and collaborative learning network. The digital platform contains a stepwise protocol to implement work-related stress-management interventions. It includes stress screeners, interventions and intervention providers to facilitate access to and the selection of matching work-related stress-management interventions. The collaborative learning network, including stakeholders from various organizations, plans meetings focussing on an exchange of experiences and good practices among organizations for the implementation of stress prevention measures. This paper describes the design of an integral stress-prevention strategy, Stress Prevention@Work, and the protocol for the evaluation of: 1 the effects of the strategy on perceived stress and work-related outcomes, and 2 the barriers and facilitators for implementation of the strategy. Methods The effectiveness of Stress Prevention@Work will be evaluated in a cluster controlled trial, in a large healthcare organization in the Netherlands, at six and 12 months. An independent researcher will match teams on working conditions and size and allocate the teams to the intervention or control group. Teams in the intervention group will be offered Stress Prevention@Work. For each intervention team, one employee is responsible for applying the strategy within his/her team using the digital platform and visiting the collaborative learning network. Using a waiting list design, the control group will be given access to the strategy after 12 months. The primary outcome is the employees’ perceived stress measured by the stress subscale of the Depression, Anxiety, and Stress Scale (DASS-21. Secondary outcome measures

  12. National system for prevention of nuclear and radiological terrorism in Lithuania

    International Nuclear Information System (INIS)

    Morkunas, G.; Klevinskas, G.

    2005-01-01

    Full text: Minimization of the threat posed by nuclear and radiological terrorism and mitigation of its impact is one of the most important tasks for any state. Prevention of the diversion of nuclear and radioactive material is related with a number of measures, which include physical protection of nuclear industry, preparedness for investigation of the appropriate incidents and accidents, emergency preparedness. All these issues are closely related with radiation protection. Physical protection of nuclear facility is defined by Lithuanian legislation as a system of organizational, legal and technical measures aimed at protecting nuclear equipment, nuclear and radioactive material from their illegal possession or seizure and from an unauthorized entry into the area of a nuclear facility. Responsibilities and organizational measures in this respect are clearly stated by the legislation, which is the basis for protection related procedures. Requirements for physical protection of nuclear facilities were developed shortly after the Vienna Convention was ratified. They are permanently improved taking into account all the related recent developments. Though the most important object for physical protection in Lithuanian is Ignalina NPP, the physical protection measures were also introduced at the Maisiagala radioactive waste repository. Experience shows that physical protection should be used in connection with other measures. One of them is capability for detection and analysis of radioactive and nuclear material. All the detected sources in Lithuanian are analyzed in situ, some of them - in laboratory. Consequences on society of a terrorist attack might be mitigated by emergency preparedness. One of the most important elements of it is the raising of public awareness. The paper discusses both the system of physical protection and provides other issues related with prevention of nuclear and radiological terrorism in Lithuania with emphasis of radiation protection

  13. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  14. Physical protection of power reactors

    International Nuclear Information System (INIS)

    Darby, J.L.

    1979-01-01

    Sandia Laboratories has applied a systematic approach to designing physical protection systems for nuclear facilities to commercial light-water reactor power plants. A number of candidate physical protection systems were developed and evaluated. Focus is placed on the design of access control subsystems at each of three plant layers: the protected area perimeter, building surfaces, and vital areas. Access control refers to barriers, detectors, and entry control devices and procedures used to keep unauthorized personnel and contraband out of the plant, and to control authorized entry into vital areas within the plant

  15. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  16. Physical security workshop summary: entry control

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1982-01-01

    Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications

  17. HIV prevention among transgender women in Latin America: implementation, gaps and challenges.

    Science.gov (United States)

    Silva-Santisteban, Alfonso; Eng, Shirley; de la Iglesia, Gabriela; Falistocco, Carlos; Mazin, Rafael

    2016-01-01

    Transgender women are the population most vulnerable to HIV in Latin America, with prevalence between 18 and 38%. Although the region has improved antiretroviral coverage, there is an urgent need to strengthen HIV prevention for key populations to meet regional targets set by governments. We conducted an assessment on the state of HIV prevention among transgender women in Latin America. We conducted a desk review of Global AIDS Response Progress Reports, national strategic plans, technical reports and peer-reviewed articles from 17 Latin American countries published through January 2015. The review was preceded by 12 semi-structured interviews with UNAIDS and Pan American Health Organization officers and a discussion group with transgender women regional leaders, to guide the identification of documents. We assessed access to, implementation and coverage of programmes; legal frameworks; community participation; inclusion of new strategies; and alignment with international recommendations. Overall, prevention activities in the region focus on condom distribution, diagnosis of sexually transmitted infections and peer education, mostly delivered at health facilities, with limited community involvement. Argentina and Uruguay have implemented structural interventions to address social inclusion. Argentina, Brazil and Mexico have adopted early initiation of antiretroviral therapy and treatment as prevention strategies. The other countries do not have substantial tailored interventions and consider the trans population a sub-population of men who have sex with men in data collection and programme implementation. Limited coverage of services, discrimination and a deep-seated mistrust of the health system among transgender women are the main barriers to accessing HIV prevention services. Promising interventions include health services adapted to transgender women in Mexico; LGBT-friendly clinics in Argentina that incorporate community and health workers in mixed teams; task

  18. Pressure ulcer prevention in care home settings.

    Science.gov (United States)

    Ellis, Michael

    2017-03-31

    Pressure ulcer prevention in the care home setting can be challenging and is often compromised by a lack of access to education and resources. There are measures that have been shown to consistently improve outcomes in pressure ulcer prevention including assessment of the patient and their individual risks, delivery of a consistent plan of care that meets patients' needs, and regular evaluation to identify shortfalls. In addition, there should be a robust approach to investigating events that lead to a person developing a pressure ulcer and that information should be used to improve future practice. Pressure ulcer prevention in care homes is achievable and nurses should all be aware of the necessary measures detailed in this article.

  19. DETECTION OF UNAUTHORIZED CONSTRUCTION EQUIPMENT IN PIPELINE RIGHT-OF-WAYS

    International Nuclear Information System (INIS)

    James E. Huebler

    2002-01-01

    Natural gas transmission companies mark the right-of-way areas where pipelines are buried with warning signs to prevent accidental third-party damage. Nevertheless, pipelines are sometimes damaged by third-party construction equipment. A single incident can be devastating, causing death and millions of dollars of property loss. This damage could be prevented if potentially hazardous construction equipment could be detected and identified before the pipeline was damaged. The Gas Technology Institute (GTI) is developing a system to solve this problem by using an optical fiber as a distributed sensor and interrogating the fiber with an optical time domain reflectometer. Key issues are the ability to detect encroachment and the ability to discriminate among potentially hazardous and benign encroachment. The work performed in the first quarter of the project includes development of the Research Management Plan, writing a paper assessing of the state-of-the-art in encroachment and third party damage detection, and development of factors for selecting the optical fiber sensors

  20. A New Operating System for Security Tagged Architecture Hardware in Support of Multiple Independent Levels of Security (MILS) Compliant System

    Science.gov (United States)

    2014-04-01

    of services that includes multitasking , inter-task communication, and dynamic memory allocation. The bulk of RTEMS is written in both the Ada and C...rtems_initialize_start_multitasking initiates multitasking and applications can start executing. Approved for Public Release; Distribution Unlimited. 29 3.2.2 Problems in RTEMS...or email address. 6. Security Misconfiguration - Security misconfiguration occurs when the attacker gains unauthorized access because the system

  1. Security of a kind of quantum secret sharing with entangled states.

    Science.gov (United States)

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  2. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  3. Nuclear material control in the United States

    International Nuclear Information System (INIS)

    Jaeger, C.; Waddoups, I.

    1995-01-01

    The Department of Energy has defined a safeguards system to be an integrated system of physical protection, material accounting and material control subsystems designed to deter, prevent, detect, and respond to unauthorized possession, use, or sabotage of SNM. In practice, safeguards involve the development and application of techniques and procedures dealing with the establishment and continued maintenance of a system of activities. The system must also include administrative controls and surveillance to assure that the procedures and techniques of the system are effective and are being carried out. The control of nuclear material is critical to the safeguarding of nuclear materials within the United States. The U.S. Department of Energy includes as part of material control four functional performance areas. They include access controls, material surveillance, material containment and detection/assessment. This paper will address not only these areas but also the relationship between material control and other safeguards and security functions

  4. MPS Vax monitor and control software architecture

    International Nuclear Information System (INIS)

    Allison, S.; Spencer, N.; Underwood, K.; VanOlst, D.; Zelanzy, M.

    1993-04-01

    The new Machine Protection System (MPS) now being tested at the SLAC Linear Collider (SLC) includes monitoring and controlling facilities integrated into the existing VAX control system. The actual machine protection is performed by VME micros which control the beam repetition rate on a pulse-by-pulse basis based on measurements from fault detectors. The VAX is used to control and configure the VME micros, configure custom CAMAC modules providing the fault detector inputs, monitor and report faults and system errors, update the SLC database, and interface with the user. The design goals of the VAX software include a database-driven system to allow configuration changes without code changes, use of a standard TCP/IP-based message service for communication, use of existing SLCNET micros for CAMAC configuration, security and verification features to prevent unauthorized access, error and alarm logging and display updates as quickly as possible, and use of touch panels and X-windows displays for the user interface

  5. Robust Watermarking of Video Streams

    Directory of Open Access Journals (Sweden)

    T. PolyĂĄk

    2006-01-01

    Full Text Available In the past few years there has been an explosion in the use of digital video data. Many people have personal computers at home, and with the help of the Internet users can easily share video files on their computer. This makes possible the unauthorized use of digital media, and without adequate protection systems the authors and distributors have no means to prevent it.Digital watermarking techniques can help these systems to be more effective by embedding secret data right into the video stream. This makes minor changes in the frames of the video, but these changes are almost imperceptible to the human visual system. The embedded information can involve copyright data, access control etc. A robust watermark is resistant to various distortions of the video, so it cannot be removed without affecting the quality of the host medium. In this paper I propose a video watermarking scheme that fulfills the requirements of a robust watermark. 

  6. The Effects of Social Anxiety and Online Privacy Concern on Individual Differences in Internet-Based Interaction Anxiety and Communication Preferences.

    Science.gov (United States)

    Shaughnessy, Krystelle; Rocheleau, Jessica N; Kamalou, Somayyeh; Moscovitch, David A

    2017-04-01

    Social anxiety (SA) and online privacy concerns (OPCs) are conceptually distinct fears, but both may be activated by Internet-based social contexts. Whereas SA is focused on being the object of interpersonal evaluation, OPC is focused on preventing others from gaining unauthorized access to private personal information. No research to date has investigated how SA and OPCs may uniquely or interactively predict individual differences in online interaction anxiety or attitudes and preferences about online communication. Participants (N = 374) completed the Social Phobia Inventory and measures of OPCs, online interaction anxiety, and attitudes related to online communication. The results revealed that SA and OPCs were not correlated with one another; however, they each uniquely predicted significant variance in particular outcomes, with no interactive effects. Findings help to illuminate the ways in which online communication preferences may be differentially shaped by people's levels of SA and OPCs, respectively. Theoretical implications and applications are discussed.

  7. Impeding Students' Efforts to Cheat in Online Classes

    Science.gov (United States)

    Hearn Moore, Paula; Head, J. Derrick; Griffin, Richard B.

    2017-01-01

    This paper identifies several methods a student could use to cheat while enrolled in an online course. Problems encountered in conducting an online course and in administering an online exam involve: (1) identifying the test taker, (2) preventing the theft of the exam, (3) combating the unauthorized use of textbooks and/or notes, (4) preparing an


  8. Law enforcement attitudes toward overdose prevention and response

    Science.gov (United States)

    Green, Traci C.; Zaller, Nickolas; Palacios, Wilson R.; Bowman, Sarah E.; Ray, Madeline; Heimer, Robert; Case, Patricia

    2014-01-01

    Background Law enforcement is often the first to respond to medical emergencies in the community, including overdose. Due to the nature of their job, officers have also witnessed first-hand the changing demographic of drug users and devastating effects on their community associated with the epidemic of nonmedical prescription opioid use in the United States. Despite this seminal role, little data exist on law enforcement attitudes toward overdose prevention and response. Methods We conducted key informant interviews as part of a 12-week Rapid Assessment and Response (RAR) process that aimed to better understand and prevent nonmedical prescription opioid use and overdose deaths in locations in Connecticut and Rhode Island experiencing overdose “outbreaks.” Interviews with 13 law enforcement officials across three study sites were analyzed to uncover themes on overdose prevention and naloxone. Results Findings indicated support for law enforcement involvement in overdose prevention. Hesitancy around naloxone administration by laypersons was evident. Interview themes highlighted officers’ feelings of futility and frustration with their current overdose response options, the lack of accessible local drug treatment, the cycle of addiction, and the pervasiveness of easily accessible prescription opioid medications in their communities. Overdose prevention and response, which for some officers included law enforcement-administered naloxone, were viewed as components of community policing and good police-community relations. Conclusion Emerging trends, such as existing law enforcement medical interventions and Good Samaritan Laws, suggest the need for broader law enforcement engagement around this pressing public health crisis, even in suburban and small town locations, to promote public safety. PMID:24051061

  9. Law enforcement attitudes toward overdose prevention and response.

    Science.gov (United States)

    Green, Traci C; Zaller, Nickolas; Palacios, Wilson R; Bowman, Sarah E; Ray, Madeline; Heimer, Robert; Case, Patricia

    2013-12-01

    Law enforcement is often the first to respond to medical emergencies in the community, including overdose. Due to the nature of their job, officers have also witnessed first-hand the changing demographic of drug users and devastating effects on their community associated with the epidemic of nonmedical prescription opioid use in the United States. Despite this seminal role, little data exist on law enforcement attitudes toward overdose prevention and response. We conducted key informant interviews as part of a 12-week Rapid Assessment and Response (RAR) process that aimed to better understand and prevent nonmedical prescription opioid use and overdose deaths in locations in Connecticut and Rhode Island experiencing overdose "outbreaks." Interviews with 13 law enforcement officials across three study sites were analyzed to uncover themes on overdose prevention and naloxone. Findings indicated support for law enforcement involvement in overdose prevention. Hesitancy around naloxone administration by laypersons was evident. Interview themes highlighted officers' feelings of futility and frustration with their current overdose response options, the lack of accessible local drug treatment, the cycle of addiction, and the pervasiveness of easily accessible prescription opioid medications in their communities. Overdose prevention and response, which for some officers included law enforcement-administered naloxone, were viewed as components of community policing and good police-community relations. Emerging trends, such as existing law enforcement medical interventions and Good Samaritan Laws, suggest the need for broader law enforcement engagement around this pressing public health crisis, even in suburban and small town locations, to promote public safety. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  10. Engineering Enhanced Vaccine Cell Lines To Eradicate Vaccine-Preventable Diseases: the Polio End Game

    NARCIS (Netherlands)

    van der Sanden, Sabine M. G.; Wu, Weilin; Dybdahl-Sissoko, Naomi; Weldon, William C.; Brooks, Paula; O'Donnell, Jason; Jones, Les P.; Brown, Cedric; Tompkins, S. Mark; Oberste, M. Steven; Karpilow, Jon; Tripp, Ralph A.

    2016-01-01

    Vaccine manufacturing costs prevent a significant portion of the world's population from accessing protection from vaccine-preventable diseases. To enhance vaccine production at reduced costs, a genome-wide RNA interference (RNAi) screen was performed to identify gene knockdown events that enhanced

  11. Pharmacy Access to Emergency Contraception in Rural and Frontier Communities

    Science.gov (United States)

    Bigbee, Jeri L.; Abood, Richard; Landau, Sharon Cohen; Maderas, Nicole Monastersky; Foster, Diana Greene; Ravnan, Susan

    2007-01-01

    Context: Timely access to emergency contraception (EC) has emerged as a major public health effort in the prevention of unintended pregnancies. The recent FDA decision to allow over-the-counter availability of emergency contraception for adult women presents important rural health implications. American women, especially those living in rural and


  12. Internet access is NOT restricted globally to high income countries: so why are evidenced based prevention and treatment programs for mental disorders so rare?

    Science.gov (United States)

    Watts, Sarah E; Andrews, Gavin

    2014-08-01

    Mental disorders are widespread and universal. They are frequently accompanied by considerable harmful consequences for the individual and come at a significant economic cost to a community. Yet while effective evidence based prevention and treatment exists, there are a number of barriers to access, implement and disseminate. Cognitive behavior therapy programs, such as those available at www.thiswayup.com.au are widely available using the Internet in high income countries, such as Australia. With the ubiquitous uptake of Internet users globally, it is suggested that low and middle income countries should consider ways to embrace and scale up these cost effective programs. An explanation of why and some suggestions as to how this can be done are presented. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.

  13. Spontaneous diffusion of an effective skin cancer prevention program through Web-based access to program materials.

    Science.gov (United States)

    Hall, Dawn M; Escoffery, Cam; Nehl, Eric; Glanz, Karen

    2010-11-01

    Little information exists about the diffusion of evidence-based interventions, a process that can occur naturally in organized networks with established communication channels. This article describes the diffusion of an effective skin cancer prevention program called Pool Cool through available Web-based program materials. We used self-administered surveys to collect information from program users about access to and use of Web-based program materials. We analyzed the content of e-mails sent to the official Pool Cool Web site to obtain qualitative information about spontaneous diffusion. Program users were dispersed throughout the United States, most often learning about the program through a Web site (32%), publication (26%), or colleague (19%). Most respondents (86%) reported that their pool provided educational activities at swimming lessons. The Leader's Guide (59%) and lesson cards (50%) were the most commonly downloaded materials, and most respondents reported using these core items sometimes, often, or always. Aluminum sun-safety signs were the least frequently used materials. A limited budget was the most commonly noted obstacle to sun-safety efforts at the pool (85%). Factors supporting sun safety at the pool centered around risk management (85%) and health of the pool staff (78%). Diffusion promotes the use of evidence-based health programs and can occur with and without systematic efforts. Strategies such as providing well-packaged, user-friendly program materials at low or no cost and strategic advertisement of the availability of program materials may increase program use and exposure. Furthermore, highlighting the benefits of the program can motivate potential program users.

  14. Barriers and facilitators to intraosseous access in adult resuscitations when peripheral intravenous access is not achievable.

    Science.gov (United States)

    James Cheung, Warren; Rosenberg, Hans; Vaillancourt, Christian

    2014-03-01

    Studies suggest that intraosseous (IO) access is underutilized in adult resuscitations, despite recommendations from advanced trauma and cardiac life support guidelines. The objective was to determine factors associated with IO access use by physicians during adult resuscitations when intravenous (IV) access is not immediately achievable. This study was an online survey among physicians purposefully recruited from various clinical care areas at three teaching hospitals. Questions were generated from the qualitative results of 20 iterative interviews, verified for internal validity, and piloted. The interview guide was based on the constructs of the Theory of Planned Behavior (TPB), which elicits salient attitudes, social influences, and control beliefs that potentially influence intention to use IO access. Recruitment took place in September 2012 until reaching more than 100% of the required sample size (n = 200). Internal consistency was measured using Cronbach's alpha, and the effect of TPB constructs and specific beliefs were assessed with regression analyses. For the 205 respondents, the mean age was 35 years (range = 20 to 66 years), and 53.3% were male. Participants' departmental affiliations were 50.3% emergency medicine (EM), 16.9% internal medicine, 14.9% anesthesia, 10.8% general surgery, and 7.2% critical care. Residents comprised 60.7% of the sample, and 39.3% were attending physicians. Median intention to use IO access when IV is not immediately achievable was 4.67 (interquartile range [IQR] = 4 to 5) out of 5 (5 highest) and predicted by the following TPB constructs: attitudes (AdjCoefficients = 0.504; 95% confidence interval [CI] = 0.334 to 0.673), social influences (AdjCoefficients = 0.285; 95% CI = 0.172 to 0.398), and control beliefs (AdjCoefficients 0.217; 95% CI = 0.113 to 0.320). Physicians were more likely to use IO access if they believed that it provided rapid vascular access for delivering large volumes of fluids, could prevent delays in

  15. Disability Discrimination and the Right of Disabled Persons to Access the Labour Market

    Directory of Open Access Journals (Sweden)

    MC Marumoagae

    2012-03-01

    Full Text Available Inequality, discrimination and transformation remain the key challenges which most employers are faced with in the South African labour market. Key among such challenges has also been employers' ability to ensure that persons with disabilities access the labour market. In this paper I highlight employment discrimination experienced by persons with disabilities in South African workplaces, which often prohibits them from accessing employment opportunities. I argue that employers need to consider employing persons with disabilities and also reasonably to accommodate them within South African workplaces. I further illustrate efforts by the legislature to eradicate forms of unjustified discrimination against persons with disabilities through the enactment of the Employment Equity Act 55 of 1998. I argue that all of us need to understand how cultural, social, physical and other barriers continue to prevent persons with disabilities in South Africa from enjoying their constitutional rights to equality, freedom and human dignity, and further, that it is desirable that society at large and government work together towards eradicating barriers which prevent persons with disabilities from accessing the labour market.

  16. Raising Awareness of Cybercrime--The Use of Education as a Means of Prevention and Protection

    Science.gov (United States)

    Bele, Julija Lapuh; Dimc, Maja; Rozman, David; Jemec, Andreja Sladoje

    2014-01-01

    The widespread use of mobile devices that enable Internet access increases the exposure of both individuals and organizations to cybercrime. This article addresses the issue of strategic prevention of cybercrime with the key focus on the measures to prevent cybercrime related to children and teenagers. The primary tool for such prevention is


  17. Managed care, consumerism, preventive medicine: does a causal connection exist?

    Science.gov (United States)

    Rizzo, John A; Xie, Yang

    2006-07-01

    Managed care plans, and HMOs in particular, have long touted that their emphasis is on preventive care, to avoid expensive illness later in life. However, few articles in the contemporary literature adequately address this claim. The available evidence seems to support that HMOs do, in fact, provide greater access to preventive services, but the limitations of this research are substantial. This article discusses the scientific evidence on the relationships between managed care arrangements and the implications for preventive care in the current era, emphasizing consumer choices and less-restrictive plan structures.

  18. Changing the Frame: Queering Access to Higher Education for Trans* Students

    Science.gov (United States)

    Marine, Susan B.

    2017-01-01

    College access and graduation results in significant life advantages, including higher lifetime incomes, better physical and mental health outcomes, and greater rates of civic engagement. Unfortunately, trans* youth have been systematically prevented from full participation in post-secondary education due to genderist practices and policies.


  19. GIS-BASED ACCESSIBILITY ANALYSIS OF URBAN EMERGENCY SHELTERS: THE CASE OF ADANA CITY

    Directory of Open Access Journals (Sweden)

    M. Unal

    2016-10-01

    Full Text Available Accessibility analysis of urban emergency shelters can help support urban disaster prevention planning. Pre-disaster emergency evacuation zoning has become a significant topic on disaster prevention and mitigation research. In this study, we assessed the level of serviceability of urban emergency shelters within maximum capacity, usability, sufficiency and a certain walking time limit by employing spatial analysis techniques of GIS-Network Analyst. The methodology included the following aspects: the distribution analysis of emergency evacuation demands, the calculation of shelter space accessibility and the optimization of evacuation destinations. This methodology was applied to Adana, a city in Turkey, which is located within the Alpine-Himalayan orogenic system, the second major earthquake belt after the Pacific-Belt. It was found that the proposed methodology could be useful in aiding to understand the spatial distribution of urban emergency shelters more accurately and establish effective future urban disaster prevention planning. Additionally, this research provided a feasible way for supporting emergency management in terms of shelter construction, pre-disaster evacuation drills and rescue operations.

  20. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    Science.gov (United States)

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  1. Associations between e-cigarette access and smoking and drinking behaviours in teenagers.

    Science.gov (United States)

    Hughes, Karen; Bellis, Mark A; Hardcastle, Katherine A; McHale, Philip; Bennett, Andrew; Ireland, Robin; Pike, Kate

    2015-03-31

    Public health concerns regarding e-cigarettes and debate on appropriate regulatory responses are focusing on the need to prevent child access to these devices. However, little is currently known about the characteristics of those young people that are accessing e-cigarettes. Using a cross-sectional survey of 14-17 year old school students in North West England (n = 16,193) we examined associations between e-cigarette access and demographics, conventional smoking behaviours, alcohol consumption, and methods of accessing cigarettes and alcohol. Access to e-cigarettes was identified through a question asking students if they had ever tried or purchased e-cigarettes. One in five participants reported having accessed e-cigarettes (19.2%). Prevalence was highest among smokers (rising to 75.8% in those smoking >5 per day), although 15.8% of teenagers that had accessed e-cigarettes had never smoked conventional cigarettes (v.13.6% being ex-smokers). E-cigarette access was independently associated with male gender, having parents/guardians that smoke and students' alcohol use. Compared with non-drinkers, teenagers that drank alcohol at least weekly and binge drank were more likely to have accessed e-cigarettes (adjusted odds ratio [AOR] 1.89, P smoking cessation. Those most likely to access e-cigarettes may already be familiar with illicit methods of accessing age-restricted substances.

  2. American Society of Clinical Oncology Policy Statement: The Role of the Oncologist in Cancer Prevention and Risk Assessment

    Science.gov (United States)

    Zon, Robin T.; Goss, Elizabeth; Vogel, Victor G.; Chlebowski, Rowan T.; Jatoi, Ismail; Robson, Mark E.; Wollins, Dana S.; Garber, Judy E.; Brown, Powel; Kramer, Barnett S.

    2009-01-01

    Oncologists have a critical opportunity to utilize risk assessment and cancer prevention strategies to interrupt the initiation or progression of cancer in cancer survivors and individuals at high risk of developing cancer. Expanding knowledge about the natural history and prognosis of cancers positions oncologists to advise patients regarding the risk of second malignancies and treatment-related cancers. In addition, as recognized experts in the full spectrum of cancer care, oncologists are afforded opportunities for involvement in community-based cancer prevention activities. Although oncologists are currently providing many cancer prevention and risk assessment services to their patients, economic barriers exist, including inadequate or lack of insurance, that may compromise uniform patient access to these services. Additionally, insufficient reimbursement for existing and developing interventions may discourage patient access to these services. The American Society of Clinical Oncology (ASCO), the medical society representing cancer specialists involved in patient care and clinical research, is committed to supporting oncologists in their wide-ranging involvement in cancer prevention. This statement on risk assessment and prevention counseling, although not intended to be a comprehensive overview of cancer prevention describes the current role of oncologists in risk assessment and prevention; provides examples of risk assessment and prevention activities that should be offered by oncologists; identifies potential opportunities for coordination between oncologists and primary care physicians in prevention education and coordination of care for cancer survivors; describes ASCO's involvement in education and training of oncologists regarding prevention; and proposes improvement in the payment environment to encourage patient access to these services. PMID:19075281

  3. Opportunities for Prevention: Assessing Where Low-Income Patients Seek Care for Preventable Coronary Artery Disease.

    Science.gov (United States)

    Klaiman, Tamar A; Valdmanis, Vivian G; Bernet, Patrick; Moises, James

    2015-10-01

    The Affordable Care Act has many aspects that are aimed at improving health care for all Americans, including mandated insurance coverage for individuals, as well as required community health needs assessments (CHNAs), and reporting of investments in community benefit by nonprofit hospitals in order to maintain tax exemptions. Although millions of Americans have gained access to health insurance, many--often the most vulnerable--remain uninsured, and will continue to depend on hospital community benefits for care. Understanding where patients go for care can assist hospitals and communities to develop their CHNA and implementation plans in order to focus resources where the need for prevention is greatest. This study evaluated patient care-seeking behavior among patients with coronary artery disease (CAD) in Florida in 2008--analyzed in 2013--to assess whether low-income patients accessed specific safety net hospitals for treatment or received care from hospitals that were geographically closer to their residence. This study found evidence that low-income patients went to hospitals that treated more low-income patients, regardless of where they lived. The findings demonstrate that hospitals-especially public safety net hospitals with a tradition of treating low-income patients suffering from CAD-should focus prevention activities where low-income patients reside.

  4. HIV prevention among transgender women in Latin America: implementation, gaps and challenges

    Science.gov (United States)

    Silva-Santisteban, Alfonso; Eng, Shirley; de la Iglesia, Gabriela; Falistocco, Carlos; Mazin, Rafael

    2016-01-01

    Introduction Transgender women are the population most vulnerable to HIV in Latin America, with prevalence between 18 and 38%. Although the region has improved antiretroviral coverage, there is an urgent need to strengthen HIV prevention for key populations to meet regional targets set by governments. We conducted an assessment on the state of HIV prevention among transgender women in Latin America. Methods We conducted a desk review of Global AIDS Response Progress Reports, national strategic plans, technical reports and peer-reviewed articles from 17 Latin American countries published through January 2015. The review was preceded by 12 semi-structured interviews with UNAIDS and Pan American Health Organization officers and a discussion group with transgender women regional leaders, to guide the identification of documents. We assessed access to, implementation and coverage of programmes; legal frameworks; community participation; inclusion of new strategies; and alignment with international recommendations. Results and discussion Overall, prevention activities in the region focus on condom distribution, diagnosis of sexually transmitted infections and peer education, mostly delivered at health facilities, with limited community involvement. Argentina and Uruguay have implemented structural interventions to address social inclusion. Argentina, Brazil and Mexico have adopted early initiation of antiretroviral therapy and treatment as prevention strategies. The other countries do not have substantial tailored interventions and consider the trans population a sub-population of men who have sex with men in data collection and programme implementation. Limited coverage of services, discrimination and a deep-seated mistrust of the health system among transgender women are the main barriers to accessing HIV prevention services. Promising interventions include health services adapted to transgender women in Mexico; LGBT-friendly clinics in Argentina that incorporate

  5. Chronic diseases risk factors and access to health exams among ...

    African Journals Online (AJOL)

    Using data from the World Health Survey (WHS) carried out in South Africa in 2003, the aim of this study is to establish chronic diseases risk factors and access to preventive exams for cervical and breast cancer among South African women. The sample included in this analysis included 1236 women 18 years and above.

  6. Safety testing for LHC access system

    CERN Document Server

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of systemñ€™s models through an automatic systemñ€™s state space exploration against some property formulas.

  7. Mediation designs for tobacco prevention research

    Science.gov (United States)

    MacKinnon, David P.; Taborga, Marcia P.; Morgan-Lopez, Antonio A.

    2010-01-01

    This paper describes research designs and statistical analyses to investigate how tobacco prevention programs achieve their effects on tobacco use. A theoretical approach to program development and evaluation useful for any prevention program guides the analysis. The theoretical approach focuses on action theory for how the program affects mediating variables and on conceptual theory for how mediating variables are related to tobacco use. Information on the mediating mechanisms by which tobacco prevention programs achieve effects is useful for the development of efficient programs and provides a test of the theoretical basis of prevention efforts. Examples of these potential mediating mechanisms are described including mediated effects through attitudes, social norms, beliefs about positive consequences, and accessibility to tobacco. Prior research provides evidence that changes in social norms are a critical mediating mechanism for successful tobacco prevention. Analysis of mediating variables in single group designs with multiple mediators are described as well as multiple group randomized designs which are the most likely to accurately uncover important mediating mechanisms. More complicated dismantling and constructive designs are described and illustrated based on current findings from tobacco research. Mediation analysis for categorical outcomes and more complicated statistical methods are outlined. PMID:12324176

  8. Implementation of selective prevention for cardiometabolic diseases; are Dutch general practices adequately prepared?

    Science.gov (United States)

    Stol, Daphne M; Hollander, Monika; Nielen, Markus M J; Badenbroek, Ilse F; Schellevis, François G; de Wit, Niek J

    2018-03-01

    Current guidelines acknowledge the need for cardiometabolic disease (CMD) prevention and recommend five-yearly screening of a targeted population. In recent years programs for selective CMD-prevention have been developed, but implementation is challenging. The question arises if general practices are adequately prepared. Therefore, the aim of this study is to assess the organizational preparedness of Dutch general practices and the facilitators and barriers for performing CMD-prevention in practices currently implementing selective CMD-prevention. Observational study. Dutch primary care. General practices. Organizational characteristics. General practices implementing selective CMD-prevention are more often organized as a group practice (49% vs. 19%, p = .000) and are better organized regarding chronic disease management compared to reference practices. They are motivated for performing CMD-prevention and can be considered as 'frontrunners' of Dutch general practices with respect to their practice organization. The most important reported barriers are a limited availability of staff (59%) and inadequate funding (41%). The organizational infrastructure of Dutch general practices is considered adequate for performing most steps of selective CMD-prevention. Implementation of prevention programs including easily accessible lifestyle interventions needs attention. All stakeholders involved share the responsibility to realize structural funding for programmed CMD-prevention. Aforementioned conditions should be taken into account with respect to future implementation of selective CMD-prevention. Key Points   There is need for adequate CMD prevention. Little is known about the organization of selective CMD prevention in general practices.   ‱ The organizational infrastructure of Dutch general practices is adequate for performing most steps of selective CMD prevention.   ‱ Implementation of selective CMD prevention programs including easily accessible

  9. Community-level Distribution of Misoprostol to Prevent Postpartum ...

    African Journals Online (AJOL)

    In Nigeria, most deaths due to postpartum hemorrhage (PPH) occur in the absence of skilled birth attendants. A study using community mobilization and the training of community drug keepers to increase access to misoprostol for PPH prevention was conducted in five communities around Zaria in Kaduna State, Nigeria.

  10. Cybersecurity: new challenge for nuclear power plants

    International Nuclear Information System (INIS)

    Mirambel Boquera, J.

    2011-01-01

    The purpose of this protective strategy is to ensure ability to detect, contain, respond and recover digital systems for monitoring, control and protection and thus ensure business continuity. A defensive strategy that consists of multiple levels is implemented to protect digital systems from unauthorized access, modification erroneous, misuse or any threat that could pose a risk to the Nuclear Security, Physical Security of people and the Radiological Protection, and the Environment.

  11. Cybersecurity: new challenge for nuclear power plants; Ciberseguridad: nuevo reto para las centrales nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Mirambel Boquera, J.

    2011-07-01

    The purpose of this protective strategy is to ensure ability to detect, contain, respond and recover digital systems for monitoring, control and protection and thus ensure business continuity. A defensive strategy that consists of multiple levels is implemented to protect digital systems from unauthorized access, modification erroneous, misuse or any threat that could pose a risk to the Nuclear Security, Physical Security of people and the Radiological Protection, and the Environment.

  12. Improving Public Health Through Access to and Utilization of Medication Assisted Treatment

    Directory of Open Access Journals (Sweden)

    Thomas F. Kresina

    2011-10-01

    Full Text Available Providing access to and utilization of medication assisted treatment (MAT for the treatment of opioid abuse and dependence provides an important opportunity to improve public health. Access to health services comprising MAT in the community is fundamental to achieve broad service coverage. The type and placement of the health services comprising MAT and integration with primary medical care including human immunodeficiency virus (HIV prevention, care and treatment services are optimal for addressing both substance abuse and co-occurring infectious diseases. As an HIV prevention intervention, integrated (same medical record for HIV services and MAT services MAT with HIV prevention, care and treatment programs provides the best “one stop shopping” approach for health service utilization. Alternatively, MAT, medical and HIV services can be separately managed but co-located to allow convenient utilization of primary care, MAT and HIV services. A third approach is coordinated care and treatment, where primary care, MAT and HIV services are provided at distinct locations and case managers, peer facilitators, or others promote direct service utilization at the various locations. Developing a continuum of care for patients with opioid dependence throughout the stages MAT enhances the public health and Recovery from opioid dependence. As a stigmatized and medical disenfranchised population with multiple medical, psychological and social needs, people who inject drugs and are opioid dependent have difficulty accessing services and navigating medical systems of coordinated care. MAT programs that offer comprehensive services and medical care options can best contribute to improving the health of these individuals thereby enhancing the health of the community.

  13. Digital gaming for HIV prevention with young adolescents.

    Science.gov (United States)

    Enah, Comfort; Moneyham, Linda; Vance, David E; Childs, Gwendolyn

    2013-01-01

    The search for intervention strategies appropriate for young adolescents has recently led to the use of digital games. Digital gaming interventions are promising because they may be developmentally appropriate for adolescent populations. The gaming approach also capitalizes on an inherent interest to adolescents and circumvents traditional barriers to access to prevention interventions faced in some geographical areas. Notwithstanding, research on gaming in HIV prevention is quite limited. In this review article, we examine the need for contextually relevant HIV prevention interventions among young adolescents. From this, we provide a theoretical framework for exploring contextually relevant HIV risk factors and a foundation for gathering and using input from the target population to adapt an existing game or to create a developmentally appropriate and contextually relevant HIV prevention game. Copyright © 2013 Association of Nurses in AIDS Care. Published by Elsevier Inc. All rights reserved.

  14. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  15. Access to and coverage of renal replacement therapy in minorities and ethnic groups in Venezuela.

    Science.gov (United States)

    Bellorin-Font, Ezequiel; Pernalete, Nidia; Meza, Josefina; Milanes, Carmen Luisa; Carlini, Raul G

    2005-08-01

    Access to and coverage of renal replacement therapy in minorities and ethnic groups in Venezuela. Numerous studies have documented the presence of racial and minority disparities regarding the impact of renal disease and access to renal replacement therapy (RRT). This problem is less well documented in Latin America. Venezuela, like most countries in the region, is subject to severe constraints in the allocation of resources for high-cost chronic diseases, which limits the access of patients with chronic kidney disease to RRT. Although access to health care is universal, there is both a deficit in coverage and disparity in the access to RRT, largely as a result of socioeconomic limitations and budget constrains. With current rising trends of the incidence of end-stage renal disease (ESRD) and costs of medical technology, the long-term goal of complete RRT coverage will become increasingly out of reach. Current evidence suggests that prevention of progression of renal disease is possible at relatively low cost and broad coverage. Based on this evidence, the Ministry of Health has redesigned its policy with respect to renal disease based on 4 elements: 1. Prevention by means of early detection and referral to multidisciplinary health teams, as well as promotion of health habits in the community. 2. Prevention of progression of renal disease by pharmacologic and nonpharmacologic means. 3. An increase in the rate of coverage and reduction of disparities in the access to dialysis. 4. An increase in the rates of renal transplantation through better organ procurement programs and reinforcement of transplant centers. However, the projected increase in the number of patients with ESKD receiving RRT will represent a serious burden to the health care system. Therefore, implementation of these policies will require the involvement of international agencies as well as an adequate partnership between nephrologists and health care planners, so that meeting the increasing demands

  16. Obesogenic environments: environmental approaches to obesity prevention.

    Science.gov (United States)

    Lipek, Tobias; Igel, Ulrike; Gausche, Ruth; Kiess, Wieland; Grande, Gesine

    2015-05-01

    Childhood obesity is a major concern for public health. There are multiple factors (e.g., genetic, social, and environmental) that contribute to unhealthy weight gain. Drawing from findings on "obesogenic environments" and core principles of preventive strategies to reduce health inequalities, this paper gives an overview of recent childhood prevention programs that target aspects of the physical environment ("environmental changes"). Out of the ten reviews we screened (including more than 300 studies), we identified very few that addressed aspects of the environment. We focus here on 14 programs that follow different approaches to environmental changes (e.g., access to/quality of playgrounds, changes in school cafeterias). Altering the environment offers opportunities for healthier behaviors and seems to be an effective strategy to prevent childhood obesity. However, the evaluation of those (mostly) multidimensional interventions does not allow drawing firm conclusions about the single effect of environmental changes. We conclude that obesity prevention programs should combine person-based and environmental approaches.

  17. Obstetric vesico-vaginal fistula is preventable by timely recognition ...

    African Journals Online (AJOL)

    Prevention of obstetric fistula should include universal access to maternity care, recognition and timely correction of abnormal progress of labour and punctilious attention to bladder care to avoid post-partum urinary retention. Key words: Obstetric fistula, Risk factors, Pathophysiology, Post-partum urinary retention ...

  18. Obesity prevention programs and policies: practitioner and policy-maker perceptions of feasibility and effectiveness.

    Science.gov (United States)

    Cleland, Verity; McNeilly, Briohny; Crawford, David; Ball, Kylie

    2013-09-01

    The aims of this study were to map obesity prevention activity being implemented by government, non-government, and community-based organizations; to determine practitioner and policy-maker perceptions of the feasibility and effectiveness of a range of evidence-based obesity prevention strategies; and to determine practitioner and policy-maker perceptions of preferred settings for obesity prevention strategies. This study involved a cross-sectional survey of 304 public health practitioners and policy-makers from government, non-government, and community organizations across Victoria, Australia. Participants reported their organizations' current obesity prevention programs and policies, their own perceptions of the feasibility and effectiveness of strategies to prevent obesity and their preferred settings for obesity prevention. Thirty-nine percent had an obesity prevention policy, and 92% were implementing obesity prevention programs. The most common programs focused on education, skill-building, and increasing access to healthy eating/physical activity opportunities. School curriculum-based initiatives, social support for physical activity, and family-based programs were considered the most effective strategies, whereas curriculum-based initiatives, active after-school programs, and providing access to and information about physical activity facilities were deemed the most feasible strategies. Schools were generally perceived as the most preferred setting for obesity prevention. Many organizations had obesity prevention programs, but far fewer had obesity prevention policies. Current strategies and those considered feasible and effective are often mismatched with the empirical literature. Systems to ensure better alignment between researchers, practitioners, and policy-makers, and identifying effective methods of translating empirical evidence into practice and policy are required. Copyright © 2012 The Obesity Society.

  19. Mitigating concerns and maximizing returns: social media strategies for injury prevention non-profits.

    Science.gov (United States)

    McMillan-Cottom, Tressie

    2014-08-01

    Injury prevention programs can use social media to disseminate information and recruit participants. Non-profit organizations have also used social media for fundraising and donor relationship management. Non-profit organizations (NPOs) with injury prevention missions often serve vulnerable populations. Social media platforms have varied levels of access and control of shared content. This variability can present privacy and outreach challenges that are of particular concern for injury prevention NPOs. This case report of social media workshops for injury prevention NPOs presents concerns and strategies for successfully implementing social media campaigns.

  20. Mitigating Concerns and Maximizing Returns: Social Media Strategies for Injury Prevention Non-profits

    Directory of Open Access Journals (Sweden)

    Tressie McMillan-Cottom

    2014-08-01

    Full Text Available Injury prevention programs can use social media to disseminate information and recruit participants. Non-profit organizations have also used social media for fundraising and donor relationship management. Non-profit organizations (NPOs with injury prevention missions often serve vulnerable populations. Social media platforms have varied levels of access and control of shared content. This variability can present privacy and outreach challenges that are of particular concern for injury prevention NPOs. This case report of social media workshops for injury prevention NPOs presents concerns and strategies for successfully implementing social media campaigns.

  1. Preventive psychiatry: Current status in contemporary psychiatry

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Chadda

    2017-01-01

    Full Text Available Preventive psychiatry is one of the most ignored subdiscipline of psychiatry, which has got important role to play in the contemporary psychiatry. Mental disorders are very common with lifetime prevalence of about 25%, and tend to be chronic. Due to the stigma associated with mental disorders, lack of awareness, and also lack of adequate mental health resources, nearly 60%–80% of the persons suffering from mental disorders do not access mental health care services. Mental and substance use disorders have been identified as one of the major contributors to the disease-related burden and disability-adjusted life years. In this background, preventive psychiatry has an important role to play in public health sector. Since etiology of most of the mental disorders is not known, it is not possible to follow here the standard model of primary, secondary, and tertiary prevention of public health. A concept of universal, selective, and indicated prevention has been proposed in primary prevention. Preventive approaches in psychiatry focus on evidence-based risk and protective factors, promoting quality of life, reducing stressors, and improving resilience. Such interventions, when planned targeting at specific mental disorders, have a potential to prevent mental disorders. Thus, preventive psychiatry has a crucial role to play in mental health, considering the high prevalence of mental disorders, the associated disability and burden, and a great drain on human resources.

  2. Faith and HIV prevention: the conceptual framing of HIV prevention among Pentecostal Batswana teenagers.

    Science.gov (United States)

    Mpofu, Elias; Nkomazana, Fidelis; Muchado, Jabulani A; Togarasei, Lovemore; Bingenheimer, Jeffrey Bart

    2014-03-05

    There is a huge interest by faith-based organizations (FBOs) in sub-Saharan Africa and elsewhere in HIV prevention interventions that build on the religious aspects of being. Successful partnerships between the public health services and FBOs will require a better understanding of the conceptual framing of HIV prevention by FBOS to access for prevention intervention, those concepts the churches of various denominations and their members would support or endorse. This study investigated the conceptual framing of HIV prevention among church youths in Botswana;--a country with one of the highest HIV prevalence in the world. Participants were 213 Pentecostal church members (67% female; age range 12 to 23 years; median age=19 years). We engaged the participants in a mixed-method inductive process to collect data on their implicit framing of HIV prevention concepts, taking into account the centrality of religion concepts to them and the moderating influences of age, gender and sexual experience. After, we analysed the data using multi-dimensional scaling (MDS) and hierarchical cluster analysis (HCA) to map the ways the church youths framed HIV prevention. The findings suggest the church youth to conceptually frame their HIV prevention from both faith-oriented and secular-oriented perspectives, while prioritizing the faith-oriented concepts based on biblical teachings and future focus. In their secular-oriented framing of HIV prevention, the church youths endorsed the importance to learn the facts about HIV and AIDS, understanding of community norms that increased risk for HIV and prevention education. However, components of secular-oriented framing of HIV prevention concepts were comparatively less was well differentiated among the youths than with faith-oriented framing, suggesting latent influences of the church knowledge environment to undervalue secular oriented concepts. Older and sexually experienced church youths in their framing of HIV prevention valued future

  3. Do vaginal lactobacilli prevent preterm labour? | Kotze | South ...

    African Journals Online (AJOL)

    South African Medical Journal. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 87, No 8 (1997) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Do vaginal lactobacilli prevent preterm labour? I.R. Kotze ...

  4. Access to Difficult-to-reach Population Subgroups: A Family Midwife Based Home Visiting Service for Implementing Nutrition-related Preventive Activities - A Mixed Methods Explorative Study

    Directory of Open Access Journals (Sweden)

    Helena Walz

    2015-08-01

    Full Text Available Health and social inequality are tightly linked and still pose an important public health problem. However, vulnerable and disadvantaged populations are difficult to reach for health-related interventions. Given the long-lasting effects of an adverse, particular nutrition-related, intrauterine and neonatal environment on health development (perinatal programming, an early and easy access is essential for sustainable interventions. The goal of this explorative study was therefore to elucidate whether an existing access of family midwives (FMs to families in need of support could be an option to implement effective public health and nutrition interventions. To that end three research objectives were formulated: (1 to determine whether a discernible impact of home visits by FMs can be described; (2 to identify subgroups among these families in need of more specific interventions; (3 to determine how relevant nutrition-related topics are for both FMs and the supported families. For addressing these objectives a mixed methods design was used: Routine documentation data from 295 families visited by a family midwife (FM were analyzed (secondary analysis, and structured expert interviews with FMs were conducted and analyzed. Study reporting followed the STROBE (STrengthening the Reporting of OBservational studies in Epidemiology statement. Based on the FMs reports, a significant improvement (p < 0.001 regarding psycho-social variables could be determined after the home visits. Single mothers, however, seemed to benefit less from the FMs service compared to their counterparts (p = 0.015. Nutritional counseling was demanded by 89% of the families during the home visits. In addition, nutrition-related topics were reported in the interviews to be of high interest to both families and the FMs. Based on the obtained results it is concluded that FMs home visits offer a promising access to vulnerable and disadvantaged families for implementing nutrition

  5. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  6. Integrated safeguards and facility design and operations

    International Nuclear Information System (INIS)

    Tape, J.W.; Coulter, C.A.; Markin, J.T.; Thomas, K.E.

    1987-01-01

    The integration of safeguards functions to deter or detect unauthorized actions by an insider requires the careful communication and management of safeguards-relevant information on a timely basis. The traditional separation of safeguards functions into physical protection, materials control, and materials accounting often inhibits important information flows. Redefining the major safeguards functions as authorization, enforcement, and verification, and careful attention to management of information from acquisition to organization, to analysis, to decision making can result in effective safeguards integration. The careful inclusion of these ideas in facility designs and operations will lead to cost-effective safeguards systems. The safeguards authorization function defines, for example, personnel access requirements, processing activities, and materials movements/locations that are permitted to accomplish the mission of the facility. Minimizing the number of authorized personnel, limiting the processing flexibility, and maintaining up-to-date flow sheets will facilitate the detection of unauthorized activities. Enforcement of the authorized activities can be achieved in part through the use of barriers, access control systems, process sensors, and health and safety information. Consideration of safeguards requirements during facility design can improve the enforcement function. Verification includes the familiar materials accounting activities as well as auditing and testing of the other functions

  7. Disparities in the Use of Preventive Health Care among Children with Disabilities in Taiwan

    Science.gov (United States)

    Tsai, Wen-Chen; Kung, Pei-Tseng; Wang, Jong-Yi

    2012-01-01

    Children with disabilities face more barriers accessing preventive health services. Prior research has documented disparities in the receipt of these services. However, most are limited to specific types of disability or care. This study investigates disparities in the use of preventive health care among children with disabilities in Taiwan. Three


  8. Perceived ease of access to alcohol, tobacco and other substances in rural and urban US students.

    Science.gov (United States)

    Warren, Jacob C; Smalley, K Bryant; Barefoot, K Nikki

    2015-01-01

    Ease of access to substances has been shown to have a direct and significant relationship with substance use for school-aged children. Previous research involving rural samples of middle and high school students reveals that perceived ease of access to substances is a significant predictor of recent use among rural adolescents; however, it is unclear if perceived access to substances varies between rural and urban areas. The purpose of the present study was to examine rural-urban differences in perceived ease of access to alcohol, smoking and chewing tobacco, marijuana, and seven other substances in the US state of Georgia in order to better inform and promote future substance use prevention and programming efforts in rural areas. Data were analyzed from the 2013 Georgia Student Health Survey II, administered in all public and interested private/charter schools in the state of Georgia. A total of 513 909 students (18.2% rural) indicated their perceived ease of access to 11 substances on a four-point Likert-type scale. Rural-urban differences were investigated using χ2 analysis. In general, it appeared the rural-urban differences fell along legal/illicit lines. For middle school students, a significant difference in perceived ease of access was found for each substance, with rural students reporting greater access to smoking tobacco, chewing tobacco, and steroids, and urban students reporting greater access to alcohol, marijuana, cocaine, inhalants, ecstasy, methamphetamine, hallucinogens, and prescription drugs. Rural high school students reported higher access to alcohol, smoking tobacco, chewing tobacco, and steroids, with urban students reporting higher access to marijuana, cocaine, inhalants, ecstasy, and hallucinogens. Perceptions of ease of access more than doubled for each substance in both geographies between middle and high school. The present study found multiple and fairly consistent differences between rural and urban students' perceived ease of access

  9. Review of the Main Security Problems with Multi-Agent Systems used in E-commerce Applications

    Directory of Open Access Journals (Sweden)

    Alfonso GONZÁLEZ BRIONES

    2016-12-01

    Full Text Available The ability to connect to the Internet from a wide variety of devices such as smart phones, IoT devices and desktops at anytime and anywhere, produces a large number of e-commerce transactions, such as purchases of clothes, ticket entrances for performances, or banking operations. The increasing number of these transactions has also created an increase in the number of threats and attacks by third parties to access user data banks. It is important to control the access procedure to user data so that the number of threats does not continue to grow. To do so, it is necessary to prevent unauthorized access, theft and fraud in electronic commerce, which is required to ensure the safety of these transactions. Many e-commerce platforms are developed through multi-agent-systems because they include certain advantages to control the product, resource management, task distribution, etc. However, there are a number of threats that can jeopardize the safety of the agents that make up the system. These issues must be taken into account in the development of these multi-agent systems. However, existing methods of development do not cover in depth the issue of security. It is necessary to present and classify the potential security flaws of multi-agent systems. Therefore, the present research presents a review of the main vulnerabilities that occur in multi-agent systems responsible for managing e-commerce applications, as well as the proposed solutions to the major security problems on these platform systems. The main conclusions provided by this research is the need to optimize security measures and enhance the different security solutions applied in e-commerce applications in order to prevent identity theft, access to private data, access control, etc. It is therefore essential to continue to develop the security methods employed in applications such as e-commerce as different types of attacks and threats continue to evolve.

  10. A secure online image trading system for untrusted cloud environments.

    Science.gov (United States)

    Munadi, Khairul; Arnia, Fitri; Syaryadhi, Mohd; Fujiyoshi, Masaaki; Kiya, Hitoshi

    2015-01-01

    In conventional image trading systems, images are usually stored unprotected on a server, rendering them vulnerable to untrusted server providers and malicious intruders. This paper proposes a conceptual image trading framework that enables secure storage and retrieval over Internet services. The process involves three parties: an image publisher, a server provider, and an image buyer. The aim is to facilitate secure storage and retrieval of original images for commercial transactions, while preventing untrusted server providers and unauthorized users from gaining access to true contents. The framework exploits the Discrete Cosine Transform (DCT) coefficients and the moment invariants of images. Original images are visually protected in the DCT domain, and stored on a repository server. Small representation of the original images, called thumbnails, are generated and made publicly accessible for browsing. When a buyer is interested in a thumbnail, he/she sends a query to retrieve the visually protected image. The thumbnails and protected images are matched using the DC component of the DCT coefficients and the moment invariant feature. After the matching process, the server returns the corresponding protected image to the buyer. However, the image remains visually protected unless a key is granted. Our target application is the online market, where publishers sell their stock images over the Internet using public cloud servers.

  11. Final deactivation project report on the Source Development Laboratory, building 3029, Oak Ridge National Laboratory, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1997-05-01

    The purpose of this report is to document the condition of Building 3029 after completion of deactivation activities as outlined by the DOE Nuclear Materials and Facility Stabilization Program (EM-60) guidance documentation. This report outlines the activities conducted to place the facility in a safe and environmentally sound condition for transfer to the DOE Office of Environmental Restoration (EM-40). This report provides a history and profile of the facility prior to commencing deactivation activities and a profile of the building after completion of deactivation activities. Turnover items, such as the post-deactivation surveillance and maintenance (S ampersand M) plan, remaining hazardous materials, radiological controls, safeguards and security, quality assurance, facility operations, and supporting documentation provided in the EM-60 turnover package are discussed. Building 3029 will require access to facilitate required S ampersand M activities to maintain the building safety envelope. building 3029 was stabilized during deactivation so that when transferred to the EM-40 program, only a minimal S ampersand M effort would be required to maintain the building safety envelope. Other than the minimal S ampersand M activities, the building will be unoccupied and the exterior doors locked to prevent unauthorized access. The building will be entered only to perform the required S ampersand M. 5 refs., 7 figs., 3 tabs

  12. Trauma center accessibility for road traffic injuries in Hanoi, Vietnam.

    Science.gov (United States)

    Nagata, Takashi; Takamori, Ayako; Kimura, Yoshinari; Kimura, Akio; Hashizume, Makoto; Nakahara, Shinji

    2011-09-30

    Rapid economic growth in Vietnam over the last decade has led to an increased frequency of road traffic injury (RTI), which now represents one of the leading causes of death in the nation. Various efforts toward injury prevention have not produced a significant decline in the incidence of RTIs. Our study sought to describe the geographic distribution of RTIs in Hanoi, Vietnam and to evaluate the accessibility of trauma centers to those injured in the city. We performed a cross-sectional study using Hanoi city police reports from 2006 to describe the epidemiology of RTIs occurring in Hanoi city. Additionally, we identified geographic patterns and determined the direct distance from injury sites to trauma centers by applying geographical information system (GIS) software. Factors associated with the accessibility of trauma centers were evaluated by multivariate regression analysis. We mapped 1,271 RTIs in Hanoi city. About 40% of RTIs occurred among people 20-29 years of age. Additionally, 63% of RTIs were motorcycle-associated incidents. Two peak times of injury occurrence were observed: 12 am-4 pm and 8 pm-0 am. "Hot spots" of road traffic injuries/fatalities were identified in the city area and on main highways using Kernel density estimation. Interestingly, RTIs occurring along the two north-south main roads were not within easy access of trauma centers. Further, fatal cases, gender and injury mechanism were significantly associated with the distance between injury location and trauma centers. Geographical patterns of RTIs in Hanoi city differed by gender, time, and injury mechanism; such information may be useful for injury prevention. Specifically, RTIs occurring along the two north-south main roads have lower accessibility to trauma centers, thus an emergency medical service system should be established.

  13. AEGIS: a wildfire prevention and management information system

    Science.gov (United States)

    Kostas Kalabokidis; Alan Ager; Mark Finney; Nikos Athanasis; Palaiologos Palaiologou; Christos Vasilakos

    2016-01-01

    We describe a Web-GIS wildfire prevention and management platform (AEGIS) developed as an integrated and easy-to-use decision support tool to manage wildland fire hazards in Greece (http://aegis.aegean.gr). The AEGIS platform assists with early fire warning, fire planning, fire control and coordination of firefighting forces by providing online access to...

  14. How Bioethics is Complementing Human Rights in Realizing Health Access for Clinical Trial Participants: The Case of Formative PrEP Access in South Africa.

    Science.gov (United States)

    Singh, Jerome

    2015-06-11

    Following the demise of apartheid, human rights in South Africa are now constitutionally enshrined.The right to health in South Africa's Constitution has been credited with transforming the lives of millions of people by triggering programmatic reforms in HIV treatment and the prevention of mother to child transmission (MTCT) of HIV.However, a constitutionally enshrined right to health offers no guarantee that clinical trial participants will enjoy post-trial access to beneficial interventions. Using access to HIV pre-exposure prophylaxis (PrEP) in South Africa as an example, this paper argues that adherence to bioethics norms could realize the right to health for trial participants following the end of a clinical trial. Copyright 2015 Singh. This is an open access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.

  15. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  16. Perancangan Enkripsi Pada Citra Bitmap Dengan Algoritma Des, Triple Des, dan Idea

    Directory of Open Access Journals (Sweden)

    Agustinna Yosanny

    2010-12-01

    Full Text Available Rapid development of Information Technology causes information can access easier without space boundaries. Image is a form of information, which contains many information. Some image contains confidential information that cannot distribute to unauthorized persons. Therefore, image encryption application is create to encrypt part of image that has confidential information. The image encryption application is encrypt image by applying DES, Triple DES, and IDEA algorithms. The research was applying analysis and design methodology. The analysis methodology was undertaken through literature study and algorithm research and testing. The design methodology was undertaken through database, features, system, and screen layout design. Results of the research are image encryption application that can encrypt part of image and or all of image by applying three algorithms such as DES, Triple DES, and IDEA. This application is show comparation of these algorithms. In conclusion, method of encryption can apply to image, so that confidential information of the image can protect from unauthorized person. 

  17. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  18. SECURITY AWARENESS – MAJOR PIECE IN THE PUZZLE OF INFORMATION SECURITY

    OpenAIRE

    MARIUS PETRESCU; NICOLETA SÎRBU; ANCA-GABRIELA PETRESCU; MIOARA BRABOVEANU

    2011-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  19. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  20. New Technologies and Emerging Threats: Personnel Security Adjudicative Guidelines in the Age of Social Networking

    Science.gov (United States)

    2012-12-01

    and Wife Arrested.” 25 Cuban intelligence over short-wave radio.58 Myers is also reported to have sent encrypted emails using Internet cafes ,59...accounts on a website in order to clog its customer list. This may not be illegal, and does not require unauthorized access to any system. However...Internet 16(a); 16(c) Steal proprietaty information (e.g., customer records, financial records) 16(a); 16(c) Create fake websites to commit fraud

  1. Emergency contraception: Sources of information and perceptions of access among young adults.

    Science.gov (United States)

    Garrett, Kyla P; Widman, Laura; Francis, Diane B; Noar, Seth M

    2016-01-01

    Emergency contraception (EC) can prevent pregnancy for up to 5 days after unprotected sex. Although EC has become increasingly available, little is known about perceptions of young adults regarding access to EC or whether information sources about EC relate to perceived access among young adults. Over a 1-week period in November 2013, a self-report survey was administered to 352 college students (67% women) at the student union of a large, public university in the southeastern United States. The survey assessed three aspects of EC: perceived access, information sources, and prior use. Twenty-one percent of participants had used EC. Participants reported relatively high perceptions of access to EC, with females reporting higher perceptions of access than males. Prior to the study, 7.4% of students had never heard of EC; the remaining students had heard of EC from an average of four sources. Among women, hearing of EC from media, interpersonal, or health education sources was significantly associated with greater perceived access (ps sources were associated with perceived access (ps > .10). Future EC awareness efforts for women should leverage all three of these sources, while future research should examine specific sources to focus on the content, quality, and frequency of messages.

  2. Percutaneous subclavian artery stent-graft placement following failed ultrasound guided subclavian venous access

    Directory of Open Access Journals (Sweden)

    Szkup Peter

    2006-05-01

    Full Text Available Abstract Background Ultrasound guidance for central and peripheral venous access has been proven to improve success rates and reduce complications of venous cannulation. Appropriately trained and experienced operators add significantly to diminished patient morbidity related to venous access procedures. We discuss a patient who required an arterial stent-graft to prevent arterial hemorrhage following inadvertent cannulation of the proximal, ventral, right subclavian artery related to unsuccessful ultrasound guided access of the subclavian vein. Case presentation During pre-operative preparation for aortic valve replacement and aorto-coronary bypass surgery an anesthetist attempted ultrasound guided venous access. The ultrasound guided attempt to access the right jugular vein failed and the ultrasound guided attempt at accessing the subclavian vein resulted in inappropriate placement of an 8.5 F sheath in the arterial system. Following angiographic imaging and specialist consultations, an arterial stent-graft was deployed in the right subclavian artery rather than perform an extensive anterior chest wall resection and dissection to extract the arterial sheath. The patient tolerated the procedure, without complication, despite occlusion of the right internal mammary artery and the right vertebral artery. There were no neurologic sequelae. There was no evidence of hemorrhage after subclavian artery sheath extraction and stent-graft implantation. Conclusion The attempted ultrasound guided puncture of the subclavian vein resulted in placement of an 8.5 F subclavian artery catheter. Entry of the catheter into the proximal subclavian artery beneath the medial clavicle, the medial first rib and the manubrium suggests that the operator, most likely, did not directly visualize the puncture needle enter the vessel with the ultrasound. The bones of the anterior chest impede the ultrasound beam and the vessels in this area would not be visible to ultrasound

  3. Prevention of the Musculoskeletal Complications of Hemophilia

    Directory of Open Access Journals (Sweden)

    E. C. Rodriguez-Merchan

    2012-01-01

    Full Text Available Hemophilia is an inherited disorder of clotting factor deficiencies resulting in musculoskeletal bleeding, including hemarthroses, leading to musculoskeletal complications. The articular problems of hemophiliac patients begin in infancy. These include: recurrent hemarthroses, chronic synovitis, flexion deformities, hypertrophy of the growth epiphyses, damage to the articular cartilage, and hemophilic arthropathy. The most commonly affected joints are the ankle, the knee, and the elbow. Hematologic prophylactic treatment from ages 2 to 18 years could avoid the development of hemophilic arthropathy if the concentration of the patient's deficient factor is prevented from falling below 1% of normal. Hemarthroses can be prevented by the administration of clotting factor concentrates (prophylaxis. However, high costs and the need for venous access devices in younger children continue to complicate recommendations for universal prophylaxis. Prevention of joint arthropathy needs to focus on prevention of hemarthroses through prophylaxis, identifying early joint disease through the optimal use of cost-effective imaging modalities and the validation of serological markers of joint arthropathy. Screening for effects on bone health and optimal management of pain to improve quality of life are, likewise, important issues. Major hemarthrosis and chronic hemophilic synovitis should be treated aggressively to prevent hemophilic arthropathy.

  4. Fifty communities putting prevention to work: accelerating chronic disease prevention through policy, systems and environmental change.

    Science.gov (United States)

    Bunnell, Rebecca; O'Neil, Dara; Soler, Robin; Payne, Rebecca; Giles, Wayne H; Collins, Janet; Bauer, Ursula

    2012-10-01

    The burden of preventable chronic diseases is straining our nation's health and economy. Diseases caused by obesity and tobacco use account for the largest portions of this preventable burden. CDC funded 50 communities in 2010 to implement policy, systems, and environmental (PSE) interventions in a 2-year initiative. Funded communities developed PSE plans to reduce obesity, tobacco use, and second-hand smoke exposure for their combined 55 million residents. Community outcome objectives and milestones were categorized by PSE interventions as they related to media, access, promotion, pricing, and social support. Communities estimated population reach based on their jurisdiction's census data and target populations. The average proportion of each community's population that was reached was calculated for each intervention category. Outcome objectives that were achieved within 12 months of program initiation were identified from routine program records. The average proportion of a community's jurisdictional population reached by a specific intervention varied across interventions. Mean population reach for obesity-prevention interventions was estimated at 35%, with 14 (26%) interventions covering over 50% of the jurisdictional populations. For tobacco prevention, mean population reach was estimated at 67%, with 16 (84%) interventions covering more than 50% of the jurisdictional populations. Within 12 months, communities advanced over one-third of their obesity and tobacco-use prevention strategies. Tobacco interventions appeared to have higher potential population reach than obesity interventions within this initiative. Findings on the progress and potential reach of this major initiative may help inform future chronic disease prevention efforts.

  5. HIV Prevention Among Transgender Populations: Knowledge Gaps and Evidence for Action.

    Science.gov (United States)

    Poteat, Tonia; Malik, Mannat; Scheim, Ayden; Elliott, Ayana

    2017-08-01

    The purpose of this review is to summarize the available evidence-based HIV prevention interventions tailored for transgender people. A limited number of evidence-based HIV prevention interventions have been tested with transgender populations. Most existing interventions target behavior change among transgender women, with only one HIV prevention program evaluated for transgender men. Studies addressing biomedical interventions for transgender women are ongoing. Few interventions address social and structural barriers to HIV prevention, such as stigma, discrimination, and poverty. Evidence-based multi-level interventions that address the structural, biomedical, and behavioral risks for HIV among transgender populations, including transgender men, are needed to address disparities in HIV prevalence. Future research should address not only pre-exposure prophylaxis uptake and condom use but also structural barriers that limit access to these prevention strategies.

  6. How to prevent trachoma and blindness.

    Science.gov (United States)

    1995-01-01

    The etiology associated with the loss of vision due to trachoma has been studied in great detail; so much so, that this cause of human suffering and potential blindness is now considered preventable. This brief communication describes the issues of trachoma prevention, available treatment, cost of prevention, and implementation challenges to establishing a program and making it work. International organizations such as WHO and UNICEF, in collaboration with nongovernmental organizations (NGOs) and local and national governments, have designed a simple yet effective trachoma control program. At the center of the program is community involvement. Better sanitation and access to clean water are two important community issues. Health education from childhood to adulthood is also critical. Individual knowledge about this disease has direct self-care implications (e.g., increased face washing). Treatment consists of antibiotics or simple surgery. Both have been developed to be low-cost and effective. National health officials must determine where health care funds are to be spent. This trachoma control program should be considered cost-effective. Materials and training are available for program implementation. Cost need no longer be the limiting factor in the establishment of a trachoma prevention and control program.

  7. Committee Opinion No 707: Access to Emergency Contraception.

    Science.gov (United States)

    2017-07-01

    Emergency contraception refers to contraceptive methods used to prevent pregnancy in the first few days after unprotected intercourse, sexual assault, or contraceptive failure. Although the U.S. Food and Drug Administration approved the first dedicated product for emergency contraception in 1998, numerous barriers to emergency contraception remain. The purpose of this Committee Opinion is to examine barriers to the use of emergency contraception, emphasize the importance of increasing access, and review new methods of emergency contraception and limitations in efficacy in special populations.

  8. Immediate access to antiretroviral therapy is important in children living with HIV

    Directory of Open Access Journals (Sweden)

    Sangeeta Das Bhattacharya

    2016-01-01

    Full Text Available This article reviews a case of a child with perinatal HIV followed for 30 months during a prospective cohort study on pneumonia prevention in HIV-infected children. The point of this case report is to illustrate how delayed access to antiretroviral therapy (ART in HIV-infected children impacts immunization response and growth. Given the WHO's early release guideline changes on ART recommendations and the expected full revised guidelines coming out this year, this article is a timely discussion on the need for access to ART for HIV infected Indian children regardless of CD4 count.

  9. Preventable Admissions on a General Medicine Service: Prevalence, Causes and Comparison with AHRQ Prevention Quality Indicators-A Cross-Sectional Analysis.

    Science.gov (United States)

    Patel, Krishna K; Vakharia, Nirav; Pile, James; Howell, Erik H; Rothberg, Michael B

    2016-06-01

    Rates of preventable admissions will soon be publicly reported and used in calculating performance-based payments. The current method of assessing preventable admissions, the Agency of Healthcare Research and Quality (AHRQ) Preventable Quality Indicators (PQI) rate, is drawn from claims data and was originally designed to assess population-level access to care. To identify the prevalence and causes of preventable admissions by attending physician review and to compare its performance with the PQI tool in identifying preventable admissions. Cross-sectional survey. General medicine service at an academic medical center. Consecutive inpatient admissions from December 1-15, 2013. Survey of inpatient attending physicians regarding the preventability of the admissions, primary contributing factors and feasibility of prevention. For the same patients, the PQI tool was applied to determine the claims-derived preventable admission rate. Physicians rated all 322 admissions and classified 122 (38 %) as preventable, of which 31 (25 %) were readmissions. Readmissions were more likely to be rated preventable than other admissions (49 % vs. 35 %, p = 0.04). Application of the AHRQ PQI methodology identified 75 (23 %) preventable admissions. Thirty-one admissions (10 %) were classified as preventable by both methods, and the majority of admissions considered preventable by the AHRQ PQI method (44/78) were not considered preventable by physician assessment (K = 0.04). Of the preventable admissions, physicians assigned patient factors in 54 (44 %), clinician factors in 36 (30 %) and system factors in 32 (26 %). A large proportion of admissions to a general medicine service appeared preventable, but AHRQ's PQI tool was unable to identify these admissions. Before initiation of the PQI rate for use in pay-for-performance programs, further study is warranted.

  10. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  11. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  12. [Stigma: Barrier to Access to Mental Health Services].

    Science.gov (United States)

    Campo-Arias, Adalberto; Oviedo, Heidi Celina; Herazo, Edwin

    2014-01-01

    The perceived stigma represents a sociocultural barrier to access mental health services and prevents individuals who meet criteria for a mental disorder the possibility of receiving comprehensive and integred care. To update institutional mechanisms by which stigma related to mental disorders, perceived and perpetrated, acts as a barrier to mental health access. Stigma as a barrier to access to mental health services is due to a reduction in service requests, the allocation of limited resources to mental health, the systematic process of impoverishment of the people who suffer a mental disorder, increased risk of crime, and implications in contact with the legal system, and the invisibility of the vulnerability of these people. Structured awareness and education programs are needed to promote awareness about mental disorders, promote community-based psychosocial rehabilitation, and reintegration into productive life process. In Colombia, the frequency and variables associated with the stigma of mental disorders needs to be studied. This knowledge will enable the implementation of measures to promote the social and labor inclusion of people who meet the criteria for mental disorders. Copyright © 2014 Asociación Colombiana de Psiquiatría. All rights reserved.

  13. Recent advances in prevention of sepsis in the premature neonates in NICU.

    Science.gov (United States)

    Manzoni, P; Rizzollo, S; Decembrino, L; Ruffinazzi, G; Rossi Ricci, A; Gallo, E; Stolfi, I; Mostert, M; Stronati, M; Farina, D

    2011-03-01

    Sepsis-related morbidity and mortality are major problems in NICU. Preterm neonates display clinical characteristics that make them prone to infections. Due to the high frequency of severe neurodevelopmental sequelae in survivors, the best possible strategy to manage sepsis in NICU is to prevent them. Hygiene, cohorting, stewardship on use of H2-blockers, steroids and broad-spectrum antibiotic are mandatory, as well as proper management of central venous accesses and surgical devices. In addition, clinical research offers the opportunity of adopting pharmacological preventative strategies such as use of palivizumab to prevent RSV infection, use of fluconazole to prevent fungal sepsis, use of probiotics and lactoferrin to enhance the innate immunity, and use of pagibaximab to prevent staphylococcal sepsis. Copyright © 2011 Elsevier Ltd. All rights reserved.

  14. Not sold here: limited access to legally available syringes at pharmacies in Tijuana, Mexico.

    Science.gov (United States)

    Pollini, Robin A; Rosen, Perth C; Gallardo, Manuel; Robles, Brenda; Brouwer, Kimberly C; Macalino, Grace E; Lozada, Remedios

    2011-05-24

    Sterile syringe access is a critical component of HIV prevention programs. Although retail pharmacies provide convenient outlets for syringe access, injection drug users (IDUs) may encounter barriers to syringe purchase even where purchase without a prescription is legal. We sought to obtain an objective measure of syringe access in Tijuana, Mexico, where IDUs report being denied or overcharged for syringes at pharmacies. Trained "mystery shoppers" attempted to buy a 1 cc insulin syringe according to a predetermined script at all retail pharmacies in three Tijuana neighborhoods. The same pharmacies were surveyed by telephone regarding their syringe sales policies. Data on purchase attempts were analyzed using basic statistics to obtain an objective measure of syringe access and compared with data on stated sales policies to ascertain consistency. Only 46 (28.4%) of 162 syringe purchase attempts were successful. Leading reasons for unsuccessful attempts were being told that the pharmacy didn't sell syringes (35.3%), there were no syringes in stock (31.0%), or a prescription was required (20.7%). Of 136 pharmacies also surveyed by telephone, a majority (88.2%) reported selling syringes but only one-third (32.5%) had a successful mystery shopper purchase; the majority of unsuccessful purchases were attributed to being told the pharmacy didn't sell syringes. There was similar discordance regarding prescription policies: 74 pharmacies said in the telephone survey that they did not require a prescription for syringes, yet 10 of these pharmacies asked the mystery shopper for a prescription. IDUs in Tijuana have limited access to syringes through retail pharmacies and policies and practices regarding syringe sales are inconsistent. Reasons for these restrictive and inconsistent practices must be identified and addressed to expand syringe access, reduce syringe sharing and prevent HIV transmission.

  15. Risk and protection factors for women’s health in the prevention of cervical cancer

    Directory of Open Access Journals (Sweden)

    Ana Carolina de Oliveira

    2014-06-01

    Full Text Available This study aimed to investigate the risk and protection factors for women who access health services for the realization of preventive screening for cervical cancer. Quantitative study conducted with 51 women in Teresina-PI, Brazil, in August 2013. The semi-structured form caught the variables of interest and the data were analyzed by the SPSS. Of the women, 72.5% were aged 25-39 years, 66.7% were married, and 55.0% accessed the service for prevention. With regard to the risk factors, 41.2% were overweight, 19.6% obese, and 72.5% were sedentary. Regarding the access to health services, 78.5% sought care in the past year. The cervical cancer screening program should be discussed in the sociocultural context, which will promote understanding and adherence to the recommendations of take the exam periodically. For this purpose, we recommend conducting immediate and effective measures to improve the viability of public policies for women’s health.

  16. A simple and rapid chromatographic method to determine unauthorized basic colorants (rhodamine B, auramine O, and pararosaniline) in processed foods.

    Science.gov (United States)

    Tatebe, Chiye; Zhong, Xining; Ohtsuki, Takashi; Kubota, Hiroki; Sato, Kyoko; Akiyama, Hiroshi

    2014-09-01

    A simple and rapid high-performance liquid chromatography (HPLC) method to determine basic colorants such as pararosaniline (PA), auramine O (AO), and rhodamine B (RB) in various processed foods was developed. Linearity of the calibration curves ranged from 0.05 to 50 ÎŒg/mL for PA and 0.05-100 ÎŒg/mL for AO and RB. The detection and quantification limits (LOD and LOQ) of the basic colorants, which were evaluated as signal-to-noise ratios of 3 for LOD and 10 for LOQ, ranged from 0.0125 to 0.05 and 0.025 to 0.125 ÎŒg/g, respectively. The recoveries and relative standard deviations of three basic colorants in six processed foods, namely, chili sauce, curry paste, gochujang (hot pepper paste), tandoori chicken (roasted chicken prepared with yogurt and spices), powder soup, and shrimp powder ranged from 70.2% to 102.8% and 0.8% to 8.0%, respectively. The intraday precision of the recovery test ranged from 1.7% to 4.5%, whereas the interday precision ranged from 3.7% to 7.7%. The reported method has been successfully applied to basic colorant determination in various processed foods such as fat-based food matrices (curry paste and tandoori chicken), chili products (gochujang and chili sauce), and protein-based products (shrimp powder and powder soup). Thin layer chromatography and liquid chromatography/mass spectrometry methods for the determination of basic colorants in processed foods were also developed for rapid analysis and identification, respectively. These methods are very useful for monitoring unauthorized basic colorants in inspection centers or quarantine laboratories in many countries.

  17. The effect of the global financial crisis on preventable hospitalizations among the homeless in New York State.

    Science.gov (United States)

    White, Brandi; Ellis, Charles; Jones, Walter; Moran, William; Simpson, Kit

    2018-04-01

    Objective Periods of economic instability may increase preventable hospitalizations because of increased barriers to accessing primary care. For underserved populations such as the homeless, these barriers may be more pronounced due to limited resources in the health care safety net. This study examined the impact of the global financial crisis of 2007-2008 on access to care for the homeless in New York State. Methods Hospitalizations for ambulatory care sensitive conditions (ACSCs) were used as a proxy measure for primary care access. Admissions for ACSCs were identified in the New York State Inpatient Database from 2006 to 2012. Hospitalization rates for ACSCs were calculated for the homeless and nonhomeless. Multivariable linear regression was used to investigate the impact of the financial crisis on hospitalization rates for ACSCs. Results The findings indicate that during the financial crisis, homeless adults had significantly higher preventable hospitalizations than nonhomeless adults, and the uninsured homeless had significantly higher preventable hospitalizations when compared to other homeless subgroups. After the financial crisis, preventable hospitalizations for the homeless stabilized but remained at higher rates than those for the nonhomeless. Conclusions These findings are important to developing health policies designed to provide effective care for underserved population such as the homeless.

  18. Engaging patients in pressure ulcer prevention.

    Science.gov (United States)

    Hudgell, Lynne; Dalphinis, Julie; Blunt, Chris; Zonouzi, Maryam; Procter, Susan

    2015-05-06

    As patients increasingly care for themselves at home, they require accessible information to enable informed self-care. This article describes the development of an educational electronic application (app) designed for use by patients at risk of pressure ulcers, and their carers. The app can be downloaded to Windows, Android or Apple smartphones or tablets. The app is based on the current pressure ulcer prevention and management guidelines from the National Pressure Ulcer Advisory Panel and the National Institute for Health and Care Excellence, and is designed to educate patients and carers about how to prevent a pressure ulcer, how to recognise a pressure ulcer, and what to do if they suspect they are developing a pressure ulcer. We hope the app will be used to help with educational conversations among patients, carers and healthcare professionals.

  19. [Online gaming. Potential risk and prevention programs].

    Science.gov (United States)

    Malischnig, Doris

    2014-12-01

    Online gaming is more and more common and increasingly accessible. Due to a lack of social control the participation could be a potential risk for certain customers. The given article focuses on prevention measures that are provided by the Austrian online gaming operator, the Austrian Lotteries, provider of the online gaming platform win2day, in the light of the specifics of Internet gaming in order to avoid problems with gaming.

  20. Road traffic crashes and risk groups in India: Analysis, interpretations, and prevention strategies

    Directory of Open Access Journals (Sweden)

    Raj V. Ponnaluri

    2012-03-01

    Recommended prevention strategies include: developing a road accident recording system and an access management policy; integrating safety into corridor design and road construction; undertaking capacity-building efforts; and expanding emergency response services.

  1. Assessing Health Care Access and Use among Indigenous Peoples in Alberta: a Systematic Review.

    Science.gov (United States)

    Nader, Forouz; Kolahdooz, Fariba; Sharma, Sangita

    2017-01-01

    Alberta's Indigenous population is growing, yet health care access may be limited. This paper presents a comprehensive review on health care access among Indigenous populations in Alberta with a focus on the health care services use and barriers to health care access. Scientific databases (PubMed, EMBASE, CINAHL, and PsycINFO) and online search engines were systematically searched for studies and grey literature published in English between 2000 and 2013 examining health care services access, use and barriers to access among Indigenous populations in Alberta. Information on health care services use and barriers to use or access was synthesized based on the MOOSE guidelines. Overall, compared to non-Indigenous populations, health care use rates for hospital/emergency room services were higher and health care services use of outpatient specialists was lower among Indigenous peoples. Inadequate numbers of Indigenous health care professionals; a lack of cross-cultural training; fear of foreign environments; and distance from family and friends were barriers to health care use and access. Inequity in social determinants of health among Indigenous peoples and inadequate "health services with prevention approaches," may contribute to present health disparities between Indigenous and non-Indigenous populations in the province.

  2. Masculinity and preventing falls: insights from the fall experiences of men aged 70 years and over.

    Science.gov (United States)

    Liddle, J L M; Lovarini, Meryl; Clemson, Lindy M; Jang, Haeyoung; Lord, Stephen R; Sherrington, Catherine; Willis, Karen

    2018-01-11

    To explore men's fall experiences through the lens of masculine identities so as to assist health professionals better engage men in fall prevention programs. Twenty-five men, aged 70-93 years who had experienced a recent fall, participated in a qualitative semi-structured interview. Men's willingness to engage in fall prevention programs taking account of individual contexts and expressions of masculinity, were conceptualised using constant comparative methods. Men's willingness to engage in fall prevention programs was related to their perceptions of the preventability of falls; personal relevance of falls; and age, health, and capability as well as problem-solving styles to prevent falls. Fall prevention advice was rarely given when men accessed the health system at the time of a fall. Contrary to dominant expectations about masculine identity, many men acknowledged fall vulnerability indicating they would attend or consider attending, a fall prevention program. Health professionals can better engage men by providing consistent messages that falls can be prevented; tailoring advice, understanding men are at different stages in their awareness of fall risk and preferences for action; and by being aware of their own assumptions that can act as barriers to speaking with men about fall prevention. Implications for rehabilitation Men accessing the health system at the time of the fall, and during rehabilitation following a fall represent prime opportunities for health professionals to speak with men about preventing falls and make appropriate referrals to community programs. Tailored advice will take account of individual men's perceptions of preventability; personal relevance; perceptions of age, health and capability; and problem-solving styles.

  3. Developing Responsive Preventative Practices: Key Messages from Children's and Families' Experiences of the Children's Fund

    Science.gov (United States)

    Pinnock, Katherine; Evans, Ruth

    2008-01-01

    As part of the prevention and social inclusion agenda, the Children's Fund, set up in 2000, has developed preventative services for children at risk of social exclusion. Drawing on a large qualitative dataset of interviews conducted in 2004/05 with children, young people and their parents/carers who accessed Children Fund services, this article


  4. Social network approaches to recruitment, HIV prevention, medical care, and medication adherence

    OpenAIRE

    Latkin, Carl A.; Davey-Rothwell, Melissa A.; Knowlton, Amy R.; Alexander, Kamila A.; Williams, Chyvette T.; Boodram, Basmattee

    2013-01-01

    This article reviews current issues and advancements in social network approaches to HIV prevention and care. Social network analysis can provide a method to understand health disparities in HIV rates and treatment access and outcomes. Social network analysis is a value tool to link social structural factors to individual behaviors. Social networks provide an avenue for low cost and sustainable HIV prevention interventions that can be adapted and translated into diverse populations. Social ne...

  5. A qualitative study analyzing access to physical rehabilitation for traffic accident victims with severe disability in Brazil.

    Science.gov (United States)

    Sousa, Kelienny de Meneses; Oliveira, Wagner Ivan FonsĂȘca de; Melo, Laiza Oliveira Mendes de; Alves, Emanuel Augusto; Piuvezam, Grasiela; Gama, Zenewton AndrĂ© da Silva

    2017-03-01

    Purpose To identify access barriers to physical rehabilitation for traffic accident (TA) victims with severe disability and build a theoretical model to provide guidance towards the improvement of these services. Methods Qualitative research carried out in the city of Natal (Northeast Brazil), with semi-structured interviews with 120 subjects (19 key informer health professionals and 101 TA victims) identified in a database made available by the emergency hospital. The interviews were analyzed using Alceste software, version 4.9. Results The main barriers present in the interviews were: (1) related to services: bureaucratic administrative practises, low offer of rehabilitation services, insufficient information on rehabilitation, lack of guidelines that integrate hospital and ambulatory care and (2) related to patients: financial difficulties, functional limitations, geographic distance, little information on health, association with low education levels and disbelief in the system and in rehabilitation. Conclusion The numerous access barriers were presented in a theoretical model with causes related to organizational structure, processes of care, professionals and patients. This model must be tested by health policy-makers and managers to improve the quality of physical rehabilitation and avoid unnecessary prolongation of the suffering and disability experienced by TA survivors. Implications for rehabilitation Traffic accidents (TAs) are a global health dilemma that demands integrality of preventive actions, pre-hospital and hospital care and physical rehabilitation (PR). This study lays the foundation for improving access to PR for TA survivors, an issue of quality of care that results in preventable disabilities. The words of the patients interviewed reveal the suffering of victims, which is often invisible to society and given low priority by health policies that relegate PR to a second plan ahead of prevention and urgent care. A theoretical model of the

  6. Engineering Information Security The Application of Systems Engineering Concepts to Achieve Information Assurance

    CERN Document Server

    Jacobs, Stuart

    2011-01-01

    Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,

  7. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  8. ID based cryptography for secure cloud data storage

    OpenAIRE

    Kaaniche , Nesrine; Boudguiga , Aymen; Laurent , Maryline

    2013-01-01

    International audience; This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it offers controlled data access and sharing among users, so that unauthorized us...

  9. GROUP POLICY BASED AUTHENTICATION ON INCOMING CALLS FOR ANDROID SMARTPHONES

    OpenAIRE

    Sunita M. Kumbhar, Prof. Z.M Shaikh

    2016-01-01

    The numbers of Smartphone users increasing day by day. Hence, there is need to propose advanced Group Policy based Authentication for incoming calls for Android phone. Android platform provides a variety of functions that support the programming of face recognition, as in image processing. Group policy based authentication scheme increases the security which restricts the access of incoming call form un-authorized user. To solve problems, related to face recognition should be applied in the p...

  10. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  11. A new strategy and its effect on adherence to intermittent preventive treatment of malaria in pregnancy in Uganda

    DEFF Research Database (Denmark)

    Mbonye, Anthony K; Yanow, Stephanie; Birungi, Josephine

    2013-01-01

    Few women in Uganda access intermittent preventive treatment of malaria in pregnancy (IPTp) with sulfadoxine-pyrimethamine (SP). Previous studies have shown that high costs, frequent stock-out of drugs, supplies and poor quality of care are the greatest hindrance for women to access health services...

  12. Male access to emergency contraception in pharmacies: a mystery shopper survey.

    Science.gov (United States)

    Bell, David L; Camacho, Elvis J; Velasquez, Andrew B

    2014-10-01

    Pharmacy access to emergency contraception (EC) could involve men in pregnancy prevention. The objectives were to assess the availability and cost of EC. Male mystery shoppers visited 158 pharmacies in three neighborhoods in New York City. They asked for EC and its cost and noted weekend hours. Twenty-two (73.3%) of 30 pharmacies created barriers to get EC. The cost of EC was higher in the higher-socioeconomic status (SES) neighborhood (p<.001), and the higher-SES neighborhood pharmacies had a greater number of weekend hours (p<.001). Overall, males had a 20% probability of not being able to access EC. The national dialogue should include males. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. Permission-based Index Clustering for Secure Multi-User Search

    OpenAIRE

    Eirini C. Micheli; Giorgos Margaritis; Stergios V. Anastasiadis

    2015-01-01

    Secure keyword search in shared infrastructures prevents stored documents from leaking sensitive information to unauthorized users. A shared index provides confidentiality if it is exclusively used by users authorized to search all the indexed documents. We introduce the Lethe indexing workflow to improve query and update efficiency in secure keyword search. The Lethe workflow clusters together documents with similar sets of authorized users, and creates shared indices for configurable docume...

  14. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  15. A proposal for the inclusion of accessibility criteria in the authoring workflow of images for scientific articles

    OpenAIRE

    Splendiani, Bruno

    2015-01-01

    This thesis investigates the problem of how to provide accessible images in academic articles in the research fields of Science, Technology, Engineering and Mathematics (STEM) and in particular in biomedicine. Currently, graphics in scientific articles are a critical information source and often provide essential information for a thorough understanding of scientific articles. People with visual and other impairments experience specific barriers that prevent them from accessing the informatio...

  16. Georgia's Medicaid Family Planning Waiver: Working Together with Title X to Enhance Access to and Use of Contraceptive and Preventive Health Services.

    Science.gov (United States)

    Dunlop, Anne L; Adams, Esther Kathleen; Hawley, Jonathan; Blake, Sarah C; Joski, Peter

    We sought to assess the impact of Georgia's family planning demonstration waiver upon access to and use of contraceptive and preventive health services within Title X and Medicaid. Georgia Title X and Medicaid data for January 2009 through December 2013 (before and after the waiver), restricting Title X data to women targeted by the waiver (18-44 years, incomes from 25% and 50% through 200% of the federal poverty level [FPL]) was assembled by quarter and marginal effects of the changes before and after waiver implementation were derived using multivariate regression models. After implementation, there was a significant increase in the probability of Title X clients in the waiver-targeted age and income ranges who had Medicaid versus no insurance and who exited the encounter with higher effectiveness contraceptive methods, including long-acting reversible contraceptives (LARCs), and with cervical cytology and sexually transmitted infection testing. In the Medicaid data from 2009 to 2013, there was an increase in the mean number of encounters per enrollee (2.19 vs. 2.42) and in LARC users; however, the percentage of all Georgia women living under 200% of the FPL with a family planning encounter in Title X and Medicaid decreased from 19% to 15%. Our findings suggest that implementation of the Georgia family planning demonstration waiver contributed to the increased use of higher effectiveness contraceptive methods, including LARCs, within the Medicaid and Title X programs as well as the increased use of preventive screenings among Title X clients. However, when the full population of low-income Georgia women targeted by the waiver was considered, a greater percentage was not served over the demonstration period. Copyright © 2016 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  17. Statement at Nuclear Security Summit, 25 March 2014, The Hague, Netherlands

    International Nuclear Information System (INIS)

    Amano, Y.

    2014-01-01

    In recent years, world leaders have put the need to protect nuclear and other radioactive material from malicious acts high on the international agenda. Many of the commitments made at the first two nuclear security summits have been fulfilled. Globally, much has been achieved in the past decade. Many countries have taken effective measures to prevent theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive material. Security has been improved at many facilities containing such material. While the responsibility for nuclear security at the national level rests entirely with each State, the central role of the International Atomic Energy Agency in helping to strengthen the global nuclear security framework is widely recognized. We continue to expand the services we offer. However, too much nuclear material still goes missing. Too many facilities are still inadequately protected. Border security remains lax in too many places. And attempts are still being made to acquire nuclear or other radioactive material with malicious intent. The threat of nuclear terrorism remains real

  18. Influence of the signer's psychophysiological state on the results of his identification using handwritten pattern by natural and artificial intelligence

    Directory of Open Access Journals (Sweden)

    Alexey E. Sulavko

    2017-11-01

    Full Text Available At present, while various mechanisms to ensure information security are actively being improved, particular attention is paid to prevent unauthorized access to information resources.  The human factor and process of identification still remain the most problematic, as well as user authentication. A progress in the technology of information resources protection from internal security threats paves its way towards biometric systems of hidden identification of computer users and their psychophysiological state. A change in psychophysiological state results in the person's handwriting. The influence of the signer’s state of fatigue and excitation on the results of its identification both by a person and by pattern recognition methods on reproduced signatures are studied. Capabilities of human and artificial intelligence are compared in equal conditions. When the state of the signer changes, the probability of erroneous recognition by artificial intelligence increases by factor 3.3 to 3.7. A person identifies a handwritten image with fewer errors in case when the signer is agitated, and with higher error rate if the signer is tired.

  19. EPICS: Experimental Physics and Industrial Control System

    Science.gov (United States)

    Epics Development Team

    2013-02-01

    EPICS is a set of software tools and applications developed collaboratively and used to create distributed soft real-time control systems for scientific instruments such as particle accelerators and telescopes. Such distributed control systems typically comprise tens or even hundreds of computers, networked together to allow communication between them and to provide control and feedback of the various parts of the device from a central control room, or even remotely over the internet. EPICS uses Client/Server and Publish/Subscribe techniques to communicate between the various computers. A Channel Access Gateway allows engineers and physicists elsewhere in the building to examine the current state of the IOCs, but prevents them from making unauthorized adjustments to the running system. In many cases the engineers can make a secure internet connection from home to diagnose and fix faults without having to travel to the site. EPICS is used by many facilities worldwide, including the Advanced Photon Source at Argonne National Laboratory, Fermilab, Keck Observatory, Laboratori Nazionali di Legnaro, Brazilian Synchrotron Light Source, Los Alamos National Laboratory, Australian Synchrotron, and Stanford Linear Accellerator Center.

  20. Suicide prevention strategies revisited: 10-year systematic review.

    Science.gov (United States)

    Zalsman, Gil; Hawton, Keith; Wasserman, Danuta; van Heeringen, Kees; Arensman, Ella; Sarchiapone, Marco; Carli, Vladimir; Höschl, Cyril; Barzilay, Ran; Balazs, Judit; Purebl, György; Kahn, Jean Pierre; Såiz, Pilar Alejandra; Lipsicas, Cendrine Bursztein; Bobes, Julio; Cozman, Doina; Hegerl, Ulrich; Zohar, Joseph

    2016-07-01

    Many countries are developing suicide prevention strategies for which up-to-date, high-quality evidence is required. We present updated evidence for the effectiveness of suicide prevention interventions since 2005. We searched PubMed and the Cochrane Library using multiple terms related to suicide prevention for studies published between Jan 1, 2005, and Dec 31, 2014. We assessed seven interventions: public and physician education, media strategies, screening, restricting access to suicide means, treatments, and internet or hotline support. Data were extracted on primary outcomes of interest, namely suicidal behaviour (suicide, attempt, or ideation), and intermediate or secondary outcomes (treatment-seeking, identification of at-risk individuals, antidepressant prescription or use rates, or referrals). 18 suicide prevention experts from 13 European countries reviewed all articles and rated the strength of evidence using the Oxford criteria. Because the heterogeneity of populations and methodology did not permit formal meta-analysis, we present a narrative analysis. We identified 1797 studies, including 23 systematic reviews, 12 meta-analyses, 40 randomised controlled trials (RCTs), 67 cohort trials, and 22 ecological or population-based investigations. Evidence for restricting access to lethal means in prevention of suicide has strengthened since 2005, especially with regard to control of analgesics (overall decrease of 43% since 2005) and hot-spots for suicide by jumping (reduction of 86% since 2005, 79% to 91%). School-based awareness programmes have been shown to reduce suicide attempts (odds ratio [OR] 0·45, 95% CI 0·24-0·85; p=0·014) and suicidal ideation (0·5, 0·27-0·92; p=0·025). The anti-suicidal effects of clozapine and lithium have been substantiated, but might be less specific than previously thought. Effective pharmacological and psychological treatments of depression are important in prevention. Insufficient evidence exists to assess the

  1. Sexual Harassment Preventive/Protective Practices at U.S. Colleges and Universities.

    Science.gov (United States)

    Hobson, Charles J.; Guziewicz, Jennifer

    2002-01-01

    Reports on a survey concerning thirteen recommended sexual harassment preventive/protective practices at U.S. colleges and universities. A majority of responding institutions had formal sexual harassment policies, offered counseling to student victims, and investigated all complaints. Relatively fewer schools provided student access to faculty


  2. Prevention of Mother-to-Child HIV Transmission: Predictors of Utilization & Future Policy Implication

    OpenAIRE

    Martz, Tyler Elizabeth

    2015-01-01

    Despite the availability of highly efficacious antiretroviral drug regimens for the prevention of mother-to-child HIV transmission (PMTCT), transmission rates remain higher than those achieved in clinical trials. Access to these efficacious drug regimens continues to expand rapidly in countries most affected by HIV. Such expansion is an important first step in dramatically reducing mother-to-child HIV transmission rates. However, beyond access to drug regimens, programs must also identify and...

  3. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  4. Access to finance for innovation: the role of venture capital and the stock market

    NARCIS (Netherlands)

    Bogliacino, F.; Lucchese, M.

    2011-01-01

    Financial constraints for young and small firms can prevent them from contributing to innovation and the creation of new jobs. The paper analyzes two of the several institutional mechanisms implemented to overcome that hurdle: the development of the venture capital market and access to the stock

  5. Exploring African-American and Latino Teens' Perceptions of Contraception and Access to Reproductive Health Care Services

    OpenAIRE

    Galloway, Charlotte T.; Duffy, Jennifer L.; Dixon, Rena P.; Fuller, Taleria R.

    2017-01-01

    Purpose Reducing disparities in teen pregnancy and birth rates among African American and Latina teens is a central focus of a community-wide teen pregnancy prevention initiative implemented by the South Carolina Campaign to Prevent Teen Pregnancy. Disparities in teen pregnancy and birth rates are driven, in part, by differential access to contraception and reproductive health care services. The purpose of this qualitative study was to understand African American and Latino teens? 1) preferen...

  6. Linking HIV-Negative Youth to Prevention Services in 12 U.S. Cities: Barriers and Facilitators to Implementing the HIV Prevention Continuum.

    Science.gov (United States)

    Doll, Mimi; Fortenberry, J Dennis; Roseland, Denise; McAuliff, Kathleen; Wilson, Craig M; Boyer, Cherrie B

    2018-04-01

    Linkage of HIV-negative youth to prevention services is increasingly important with the development of effective pre-exposure prophylaxis that complements behavioral and other prevention-focused interventions. However, effective infrastructure for delivery of prevention services does not exist, leaving many programs to address HIV prevention without data to guide program development/implementation. The objective of this study was to provide a qualitative description of barriers and facilitators of linkage to prevention services among high-risk, HIV-negative youth. Thematic analysis of structured interviews with staff implementing linkage to prevention services programs for youth aged 12-24 years. Twelve adolescent medicine HIV primary care programs as part of larger testing research program focused on young sexual minority men of color. The study included staff implementing linkage to prevention services programs along with community-based HIV testing programs. The main outcomes of the study were key barriers/facilitators to linkage to prevention services. Eight themes summarized perspectives on linkage to prevention services: (1) relationships with community partners, (2) trust between providers and youth, (3) youth capacity to navigate prevention services, (4) pre-exposure prophylaxis specific issues, (5) privacy issues, (6) gaps in health records preventing tailored services, (7) confidentiality of care for youth accessing services through parents'/caretakers' insurance, and (8) need for health-care institutions to keep pace with models that prioritize HIV prevention among at-risk youth. Themes are discussed in the context of factors that facilitated/challenged linkage to prevention services. Several evidence-based HIV prevention tools are available; infrastructures for coordinated service delivery to high-risk youth have not been developed. Implementation of such infrastructures requires attention to community-, provider-, and youth-related issues. Copyright Â

  7. Efforts to secure universal access to HIV/AIDS treatment: a comparison of BRICS countries.

    Science.gov (United States)

    Sun, Jing; Boing, Alexandra Crispim; Silveira, Marysabel P T; Bertoldi, Andréa D; Ziganshina, Liliya E; Khaziakhmetova, Veronica N; Khamidulina, Rashida M; Chokshi, Maulik R; McGee, Shelley; Suleman, Fatima

    2014-02-01

    This article illustrates how the BRICS countries have been building their focused leadership, making important high level commitment and national policy changes, and improving their health systems, in addressing the HIV/AIDS epidemics in respective settings. Specific aspects are focused on efforts of creating public provisions to secure universal access to ARVs from the aspects of active responsive system and national program, health system strengthening, fostering local production of ARVs, supply chain management, and information system strengthening. Challenges in each BRICS country are analyzed respectively. The most important contributors to the success of response to HIV/AIDS include: creating legal basis for healthcare as a fundamental human right; political commitment to necessary funding for universal access and concrete actions to secure equal quality care; comprehensive system to secure demands that all people in need are capable of accessing prevention, treatment and care; active community involvement; decentralization of the management system considering the local settings; integration of treatment and prevention; taking horizontal approach to strengthen health systems; fully use of the TRIPS flexibility; and regular monitoring and evaluation to serve evidence based decision making. © 2013 Chinese Cochrane Center, West China Hospital of Sichuan University and Wiley Publishing Asia Pty Ltd.

  8. Engaging local businesses in HIV prevention efforts: the consumer perspective.

    Science.gov (United States)

    Phillips-Guzman, Christina M; Martinez-Donate, Ana P; Hovell, Melbourne F; Blumberg, Elaine J; Sipan, Carol L; Rovniak, Liza S; Kelley, Norma J

    2011-07-01

    Participation of different community sectors, including the private business sector, is necessary to fight the HIV/AIDS epidemic. Local businesses may be reluctant to participate in HIV prevention because of fear of negative customer reactions and loss of revenue. This study examines the extent to which residents of two communities in San Diego, California, would support HIV prevention initiatives in local businesses. A population-based household survey (N = 200) is conducted in two communities with higher versus lower risk for HIV. The survey includes questions regarding the acceptability of HIV prevention activities, such as condom and brochure distribution in businesses, and history of exposure to HIV prevention activities in local businesses. Most residents agree that (a) business involvement in prevention activities would reduce HIV (92%), (b) free or low-cost condoms available in businesses could prevent the spread of HIV (90.9%) and increase condom accessibility (87%), and (c) they would prefer to shop at businesses that supported HIV prevention versus those that did not (87.4%). These findings suggest that HIV prevention in local businesses would be supported by residents and would be unlikely to adversely affect business profits. This information could be used to design interventions to engage local businesses in HIV-prevention efforts.

  9. Minimum Release of Tributyltin to Prevent Macrofouling

    Science.gov (United States)

    1990-10-01

    Thain, J.E., M.J. Waldock, and M.E. Wait, Toxicity and degradation studies of Tributyltin ( TBT ) and Dibutyltin (DBT) in the aquatic environment, in...MATERIALS AND METHODS The test system used was designed to pump a known volume of a tributyltin ( TBT ) solution of known concentration through a porous...ELEMENT NO NO NO ACCESSION NO 11 TITLE (Include Security Classification) nimum Release of Tributyltin to Prevent Macrofoulinq 12 PERSONAL AUTHOR(S

  10. Advancing Migrant Access to Health Services in Europe (AMASE): Protocol for a Cross-sectional Study.

    Science.gov (United States)

    Fakoya, Ibidun; Álvarez-Del Arco, Débora; Monge, Susana; Copas, Andrew J; Gennotte, Anne-Francoise; Volny-Anne, Alain; Göpel, Siri; Touloumi, Giota; Prins, Maria; Barros, Henrique; Staehelin, Cornelia; Del Amo, Julia; Burns, Fiona M

    2016-05-16

    Migrants form a substantial proportion of the population affected by the human immunodeficiency virus (HIV) epidemic in Europe, yet HIV prevention for this population is hindered by poor understanding of access to care and of postmigration transmission dynamics. We present the design and methods of the advancing Migrant Access to health Services in Europe (aMASE) study, the first European cross-cultural study focused on multiple migrant populations. It aims to identify the structural, cultural, and financial barriers to HIV prevention, diagnosis, and treatment and to determine the likely country of HIV acquisition in HIV-positive migrant populations. We delivered 2 cross-sectional electronic surveys across 10 countries (Belgium, France, Germany, Greece, Italy, the Netherlands, Portugal, Spain, Switzerland, and United Kingdom). A clinic survey aimed to recruit up to 2000 HIV-positive patients from 57 HIV clinics in 9 countries. A unique study number linked anonymized questionnaire data to clinical records data (viral loads, CD4 cell counts, viral clades, etc). This questionnaire was developed by expert panel consensus and cognitively tested, and a pilot study was carried out in 2 countries. A Web-based community survey (n=1000) reached those living with HIV but not currently accessing HIV clinics, as well as HIV-negative migrants. It was developed in close collaboration with a community advisory group (CAG) made up of representatives from community organizations in 9 of the participating countries. The CAG played a key role in data collection by promoting the survey to higher-risk migrant groups (sub-Saharan Africans, Latin Americans, men who have sex with men, and people who inject drugs). The questionnaires have considerable content overlap, allowing for comparison. Questions cover ethnicity, migration, immigration status, HIV testing and treatment, health-seeking behavior, sexual risk, and drug use. The electronic questionnaires, which were available in 15

  11. Lateral-access Class II restoration using resin-modified glass-ionomer or silver-cermet cement.

    Science.gov (United States)

    Croll, T P

    1995-02-01

    Direct-access preparation of a carious proximal surface is perhaps the most conservative approach to restoration. Physical properties and handling characteristics of silver amalgam and of resin composite and lack of fluoride ion release make these materials unsuitable for direct buccal- or lingual-access proximal restoration. Insufficient strengths and radiolucency of self-hardening glass-ionomer cements preclude their use for Class II restorations. However, glass-ionomer silver-cermet cement and some resin-modified glass-ionomer materials are proving useful for non-stress-bearing Class II restorations and may have applications in preventive dentistry. This article describes lateral-access Class II restoration with modified glass-ionomer cements. Emphasis is placed on careful handling of materials, maintenance of an ideal operative field, and conservation of tooth structure.

  12. Combating nuclear terrorism in India: preventive nuclear forensic perspectives

    International Nuclear Information System (INIS)

    Raghav, N.K.; Lad, J.S.; Deshmukh, A.V.; Jagtap, S.S.

    2014-01-01

    Nuclear terrorism is constant threat to India by many terrorist organization and neighboring country. These organizations are directly or indirectly aided with nuclear material by terrorism supporting country. Such organization has a significant potential source for acquiring nuclear and other radioactive material. Possibility of leakage is widely feared because of the deteriorating law and order condition, great spur of nuclear proliferation after the cold war and disintegration of USSR. Terrorist could gain access to Nuclear and radioactive material and smuggle to India through porous borders. Preventive forensic approach in screening and searching nuclear and radioactive material will play cardinal role to prevent nuclear disaster happening in India. Future plans could be extracted from terrorists through their narco-tests, brain fingerprinting and a data base on this could be prepared, which could later be used to help prevent any attacks. In present paper authors strongly recommend setting up Preventive Forensic Units in India so that any internal or external nuclear attack could be aborted. (author)

  13. Secondary prevention through cardiac rehabilitation: physical activity counselling and exercise training: key components of the position paper from the Cardiac Rehabilitation Section of the European Association of Cardiovascular Prevention and Rehabilitation

    DEFF Research Database (Denmark)

    Corrà, Ugo; Piepoli, Massimo F; Carré, François

    2010-01-01

    of a healthy lifestyle. These secondary prevention targets are included in the overall goal of cardiac rehabilitation (CR). Cardiac rehabilitation can be viewed as the clinical application of preventive care by means of a professional multi-disciplinary integrated approach for comprehensive risk reduction...... and global long-term care of cardiac patients. The CR approach is delivered in tandem with a flexible follow-up strategy and easy access to a specialized team. To promote implementation of cardiac prevention and rehabilitation, the CR Section of the EACPR (European Association of Cardiovascular Prevention...... and Rehabilitation) has recently completed a Position Paper, entitled 'Secondary prevention through cardiac rehabilitation: A condition-oriented approach'. Components of multidisciplinary CR for seven clinical presentations have been addressed. Components include patient assessment, physical activity counselling...

  14. 75 FR 63846 - Meeting of the Task Force on Community Preventive Services

    Science.gov (United States)

    2010-10-18

    ... Product Distribution to Improve Health Behaviors; Responsible Beverage Service (RBS) Training to Decrease..., environmental, population, and healthcare system interventions in public health and health promotion. During... Prevention. Agenda items are subject to change as priorities dictate. Meeting Accessibility: This meeting is...

  15. Committee Opinion No. 707 Summary: Access to Emergency Contraception.

    Science.gov (United States)

    2017-07-01

    Emergency contraception refers to contraceptive methods used to prevent pregnancy in the first few days after unprotected intercourse, sexual assault, or contraceptive failure. Although the U.S. Food and Drug Administration approved the first dedicated product for emergency contraception in 1998, numerous barriers to emergency contraception remain. The purpose of this Committee Opinion is to examine barriers to the use of emergency contraception, emphasize the importance of increasing access, and review new methods of emergency contraception and limitations in efficacy in special populations.

  16. Optical Code-Division Multiple Access: Challenges and Solutions

    Science.gov (United States)

    Chen, Lawrence R.

    2003-02-01

    Optical code-division multiple-access (OCDMA) is a technique well-suited for providing the required photonic connectivity in local access networks. Although the principles of OCDMA have been known for many years, it has never delivered on its potential. In this paper, we will describe the key challenges and impediments that have prevented OCDMA from delivering on its potential, as well as discuss possible solutions. We focus on the limitations of one-dimensional codes and the benefit of exploiting the additional degrees of freedom in using multiple dimensions for defining the codes. We discuss the advantages of using differential detection in order to implement bipolar communications. We then show how two-dimensional wavelength-time codes can be appropriately combined with differential detection in order to achieve high performance OCDMA systems with a large number of users operating with good BER performance for a large aggregate capacity. We also discuss the impact of channel coding techniques, for example forward error correction or turbo coding, on BER performance.

  17. A rights-based approach to accessing health determinants.

    Science.gov (United States)

    Perkins, Fran

    2009-03-01

    This commentary summarizes the experience and learnings from a site visit in May 2008 to a drop-in centre for vulnerable women in downtown Cairo run by El-Shehab Institution for Comprehensive Development, which provides street outreach for the prevention of Sexually Transmitted Infection (STI). The Centre successfully provides services and support for women, many of who are displaced or refugees and are from the most marginalized areas in Cairo. Through a rights-based approach to the work, the Centre helps people living in the slums fight and win the right to access clean water, sewerage and electrical power in their communities. An individual-based approach to human rights is also used. In the last year El-Shehab have helped 67 women go to court and win their marriage rights from husbands who have abandoned them. Their approach is an example of a successful way to achieve access to basic health determinants.

  18. Basic webliography on health promotion and disease prevention - doi:10.5020/18061230.2009.p217

    Directory of Open Access Journals (Sweden)

    Ana Claudia Camargo Gonçalves da Silva

    2012-01-01

    Full Text Available Objectives: To introduce a basic webliography to access highly qualified evidence-based material on health promotion and disease prevention, aiming at the continuing education of health professionals. Methods: By means of GoogleÂź browser, applying the descriptors in sequence to progressively refine the search on Internet and key concepts to be learned, all previously defined by the authors themselves, we proceeded a qualitative analyses of the 20 first listed links for each searched issue and the final selection of the most scientifically relevant ones. Results: The 34 selected links are presented in 4 groups: 23 portals, 5 guides and recommendations, 4 scientific journals and 3 blogs that allow free access to health promotion and disease prevention related subjects, such as: concepts; national and international public policies; epidemiology, statistics and health indicators; diseases screening and prophylaxis; counseling for behavior change of health related habits; and interdisciplinary work. Among the selected links 10 (29% are written in English while the others are in Portuguese. Conclusions: The identification of reading materials on health promotion and disease prevention available on Internet, many in Portuguese, allowed us to select relevant scientifically qualified literature and turn it accessible to health professionals, enabling the acquisition of new knowledge or quick update.

  19. Hacking medical devices a review - biomed 2013.

    Science.gov (United States)

    Frenger, Paul

    2013-01-01

    Programmable, implantable and external biomedical devices (such as pacemakers, defibrillators, insulin pumps, pain management pumps, vagus nerve stimulators and others) may be vulnerable to unauthorized access, commonly referred to as “hacking”. This intrusion may lead to compromise of confidential patient data or loss of control of the device itself, which may be deadly. Risks to health from unauthorized access is in addition to hazards from faulty (“buggy”) software or circuitry. Historically, this aspect of medical device design has been underemphasized by both manufacturers and regulatory bodies until recently. However, an insulin pump was employed as a murder weapon in 2001 and successful hacking of an implantable defibrillator was demonstrated in 2008. To remedy these problems, professional groups have announced a variety of design standards and the governmental agencies of several countries have enacted device regulations. In turn, manufacturers have developed new software products and hardware circuits to assist biomedical engineering firms to improve their commercial offerings. In this paper the author discusses these issues, reviewing known problems and zero-day threats, with potential solutions. He outlines his approach to secure software and hardware challenges using the Forth language. A plausible scenario is described in which hacking of an implantable defibrillator by terrorists results in a severe national security threat to the United States.

  20. Web Archiving: Issues and Problems in Collection Building and Access

    Directory of Open Access Journals (Sweden)

    Grethe Jacobsen

    2008-12-01

    Full Text Available Denmark began web archiving in 2005 and the experiences are presented with a specific focus on collection-building and issues concerning access. In creating principles for what internet materials to collect for a national collection, one can in many ways build on existing practice and guidelines. The actual collection requires strategies for harvesting relevant segments of the internet in order to assure as complete a coverage as possible. Rethinking is also necessary when it comes to the issue of description, but cataloguing expertise can be utilised to find new ways for users to retrieve information. Technical problems in harvesting and archiving are identifiable and can be solved through international cooperation. Access to the archived materials, on the other hand, has become the major challenge to national libraries. Legal obstacles prevent national libraries from offering generel access to their archived internet materials. In Europe the principal obstacles are the EU Directive on Data Protection (Directive 95/46/EC and local data protection legislation based on this directive. LIBER is urged to take political action on this issue in order that the general public may have the same access to the collection of internet materials as it has to other national collections.

  1. Noise and Vibration Risk Prevention Virtual Web for Ubiquitous Training

    Science.gov (United States)

    Redel-Macías, María Dolores; Cubero-Atienza, Antonio J.; Martínez-Valle, José Miguel; Pedrós-Pérez, Gerardo; del Pilar Martínez-Jiménez, María

    2015-01-01

    This paper describes a new Web portal offering experimental labs for ubiquitous training of university engineering students in work-related risk prevention. The Web-accessible computer program simulates the noise and machine vibrations met in the work environment, in a series of virtual laboratories that mimic an actual laboratory and provide the


  2. Radiation Control on Uzbekistan Borders - Results and Perspectives

    International Nuclear Information System (INIS)

    Petrenko, Vitaliy; Yuldashev, Bekhzod; Ismailov, Ulughbek; Shipilov, Nikolay; Chipizubov, Sergey; Avezov, Anvar

    2009-01-01

    The measures and actions on prevention, detection and response to criminal or unauthorized acts involving radioactive materials in Uzbekistan are presented. In frames of program of radiation monitoring to prevent illicit trafficking of nuclear and radioactive materials main customs border checkpoints were equipped with commercial radiation portal monitors. Special radiation monitors elaborated and manufactured in INP AS RU are installed in INP(main gates, research reactor and laboratory building) to provide nuclear security of Institute facilities. The experience of Uzbekistan in establishing radiation monitoring systems on its borders, their operation and maintenance would be useful for realization of proposed plan of strengthening measures to prevent illicit trafficking in Republics of Central Asia region.

  3. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  4. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  5. Consideration on Preventive and Protective Measures Against Insider Threats at R.O.K. Nuclear Facilities

    International Nuclear Information System (INIS)

    Lee, Seung Min; Lee, Jung Ho; Koh, Moon Sung

    2016-01-01

    This paper focuses on the current status of measures used to prevent, detect and respond to potential insiders at nuclear facilities in the Republic of KOREA. Measures against insiders are then analyzed based on IAEA guidelines. Insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. An insider threat is a great risk to a security system because of the access, authority, and special knowledge that someone within a facility possesses. Therefore, it is imperative that effective measures be taken to prevent insider incidents. A combination of preventive and protective measures offers the best solution to mitigating rogue elements within a facility

  6. Consideration on Preventive and Protective Measures Against Insider Threats at R.O.K. Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seung Min; Lee, Jung Ho; Koh, Moon Sung [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    This paper focuses on the current status of measures used to prevent, detect and respond to potential insiders at nuclear facilities in the Republic of KOREA. Measures against insiders are then analyzed based on IAEA guidelines. Insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. An insider threat is a great risk to a security system because of the access, authority, and special knowledge that someone within a facility possesses. Therefore, it is imperative that effective measures be taken to prevent insider incidents. A combination of preventive and protective measures offers the best solution to mitigating rogue elements within a facility.

  7. Two-port access versus four-port access laparoscopic ovarian cystectomy.

    Science.gov (United States)

    Choi, Won-Kyu; Kim, Jang-Kew; Yang, Jung-Bo; Ko, Young-Bok; Nam, Sang-Lyun; Lee, Ki-Hwan

    2014-09-01

    This study was conducted to compare the surgical outcomes between two-port access and four-port access laparoscopic ovarian cystectomy. Four hundred and eighty nine patients who had received two-port access laparoscopic ovarian cystectomy (n=175) and four-port access laparoscopic ovarian cystectomy (n=314) in Chungnam National University Hospital from January 2009 to August 2012 were analyzed retrospectively. The data were compared between the bilaterality of the cysts and cyst diameter of less than 6 cm and 6 cm or more. There were no significant differences in patient's age, parity, body weight, body mass index and history of previous surgery between the two-port and four-port access laparoscopy group. Bilaterality of ovarian cysts was more in fourport access laparoscopy group (13.7% vs. 32.5%, P=0.000). There were no significant differences in operation time, hemoglobin change, hospital stay, adhesiolysis, transfusion, and insertion of hemo-vac between the two-port and four-port access laparoscopy group for size matched compare. However additional analgesics were more in four-port access laparoscopy group for unilateral ovarian cystectomy. Two-port access laparoscopic surgery was feasible and safe for unilateral and bilateral ovarian cystectomy compare with four-port access laparoscopic surgery.

  8. Access to a Loaded Gun Without Adult Permission and School-Based Bullying.

    Science.gov (United States)

    Simckes, Maayan S; Simonetti, Joseph A; Moreno, Megan A; Rivara, Frederick P; Oudekerk, Barbara A; Rowhani-Rahbar, Ali

    2017-09-01

    Gun access and bullying are risk factors for sustaining or perpetrating violence among adolescents. Our knowledge of gun access among bullied students is limited. We used data on students, aged 12-18 years, from the 2011 and 2013 School Crime Supplement to the National Crime Victimization Survey to assess the association between self-reported bullying victimization (traditional and cyber) and access to a loaded gun without adult permission. Prevalence ratios (PRs) and confidence intervals (CIs) were obtained from multivariable Poisson regression using the Taylor series after controlling for student age, sex, family income, public/private school, and race. Of 10,704 participants, 4.2% (95% CI: 3.8%-4.6%) reported gun access. Compared with nonbullied students, those who reported traditional bullying (PR = 2.2; 95% CI: 1.7-2.4), cyberbullying (PR = 2.8; 95% CI: 1.6-4.9), and both (PR = 5.9; 95% CI: 4.6-7.7) were more likely to also report gun access. Adolescents who experience bullying, particularly those who report both traditional bullying and cyberbullying, are more likely to report access to a loaded gun without adult permission. These findings highlight the importance of developing interventions focused on these modifiable risk factors for preventing self-directed or interpersonal violence among youth. Copyright © 2017 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  9. 75 FR 54946 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Science.gov (United States)

    2010-09-09

    ... summarized as follows: Comment: Residential through-the-fence access provides a supportive community that... accommodate new aircraft types. Secondly, while through-the-fence communities sometimes attempt to limit ownership to aircraft owners, there is no effective way to prevent turnover of these properties to non...

  10. Disruptive technological advances in vascular access for dialysis: an overview.

    Science.gov (United States)

    Yeo, Wee-Song; Ng, Qin Xiang

    2017-11-29

    End-stage kidney disease (ESKD), one of the most prevalent diseases in the world and with increasing incidence, is associated with significant morbidity and mortality. Current available modes of renal replacement therapy (RRT) include dialysis and renal transplantation. Though renal transplantation is the preferred and ideal mode of RRT, this modality may not be available to all patients with ESKD. Moreover, renal transplant recipients are constantly at risk of complications associated with immunosuppression and immunosuppressant use, and posttransplant lymphoproliferative disorder. Dialysis may be the only available modality in certain patients. However, dialysis has its limitations, which include issues associated with lack of vascular access, risks of infections and vascular thrombosis, decreased quality of life, and absence of biosynthetic functions of the kidney. In particular, the creation and maintenance of hemodialysis vascular access in children poses a unique set of challenges to the pediatric nephrologist owing to the smaller vessel diameters and vascular hyperreactivity compared with adult patients. Vascular access issues continue to be one of the major limiting factors prohibiting the delivery of adequate dialysis in ESKD patients and is the Achilles' heel of hemodialysis. This review aims to provide a critical overview of disruptive technological advances and innovations for vascular access. Novel strategies in preventing neointimal hyperplasia, novel bioengineered products, grafts and devices for vascular access will be discussed. The potential impact of these solutions on improving the morbidity encountered by dialysis patients will also be examined.

  11. [Interventions to improve access to health services by indigenous peoples in the Americas].

    Science.gov (United States)

    Araujo, Miguel; Moraga, Cecilia; Chapman, Evelina; Barreto, Jorge; Illanes, Eduardo

    2016-11-01

    Synthesize evidence on effectiveness of interventions designed to improve access to health services by indigenous populations. Review of systematic reviews published as of July 2015, selecting and analyzing only studies in the Region of the Americas. The bibliographic search encompassed MEDLINE, Lilacs, SciELO, EMBASE, DARE, HTA, The Cochrane Library, and organization websites. Two independent reviewers selected studies and analyzed their methodological quality. A narrative summary of the results was produced. Twenty-two reviews met the inclusion criteria. All selected studies were conducted in Canada and the United States of America. The majority of the interventions were preventive, to surmount geographical barriers, increase use of effective measures, develop human resources, and improve people's skills or willingness to seek care. Topics included pregnancy, cardiovascular risk factors, diabetes, substance abuse, child development, cancer, mental health, oral health, and injuries. Some interventions showed effectiveness with moderate or high quality studies: educational strategies to prevent depression, interventions to prevent childhood caries, and multicomponent programs to promote use of child safety seats. In general, results for chronic non-communicable diseases were negative or inconsistent. Interventions do exist that have potential for producing positive effects on access to health services by indigenous populations in the Americas, but available studies are limited to Canada and the U.S. There is a significant research gap on the topic in Latin America and the Caribbean.

  12. Primary prevention in psychiatry in general hospitals in South Asia

    Science.gov (United States)

    Sood, Mamta; Chadda, Rakesh Kumar; Kallivayalil, Roy Abraham

    2017-01-01

    The focus of primary prevention is on reducing the disease incidence. Primary prevention in mental health has been given minimal priority in low-resource settings with no significant investments. General hospitals are one of the main providers of mental health services in South Asia. This paper focuses on primary prevention activities, which can be undertaken in a general hospital in South Asia with abysmally low-mental health resources. For implementing primary prevention in psychiatry, a general hospital may be conceptualized as a population unit, located in a well-populated area with easy accessibility where different kinds of communities, for example, students and resident doctors, consultants, patients and their caregivers, and paramedical, nursing, administrative and other supportive staff, coexist and have varied functions. All the functional components of the general hospital psychiatric units (GHPUs) offer scope for introducing primary preventive psychiatry services. Psychiatrists in GHPUs can lead efforts for primary prevention in mental health in the hospital by employing strategies in the framework of universal, selective, and indicated prevention. The preventive strategies could be targeted at the patients visiting the hospital for various health services and their caregivers, employees, and the trainees. Similar principles can be employed in teaching and training. PMID:29497199

  13. MPGD for breast cancer prevention: a high resolution and low dose radiation medical imaging

    Science.gov (United States)

    Gutierrez, R. M.; Cerquera, E. A.; Mañana, G.

    2012-07-01

    Early detection of small calcifications in mammograms is considered the best preventive tool of breast cancer. However, existing digital mammography with relatively low radiation skin exposure has limited accessibility and insufficient spatial resolution for small calcification detection. Micro Pattern Gaseous Detectors (MPGD) and associated technologies, increasingly provide new information useful to generate images of microscopic structures and make more accessible cutting edge technology for medical imaging and many other applications. In this work we foresee and develop an application for the new information provided by a MPGD camera in the form of highly controlled images with high dynamical resolution. We present a new Super Detail Image (S-DI) that efficiently profits of this new information provided by the MPGD camera to obtain very high spatial resolution images. Therefore, the method presented in this work shows that the MPGD camera with SD-I, can produce mammograms with the necessary spatial resolution to detect microcalcifications. It would substantially increase efficiency and accessibility of screening mammography to highly improve breast cancer prevention.

  14. ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives

    Directory of Open Access Journals (Sweden)

    Liu Chen

    2017-01-01

    Full Text Available Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized accesses. However, secure deletion is very costly for solid state drives (SSDs, which unlike hard disks do not support in-place update. When applied to SSDs, both erasure-based and cryptography-based secure deletion methods inevitably incur large amount of valid data migrations and/or block erasures, which not only introduce extra latency and energy consumption, but also harm SSD lifetime.

  15. Information Security in Distributed Healthcare : Exploring the Needs for Achieving Patient Safety and Patient Privacy

    OpenAIRE

    Åhlfeldt, Rose-Mharie

    2008-01-01

    In healthcare, patient information is a critical factor. The right information at the right time is a necessity in order to provide the best possible care for a patient. Patient information must also be protected from unauthorized access in order to protect patient privacy. It is furthermore common for patients to visit more than one healthcare provider, which implies a need for cross border healthcare and continuity in the patient process. This thesis is focused on information security in he...

  16. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    Science.gov (United States)

    2012-03-01

    Protocol Version 4 IPv4 Internet Protocol Version 6 IRC Internet Relay Chat LAN Local Area Network xv MiTM Man in the Middle MLD Multicast Listener...section. 1. Sniffing 2. Application Layer Attacks 3. Rogue Devices 4. Man In the Middle ( MITM ) 5. Flooding 6. Reconnaissance 7. Unauthorized access 8...the method by which worms find hosts may have to change. Man In The Middle ( MITM ) The general theory of the Man in the Middle ( MITM ) threat does not

  17. Trust-aware Privacy Control for Social Media

    OpenAIRE

    Li, Na; Najafian-Razavi, Maryam; Gillet, Denis

    2011-01-01

    Due to the huge exposure of personal information in social media, a challenge now is to design effective privacy mechanisms that protect against unauthorized access to social data. In this paper, a trust model for social media is first presented. Based on the trust model, a trust-aware privacy control protocol is proposed, that exploits the underlying inter-entity trust information. The objective is to design a fine-grained privacy scheme that ensures a user’s online information is disclosed ...

  18. Cultural Adaptation of a Preventive Program for Ultra-Orthodox Preschool Boys

    Science.gov (United States)

    Gilboa, Yafit

    2016-01-01

    Cultural factors significantly influence the effectiveness of pediatric screening that enables the prevention of developmental disturbances. The formulation of intervention programs must match the needs of the child, his or her family, and educators. Recognizing the importance of creating an intervention program accessible to the culture of the


  19. 75 FR 19464 - Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and...

    Science.gov (United States)

    2010-04-14

    ... Supervision, 1700 G Street, NW., Washington, DC 20552. SUPPLEMENTARY INFORMATION: OTS may not conduct or... situation to determine the nature and scope of the incident, and identify the information systems and types... Supervision, 1700 G Street, NW., Washington, DC 20552. Dated: April 8, 2010. Ira L. Mills, Paperwork Clearance...

  20. Risk Factors and Prevention Strategies for Suicide among the Elderly

    Science.gov (United States)

    Franks, Rebecca; Burnett, Donna O.; Evans, Retta R.

    2012-01-01

    Suicide is a preventable public health concern affecting the nation as the 10th leading cause of death. The prevalence of suicide among the elderly is higher than any other group. Risk factors attributed to this phenomenon are depression, social isolation, substance abuse, poor physical health or function, financial stress, and access to lethal