WorldWideScience

Sample records for prevention building security

  1. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  2. Building in Prevention

    DEFF Research Database (Denmark)

    Troelsen, Jens

    2013-01-01

    this chapter devotes its focus primarily on the small bumps on the road by initially discussing how physical structural prevention can be an appropriate strategy not only to bring about behavioural change in the population as a whole but also to reduce the negative consequences of a stigmatising health...... preventive work might be changed to direct focus onto a greater extent on establishing frameworks for people to master their own lives instead of one-sided initiatives, which leave the individual with a sense of guilt at their own illness....

  3. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... the verification and implementation of the system. The translation is semi-automatic because the developer has the option of choosing which implementation to use in order to achieve the specified security requirements. The implementation options are given by plugins defined in the framework. The framework......’s flexibility allows for the addition of constructs that model new security properties as well as new plugins that implement the security properties. In order to provide higher security assurances, the system specification can be verified by formal methods tools such as the Beliefs and Knowledge (BAK) tool...

  4. Resilient Infrastructure and Building Security

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew

    inference. Persistent authentication offers an effective integrated protection measure that is distributed directly in the facility and is non-intrusive to the public and affordable to the facility owners. Persistent authentication is suitable for security sensitive applications and can help protect...... to authentication that combines traditional access control systems with the sensing technologies and tracking capabilities offered by smart environments. Our approach is called Persistent Authentication for Location-based Services. Persistent authentication enables the secure provision of location-based services...

  5. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  6. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  7. Information Security - Data Loss Prevention Procedure

    Science.gov (United States)

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  8. A Proactive Approach to Building Security.

    Science.gov (United States)

    Winters, Sharon

    1994-01-01

    Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…

  9. NOSArmor: Building a Secure Network Operating System

    Directory of Open Access Journals (Sweden)

    Hyeonseong Jo

    2018-01-01

    Full Text Available Software-Defined Networking (SDN, controlling underlying network devices (i.e., data plane in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS, also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importance, no previous works have thoroughly investigated the security of NOS. In this work, to address this problem, we present the NOSArmor, which integrates several security mechanisms, named as security building block (SBB, into a consolidated SDN controller. NOSArmor consists of eight SBBs and each of them addresses different security principles of network assets. For example, while role-based authorization focuses on securing confidentiality of internal storage from malicious applications, OpenFlow protocol verifier protects availability of core service in the controller from malformed control messages received from switches. In addition, NOSArmor shows competitive performance compared to existing other controllers (i.e., ONOS, Floodlight with secureness of network assets.

  10. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  11. Websites' analyses of security prevention from hackers

    International Nuclear Information System (INIS)

    Ran Min; Liu Baoxu

    2000-01-01

    The author describes the key technology about how to prevent website security problems upon the hacker's attack behavior process, which is based on the time sequence including before, after and then according to the different prevention strategy. And the solutions are given to authors' references

  12. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  13. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  14. Measuring Information Security: Guidelines to Build Metrics

    Science.gov (United States)

    von Faber, Eberhard

    Measuring information security is a genuine interest of security managers. With metrics they can develop their security organization's visibility and standing within the enterprise or public authority as a whole. Organizations using information technology need to use security metrics. Despite the clear demands and advantages, security metrics are often poorly developed or ineffective parameters are collected and analysed. This paper describes best practices for the development of security metrics. First attention is drawn to motivation showing both requirements and benefits. The main body of this paper lists things which need to be observed (characteristic of metrics), things which can be measured (how measurements can be conducted) and steps for the development and implementation of metrics (procedures and planning). Analysis and communication is also key when using security metrics. Examples are also given in order to develop a better understanding. The author wants to resume, continue and develop the discussion about a topic which is or increasingly will be a critical factor of success for any security managers in larger organizations.

  15. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi

  16. Building Global Competitiveness through Information Security ...

    African Journals Online (AJOL)

    This paper highlights the relevance of building competitiveness in innovations and technology to improve the quality of life of the Nigeria, and indeed, the African citizens. Discussing new opportunities that could emerge daily from and the adoption of new ideas, it posits that the quest for overall national prosperity would ...

  17. Building and strengthening confidence and security in Asia

    International Nuclear Information System (INIS)

    Corden, P.S.

    1992-01-01

    This paper presents a few thoughts on the question of building and strengthening confidence and security in Asia, in particular in the area centred on the Korean peninsula. This question includes the process of establishing and implementing confidence- and security-building measures, some of which might involve States other than North and South Korea. The development of CSBMs has now been well established in Europe, and there are encouraging signs that such measures are taking hold in other areas of the world, including in Korea. Consequently there is a fairly rich mine of information, precedent and experience from which to draw in focusing on the particular subject at hand. In these remarks the concept of confidence- and security-building is briefly addressed and measures are examined that have proven useful in other circumstances and review some possibilities that appear of interest in the present context

  18. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  19. Building African Capacity for HIV/AIDS Prevention Trials

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada-Africa Prevention Trials Network : Building African Capacity for HIV/AIDS Prevention Trials. The Canada-Africa Prevention Trials Network (CAPT Network) was formed through a capacity building grant from the Global Health Research Initiative (GHRI). The Network comprises eight African centres (four in Uganda, ...

  20. Canada-Africa Prevention Trials Network : Building African Capacity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada-Africa Prevention Trials Network : Building African Capacity for HIV/AIDS Prevention Trials. The Canada-Africa Prevention Trials Network (CAPT Network) was formed through a capacity building grant from the Global Health Research Initiative (GHRI). The Network comprises eight African centres (four in Uganda, ...

  1. Prerequisites for building a computer security incident response capability

    CSIR Research Space (South Africa)

    Mooi, M

    2015-08-01

    Full Text Available . 1]. 2) Handbook for Computer Security Incident Response Teams (CSIRTs) [18] (CMU-SEI): Providing guidance on building and running a CSIRT, this handbook has a particular focus on the incident handling service [18, p. xv]. In addition, a basic CSIRT... stream_source_info Mooi_2015.pdf.txt stream_content_type text/plain stream_size 41092 Content-Encoding UTF-8 stream_name Mooi_2015.pdf.txt Content-Type text/plain; charset=UTF-8 Prerequisites for building a computer...

  2. Building effective cybersecurity programs a security manager's handbook

    CERN Document Server

    Schreider, Tari

    2017-01-01

    You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

  3. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    , and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.

  4. Building Nuclear Safety and Security Culture Within Regulatory Body

    International Nuclear Information System (INIS)

    Huda, K.

    2016-01-01

    To achieve a higher level of nuclear safety and security, it needs to develop the safety and security culture not only in the facility but also in the regulatory body. The regulatory body, especially needs to develop the safety and security culture within the organization, because it has a function to promote and oversee the culture in the facilities. In this sense, the regulatory body should become a role model. Development of the nuclear safety and security culture should be started by properly understanding its concept and awakening the awareness of individual and organization on the importance of nuclear safety and security. For effectiveness of the culture development in the regulatory body, the following steps are suggested to be taken: setting up of the regulatory requirements, self-assessment, independent assessment review, communication with the licensee, oversight of management system implementation, and integration with regulatory activities. The paper discusses those steps in the framework of development of nuclear safety and security culture in the regulatory body, as well as some important elements in building of the culture in the nuclear facilities. (author)

  5. Barriers Preventing Food Security in Israel, 2050

    OpenAIRE

    Yoav Gal

    2013-01-01

    The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production lim...

  6. Barriers preventing food security in Israel, 2050:

    OpenAIRE

    Gal, Yoav; Hadas, Efrat

    2014-01-01

    The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production lim...

  7. Critical infrastructure security assessment, prevention, detection, response

    CERN Document Server

    FLAMMINI, F

    2012-01-01

    The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physical security from an engineering point of view. The book surveys state-of-the-art methodologies and tools for CI analysis as well as strategies and technologies for CI protection.

  8. Barriers Preventing Food Security in Israel, 2050

    Directory of Open Access Journals (Sweden)

    Yoav Gal

    2013-03-01

    Full Text Available The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production limitations affecting long-term planning and the ability to ensure food security under these conditions. It was found that there are five key factors important for the decision process: population, land, water, technology and international trade. The data show that today Israel imports a very large scale of virtual land and virtual water in terms of agricultural products. This means that the attention of the decision makers must be diverted from considerations of short-term profit to long-term food security.

  9. Electronic security systems better ways to crime prevention

    CERN Document Server

    Walker, Philip

    2013-01-01

    Electronic Security Systems: Better Ways to Crime Prevention teaches the reader about the application of electronics for security purposes through the use of case histories, analogies, anecdotes, and other related materials. The book is divided into three parts. Part 1 covers the concepts behind security systems - its objectives, limitations, and components; the fundamentals of space detection; detection of intruder movement indoors and outdoors; surveillance; and alarm communication and control. Part 2 discusses equipments involved in security systems such as the different types of sensors,

  10. Building Maritime Security in Southeast Asia: Outsiders Not Welcome?

    Science.gov (United States)

    2008-01-01

    Najib Razak , has called for greater vigi- lance and intelligence sharing to combat piracy and prevent terrorism along the Malacca Strait.21 To improve...part a reward for its partnership in the war on terrorism. Weatherbee, International Rela- tions in Southeast Asia, p. 37. 18. Dato’ Sri Mohd Najib Tun...Abd Razak , “The Security of the Straits of Malacca and Its Im- plications to the South East Asia Regional Se- curity” (speech, Seoul, 13 March 2007

  11. Maritime Security and Capacity Building in The Gulf of Guinea

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov

    2017-01-01

    It is widely acknowledged that maritime security in the Gulf of Guinea is a highly complex phenomenon, involving a variety issues (legal deficiencies, inadequate military equipment, and challenges like corruption, political unrest, youth unemployment etc.) as well as a multiplicity of external...... for a comprehensive approach, as well as the difficulties of translating the potential for comprehensiveness into practice (as will be shown, important aspects of the problem remain largely unaddressed). What is more, we also need to appreciate that, even if these gaps represent a ‘failure’ to deliver a comprehensive...... response, they are at the same time illustrative of how the maritime capacity building activities of various external actors also ‘succeed’ in having an impact on this regional security landscape – for instance by influencing how certain aspects of this multifaceted problem are prioritized, whilst others...

  12. New realities: Disarmament, peace-building and global security

    International Nuclear Information System (INIS)

    1993-01-01

    This publication contains excerpts from the conference on new realities: Disarmament, peace-building and global security organized by the Non-Governmental Organization Committee on Disarmament at the United Nations, 20-23 April, 1993, during the regular session of the Disarmament Commission which took place in New York in April-May, 1993. This conference focused on important and topical disarmament and peacemaking issues, and was an opportunity for delegates, non-governmental organization representatives, United Nations staff members and interested individuals to exchange information and discuss the issues in an informal and cordial atmosphere

  13. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  14. US Centers for Disease Control and Prevention and Its Partners' Contributions to Global Health Security.

    Science.gov (United States)

    Tappero, Jordan W; Cassell, Cynthia H; Bunnell, Rebecca E; Angulo, Frederick J; Craig, Allen; Pesik, Nicki; Dahl, Benjamin A; Ijaz, Kashef; Jafari, Hamid; Martin, Rebecca

    2017-12-01

    To achieve compliance with the revised World Health Organization International Health Regulations (IHR 2005), countries must be able to rapidly prevent, detect, and respond to public health threats. Most nations, however, remain unprepared to manage and control complex health emergencies, whether due to natural disasters, emerging infectious disease outbreaks, or the inadvertent or intentional release of highly pathogenic organisms. The US Centers for Disease Control and Prevention (CDC) works with countries and partners to build and strengthen global health security preparedness so they can quickly respond to public health crises. This report highlights selected CDC global health protection platform accomplishments that help mitigate global health threats and build core, cross-cutting capacity to identify and contain disease outbreaks at their source. CDC contributions support country efforts to achieve IHR 2005 compliance, contribute to the international framework for countering infectious disease crises, and enhance health security for Americans and populations around the world.

  15. The Radon Book. Preventive measures in new buildings

    International Nuclear Information System (INIS)

    Clavensjoe, Bertil; Aakerblom, Gustav

    2004-01-01

    This book describes in text and picture how one can prevent that the radon concentrations in new buildings become to high. The book's centre of gravity lies on how to build in order to prevent that radon gas from the ground enters the building. The book contains extensive information about ground radon and how to examine the ground before constructing a new building. Release of radon from ground water and construction material is treated, as well as technology for measurement of radon and gamma radiation. The book presents current threshold values/recommended values for radon and the authorities' regulations and recommendations. The book is directed to persons who professionally need knowledge about radon and how to prevent that radon is accumulated in new buildings

  16. Capacity Building for HIV/AIDS Prevention Trials | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Development Agency (CIDA) is funding the Africa HIV/AIDS Prevention Trials Capacity Building Program under the umbrella of the Global Health Research Initiative (GHRI). The aim of the program is to build the capacity of African researchers and institutions to conduct anticipated clinical trials ...

  17. Measures to prevent breaches in the security of radioactive materials

    Energy Technology Data Exchange (ETDEWEB)

    Zika-Ahlberg, G [Swedish Board of Customs, Control Division/Control Section, Stockholm (Sweden)

    1998-09-01

    The objective of this paper, which is the result of the co-operation between the Swedish Board of Customs, the Swedish Radiation Protection Institute, the Security Police and the Swedish Nuclear Power Inspectorate, is to give an idea of the national prevention system as to illicit trafficking of nuclear materials and other radioactive sources. (author)

  18. The UN Security Council and prevention of displacement

    Directory of Open Access Journals (Sweden)

    Sanjula Weerasinghe

    2012-12-01

    Full Text Available Respecting the prohibitions against forced and arbitrary displacementcould significantly reduce the risk of, or prevent, displacement insituations of armed conflict, as could insisting on accountabilityfor violations of these prohibitions that amount to war crimes orcrimes against humanity. The UN Security Council has only partiallyaddressed these issues.

  19. Measures to prevent breaches in the security of radioactive materials

    International Nuclear Information System (INIS)

    Zika-Ahlberg, G.

    1998-01-01

    The objective of this paper, which is the result of the co-operation between the Swedish Board of Customs, the Swedish Radiation Protection Institute, the Security Police and the Swedish Nuclear Power Inspectorate, is to give an idea of the national prevention system as to illicit trafficking of nuclear materials and other radioactive sources. (author)

  20. Building the Capacity of the HIV Prevention Workforce

    Centers for Disease Control (CDC) Podcasts

    2010-07-29

    This podcast provides an overview of CDC's HIV prevention capacity building efforts with community-based organizations and health departments.  Created: 7/29/2010 by National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention.   Date Released: 7/29/2010.

  1. Building osteoporosis prevention into dental practice.

    Science.gov (United States)

    Stewart, Stacey; Hanning, Rhona

    2012-01-01

    The National Report Card on Osteoporosis Care (2008) announced the need for comprehensive approaches to risk reduction and improvement in the early diagnosis of osteoporosis. Dental research has suggested that low systemic bone-mineral density also occurs in alveolar bone, and people with osteoporosis may have an increased risk of tooth loss. Whether or not a causal link exists, both conditions share similar modifiable risk factors, including a role for calcium and vitamin D. The purpose of this paper was to critically examine the role calcium and vitamin D play in the relationship between osteoporosis and the risk of tooth loss. Scientific articles were obtained through PubMed, MEDLINE, CINAHL, AgeLine and Web of Science. Publications were restricted to those involving human subjects, and English-language articles on calcium and vitamin D. The search yielded 8 articles relating to osteoporosis and tooth loss that included calcium and vitamin D intake. Despite methodological concerns, the evidence shows a relationship between osteoporosis and tooth loss for people who have an inadequate intake of calcium and vitamin D. Adequate calcium intake positively influences optimal peak bone mass and may also assist in tooth retention in later life. The dental sector can assist with national prevention strategies for osteoporosis care.

  2. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  3. Building consensus on youth violence prevention and citizen ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC's efforts in negotiation and coalition building contributed to a high-level dialogue that engaged high-level officials and reaffirmed their commitment to preventing violence particularly among youth in Central America. At a meeting held at the Earth University in Costa Rica´s Limon Province in early February, Luis Fallas, ...

  4. HUMAN SECURITYBUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2015-04-01

    Full Text Available This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declaration and the Millennium Development Goals. The last part evaluates the improvements that the inclusion of the human security on the post-2015 development framework may bring. The results of this analysis present illustrate the opportunity of deepening the MDGs agenda with a more realistic and ethical approach, through the inclusion of the human security paradigm within the development agenda.

  5. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  6. Education and Training, and Knowledge Networks for Capacity-Building in Nuclear Security

    International Nuclear Information System (INIS)

    Mrabit, Khammar

    2014-01-01

    Conclusions: • Capacity Building (CB) is critical for States to establish and maintain effective and sustainable nuclear security regime. • IAEA is a worldwide platform promoting international cooperation for CB in nuclear security involving more than 160 countries and over 20 Organizations and Initiatives. • IAEA Division of Nuclear Security is ready to continue supporting States in developing their CB through: – Comprehensive Training Programme: more than 80 training events annually – International Nuclear Security Training and Support Centre Network (NSSC) – Comprehensive Education Programme – International Nuclear Security Network (INSEN)

  7. Development of building security integration system using sensors, microcontroller and GPS (Global Positioning System) based android smartphone

    Science.gov (United States)

    Sihombing, P.; Siregar, Y. M.; Tarigan, J. T.; Jaya, I.; Turnip, A.

    2018-03-01

    Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner’s smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.

  8. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    Science.gov (United States)

    2013-04-25

    cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From  -­‐  To)   September 2012 - April 2013 4.  TITLE  AND  SUBTITLE   Private Military and Security Companies - Counterinsurgency and

  9. Integration of the security systems in the architectural design of nuclear and important buildings in Egypt

    International Nuclear Information System (INIS)

    Algohary, S.

    2007-01-01

    The new and emerging threats to buildings and infrastructure which are faced by todays engineering design and facility management community in Egypt demand new approaches and solutions that are innovative and increasingly based on risk management principles. In the wake of the damage of Taba hotel in south Sinai (2004) and Sharm El-Sheik hotels in Egypt (July, 2005), there was a growing awareness of public vulnerability to terrorist attacks. This awareness leads to increase the expectations form and responsibilities of the architects, engineers and construction professionals This study reviews and assesses different types of threats to nuclear and important buildings. It identifies also the architectural design, vulnerability and risk management that can enhance security. It also introduces a new approach for integration of architectural design and security in nuclear and important buildings in Egypt. The results shows that escalating threats and risks to important buildings and infrastructures change the role of planners, architects, engineers and builders by increasing the focus on the importance of applying viable security principles to the building designs. Architects in Egypt can assume an important role in improving the life-safety features of important buildings by increasing and integrating new security principles and approaches to improve the security and performance of the buildings against man made disasters

  10. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  11. Development of national standards related to the integrated safety and security of high-rise buildings

    Science.gov (United States)

    Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov

    2018-03-01

    The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  12. Development of national standards related to the integrated safety and security of high-rise buildings

    Directory of Open Access Journals (Sweden)

    Voskresenskaya Elena

    2018-01-01

    Full Text Available The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  13. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  14. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological...

  15. Fairtrade, Food Security and Globalization: Building Alternative Food Systems

    Directory of Open Access Journals (Sweden)

    Martin Calisto Friant

    2016-05-01

    Full Text Available This article examines the politics and practices of Fairtrade certification in order to assess whether this alternative trading system could contribute to innovative solutions for global food security. The analysis begins by assessing the main challenges and problems characterizing the contemporary global food system. It then explores the history, vision and certification standards of the Fairtrade label. In the third section, the results of the impact studies of Fairtrade certification on producer livelihoods are discussed, analyzing the various strengths and weaknesses. Finally the article analyzes whether, and how, the Fairtrade system could positively contribute to improving global food security. To conclude this paper argues that the greatest strength of Fairtrate is not the certification mechanism itself but rather the social and environmental principles it represents. Fairtrade standards could serve to inform broader international policies, which could lead to a sustainable transformation of the global food system.

  16. Building Peace and Security Research Capacity in Eastern Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As the region most affected by conflict, Africa needs to acquire knowledge ... mediate political conflicts, and prevent the initiation and escalation of violent conflict. ... a special issue profiling evidence to empower women in the labour market.

  17. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  18. Croatia’s police and security community building in the Western Balkans

    Directory of Open Access Journals (Sweden)

    Sandro KNEZOVIĆ

    2017-12-01

    Full Text Available The article examines the eventual existence of a security community within the Western Balkans region by exploring the contribution of police as a profession/epistemic community in Croatia to the security community building process. In order to do so, two theoretical concepts have been applied: first, the one of security community which, according to Deutsch, as well as Adler and Barnett, is something that is leading IR and humanity out of the era of nation-state; secondly, the one of professions as exclusive occupational groups in Abbott’s interpretation (wherein the police is considered to be a profession. Our approach builds on a combination of the aforementioned theories, while the study itself has been based on the developments in the field of policing in Croatia since 1990 and its implications for the creation of a security community in the region.

  19. Prevention of radioactive gas seeping into buildings through constructive materials

    International Nuclear Information System (INIS)

    Khaydarov, R.A.; Gapurova, O.U.; Khaydarov, R.R.

    2004-01-01

    Full text: One of possible method of realization of the terrorist acts is using gases and liquids, which easily permeate through the constructive materials of walls, floor, ceiling, roof, etc. into buildings by the capillary action of the pores. Toxic volatile organic compounds, organic and inorganic gases, radioactive elements, especially, which emits alpha particles can be used as the dangerous substances. Increased ventilation may help in removing the gases, but can actually increase the gases level by increasing the suction through the pores of concrete. If the gases and liquids are soluble in water and are easily volatilized from it, they can also get by groundwater up to underground structures and penetrate inside through opening and pores in concrete or pushed by hydrostatic pressure. The purpose of this work is creating a method to reduce concentration of toxic and radioactive gases in homes, buildings, underground buildings, tunnels, hangars, garages, bomb shelters, etc. The most effective method to prevent penetration of radionuclides into premises of buildings and underground structures through walls, roofs, floors is using special chemicals, which seal micropores inside the construction materials against gases. Worked out chemicals which consist of blend of polymeric compounds are described in the paper. Radioactive gases permeability in constructive materials after treatment by chemicals was studied. Influence of types of cement, sand and gypsum, preliminary treatment by different chemicals, different types of polymeric compounds, time between treatments, moisture of materials, time between preparation of chemicals and treatment of materials (aging of chemicals), time between treatment of concrete and testing (aging of treated concrete) were examined. Experiments have shown that our method allows reducing the coefficient of gas permeability 200 - 400 times

  20. Confidence- and security-building in North-East Asia. Working group I

    International Nuclear Information System (INIS)

    Cotton, J.

    1991-01-01

    In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty

  1. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  2. Enhancing Homeland Security Efforts by Building Strong Relationships between the Muslim Community and Local Law Enforcement

    National Research Council Canada - National Science Library

    Jensen, Dennis L

    2006-01-01

    ... to follow up on the incident and to prevent future attacks. It is undeniable that building a strong relationship between the local police and the Muslim community is essential in defending America against acts of terrorism...

  3. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  4. SAPE Database Building for a Security System Test Bed

    International Nuclear Information System (INIS)

    Jo, Kwangho; Kim, Woojin

    2013-01-01

    Physical protection to prevent radiological sabotage and the unauthorized removal of nuclear material is one of the important activities. Physical protection system (PPS) of nuclear facilities needs the effectiveness analysis. This effectiveness analysis of PPS is evaluated by the probability of blocking the attack at the most vulnerable path. Systematic Analysis of Physical Protection Effectiveness (SAPE) is one of a computer code developed for the vulnerable path analysis. SAPE is able to analyze based on the data of the experimental results that can be obtained through the Test Bed. In order to utilize the SAPE code, we conducted some field tests on several sensors and acquired data. This paper aims at describing the way of DB (database) establishment

  5. Performance-based building codes: a call for injury prevention indicators that bridge health and building sectors.

    Science.gov (United States)

    Edwards, N

    2008-10-01

    The international introduction of performance-based building codes calls for a re-examination of indicators used to monitor their implementation. Indicators used in the building sector have a business orientation, target the life cycle of buildings, and guide asset management. In contrast, indicators used in the health sector focus on injury prevention, have a behavioural orientation, lack specificity with respect to features of the built environment, and do not take into account patterns of building use or building longevity. Suggestions for metrics that bridge the building and health sectors are discussed. The need for integrated surveillance systems in health and building sectors is outlined. It is time to reconsider commonly used epidemiological indicators in the field of injury prevention and determine their utility to address the accountability requirements of performance-based codes.

  6. Confidence- and security-building in South-East Asia. Working group II

    International Nuclear Information System (INIS)

    Alagappa, M.

    1991-01-01

    Discussion in the Working Group II focused on the following subjects: the establishment of a zone of peace, freedom and neutrality in South-East Asia; the establishment of a nuclear weapon-free zone in South-East Asia; the Cambodian conflict; regional co-operation; military security confidence-building measures

  7. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  8. Data Leakage Prevention for Secure Cross-Domain Information Exchange

    OpenAIRE

    Nordbotten, Nils Agne; Engelstad, Paal E.; Kongsgård, Kyrre Wahl; Haakseth, Raymond; Mancini, Federico

    2017-01-01

    Cross-domain information exchange is an increasingly important capability for conducting efficient and secure operations, both within coalitions and within single nations. A data guard is a common cross-domain sharing solution that inspects the security labels of exported data objects and validates that they are such that they can be released according to policy. While we see that guard solutions can be implemented with high assurance, we find that obtaining an equivalent level of assurance i...

  9. Security Sector Reform’s Utility in Conflict Prevention

    Science.gov (United States)

    2013-12-10

    Publications, 1994), 18. 40 Many of these countries in Africa are states in name only due to ill defined borders, fiscal limitations, nomadic ...Security Watch, 12 OCT 2009), Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013]. 85...ISN Security Watch, 12 OCT 2009. Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013

  10. Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard.

    Science.gov (United States)

    Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok

    2017-09-25

    An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation.

  11. Approaches for building community participation: A qualitative case study of Canadian food security programs.

    Science.gov (United States)

    Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia

    2017-10-01

    There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.

  12. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  13. Walk the Talk: Progress in Building a Supply Chain Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-31

    Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  14. Walk the Talk: Progress in Building a Supply Chain Security Culture

    International Nuclear Information System (INIS)

    Hund, Gretchen

    2016-01-01

    Pacific Northwest National Laboratory (PNNL) has engaged industry to ''go beyond compliance'' for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  15. Preventive Interventions and Sustained Attachment Security in Maltreated Children

    Science.gov (United States)

    Stronach, Erin Pickreign; Toth, Sheree L.; Rogosch, Fred; Cicchetti, Dante

    2013-01-01

    Thirteen-month-old maltreated infants (n = 137) and their mothers were randomly assigned to one of three conditions: child-parent psychotherapy (CPP), psychoeducational parenting intervention (PPI), and community standard (CS). A fourth group of nonmaltreated infants (n =52) and their mothers served as a normative comparison (NC) group. A prior investigation found that the CPP and PPI groups demonstrated substantial increases in secure attachment at post-intervention, whereas this change was not found in the CS and NC groups. The current investigation involved the analysis of data obtained at a follow-up assessment that occurred 12-months after the completion of treatment. At follow-up, children in the CPP group had higher rates of secure and lower rates of disorganized attachment than did children in the PPI or CS groups. Rates of disorganized attachment did not differ between the CPP and NC groups. Intention-to-treat analyses (ITT) also showed higher rates of secure attachment at follow-up in the CPP group relative to the PPI and CS groups. However, groups did not differ on disorganized attachment. Both primary and ITT analyses demonstrated that maternal reported child behavior problems did not differ among the four groups at the follow-up assessment. This is the first investigation to demonstrate sustained attachment security in maltreated children 12 months after the completion of an attachment theory-informed intervention. Findings also suggest that, while effective in the short term, parenting interventions alone may not be effective in maintaining secure attachment in children over time. PMID:24229539

  16. Fire Situations and Prevention Measures of residential building

    Directory of Open Access Journals (Sweden)

    Zhou Baixia

    2017-01-01

    Full Text Available The proportion of residential building is the largest in all buildings. With the development of urbanization, residential building fires are at high momentum. The paper lists the residential building fires and the number of casualties’ proportion to total fires from 2011 to 2014, analyzing the high incidence causes of the fires and casualties and putting forward suggestions and countermeasures including carrying out fire safety education to improve the fire safety awareness of residents, fulfilling responsibility to enhancing fire safety management capabilities, perfecting fire apparatus to develop fire safety environment and enhancing public awareness of fire safety, equipping evacuation equipments to promote response ability to deal with disasters etc.

  17. A game-theoretical approach for reciprocal security-related prevention investment decisions

    International Nuclear Information System (INIS)

    Reniers, Genserik; Soudan, Karel

    2010-01-01

    Every company situated within a chemical cluster faces important security risks from neighbouring companies. Investing in reciprocal security preventive measures is therefore necessary to avoid major accidents. These investments do not, however, provide a direct return on investment for the investor-company and thus plants are hesitative to invest. Moreover, there is likelihood that even if a company has fully invested in reciprocal security prevention, its neighbour has not, and as a result the company can experience a major accident caused by an initial (minor or major) accident that occurred in an adjacent chemical enterprise. In this article we employ a game-theoretic approach to interpret and model behaviour of two neighbouring chemical plants while negotiating and deciding on reciprocal security prevention investments.

  18. Fire Risk Analysis and Optimization of Fire Prevention Management for Green Building Design and High Rise Buildings: Hong Kong Experience

    Directory of Open Access Journals (Sweden)

    Yau Albert

    2014-12-01

    Full Text Available There are many iconic high rise buildings in Hong Kong, for example, International Commercial Centre, International Financial Centre, etc. Fire safety issue in high rise buildings has been raised by local fire professionals in terms of occupant evacuation, means of fire-fighting by fire fighters, sprinkler systems to automatically put off fires in buildings, etc. Fire risk becomes an important issue in building fire safety because it relates to life safety of building occupants where they live and work in high rise buildings in Hong Kong. The aim of this research is to identify the fire risk for different types of high rise buildings in Hong Kong and to optimise the fire prevention management for those high rise buildings with higher level of fire risk and to validate the model and also to carry out the study of the conflict between the current fire safety building code and the current trend of green building design. Survey via the 7-point scale questionnaire was conducted through 50 participants and their responses were received and analysed via the statistical tool SPSS software computer program. A number of statistical methods of testing for significantly difference in samples were adopted to carry out the analysis of the data received. When the statistical analysis was completed, the results of the data analysis were validated by two Fire Safety Experts in this area of specialisation and also by quantitative fire risk analysis.

  19. Confusion surrounding the concept of nuclear 'security'. 'Preventing Japan from going nuclear contributes to Japan's national security'?

    International Nuclear Information System (INIS)

    Kubota, Masafumi

    2012-01-01

    A law enacted on June 20 to establish a new Nuclear Regulatory Authority (NRA) fully separated from the nuclear promotional authorities. It added the provision, which says nuclear safety should be guaranteed not only to defend lives, people's health and the environment but also to 'contribute to Japan's national security', to Article 2 of the Atomic Energy Basic Law. NRA integrated the existing regulatory authorities for safety, security and safeguards, into one. Supporters of an amendment quietly slipped into the law were denying it could provide cover for military use of nuclear technology, but arouse international concern about recycling program of extracting plutonium from spent fuels. Nuclear policy minister said: 'The safeguards are in place to prevent nuclear proliferation. The world 'security' precisely means the prevention of nuclear proliferation.' If not used explicitly about safeguards, they left room for stretched interpretation. The author recommended the world' contribute to Japan's national security' should be deleted instead of explaining appropriately, both at home and abroad, the use of nuclear power in Japan limited to peaceful purposes. (T. Tanaka)

  20. 49 CFR 393.118 - What are the rules for securing dressed lumber or similar building products?

    Science.gov (United States)

    2010-10-01

    ... plywood, gypsum board or other materials of similar shape. Lumber or building products which are not... the middle tier that must be secured may not exceed 6 feet about the deck of the trailer; or (ii...

  1. Building consensus on youth violence prevention and citizen ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-20

    Apr 20, 2016 ... ... promising practices, intervention models, methodologies, and public policies to ... Building on the IDRC and Organization of American States ... Involving urban communities in controlling dengue fever in Latin America.

  2. Building secure wireless access point based on certificate authentication and firewall captive portal

    Directory of Open Access Journals (Sweden)

    Soewito B.

    2014-03-01

    Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  3. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    Energy Technology Data Exchange (ETDEWEB)

    Koech, H K [Program Manager CBP/DHS Office Number 363-6109 Cell Number 0722-774-912, Office Location: Ground Floor U.S. Embassy Nairobi (Kenya)

    2010-07-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  4. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Koech, H.K.

    2010-01-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  5. Fiber optic sensor based on Mach-Zehnder interferometer for securing entrance areas of buildings

    Science.gov (United States)

    Nedoma, Jan; Fajkus, Marcel; Martinek, Radek; Mec, Pavel; Novak, Martin; Bednarek, Lukas; Vasinek, Vladimir

    2017-10-01

    Authors of this article focused on the utilization of fiber optic sensors based on interferometric measurements for securing entrance areas of buildings such as windows and doors. We described the implementation of the fiber-optic interferometer (type Mach-Zehnder) into the window frame or door, sensor sensitivity, analysis of the background noise and methods of signal evaluation. The advantage of presented solution is the use of standard telecommunication fiber standard G.652.D, high sensitivity, immunity of sensor to electromagnetic interference (EMI) and passivity of the sensor regarding power supply. Authors implemented the Graphical User Interface (GUI) which offers the possibility of remote monitoring presented sensing solution.

  6. How to permanently build up the prevention of occupational cancers

    International Nuclear Information System (INIS)

    Hery, Michel; Goutet, Pierre; Calvez, Olivier; Fontaine, Bernard; Bastos, Henri; Guseva-Canu, Irina; Telle-Lamberton, Maylis; Pourquet, Michel; Fontaine, Jean-Raymond; Silvente, Eric; Malenfer, Marc; Risse-Fleury, Mathilde; Lepocreau, Antoine; Guimon, Michele; Laine, Patrick; Fares, Nadim; Hermouet, Christine; Chauvet, Claire; Haeflinger, Raphael; Vogel, Laurent; Counil, Emilie; Bertin, Melanie; Thebaud-Mony, Annie; Certin, Jean-Francois; Goutet, Pierre; Brixi, Omar

    2015-01-01

    As about 2 millions of workers are exposed to carcinogenic agents in different industrial sectors, this expert opinion proposes a presentation of the state of the art of the prevention of carcinogenic risks. The different parts address the contribution of experimental and epidemiologic studies to the knowledge and prevention of occupational cancers (sure and possible factors, classifications and regulations), the knowledge of exposures in working environments (exposure modalities and principle of assessment of exposures, traceability and retrospective assessment), the risk management within a company (identification, suppression and substitution, design of work equipment, prevention of exposure for the personnel of subcontracting companies and in the waste and recycling sectors), the evolution from risk perception to risk prevention, the various strategies for action and professional sectors (general regime, prevention policy of the French national fund of prevention for territorial and hospital public services, the taking into charge of cancers as occupational disease by agriculture regimes of social protection), and the taking into care and restorative actions (medical and legal follow up and remedy, taking inequities into account, acknowledgement of occupational cancers in Europe, critical discussion of the European policy on occupational cancer prevention, lessons learned from Giscop93 inquiry)

  7. Mobilizing communities and building capacity for youth violence prevention: the National Academic Centers of Excellence for Youth Violence Prevention.

    Science.gov (United States)

    Vivolo, Alana M; Matjasko, Jennifer L; Massetti, Greta M

    2011-09-01

    Violence, including its occurrence among youth, results in considerable physical, emotional, social, and economic consequences in the US. Youth violence prevention work at the Division of Violence Prevention (DVP) at the Centers for Disease Control and Prevention (CDC) emphasizes preventing youth violence-related behaviors, injuries, and deaths by collaborating with academic and community partners and stakeholders. In 2000 and 2005, DVP funded the National Academic Centers of Excellence (ACE) for Youth Violence Prevention. Most ACE Centers focus on building community capacity and competence so that evidence-based programs for youth violence prevention can be successfully implemented through effective and supportive research-community partnerships. This commentary provides historical information about the ACE Program, including the development, goals, accomplishments of the Centers, and the utilization of a community-based participatory research approach to prevent youth violence.

  8. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    Science.gov (United States)

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  9. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  10. HIV/AIDS Prevention Trials Capacity Building Grants - Phase II ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada's international response to the HIV/AIDS epidemic is largely built around the work of the Canadian HIV Vaccine Initiative (CHVI). CHVI proposes to increase the capacity of Canada and low- and middle-income countries to respond to the HIV/AIDS pandemic by developing new HIV vaccines and other preventive ...

  11. Building Capacity for HIV/AIDS Prevention Trials Research and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    A relatively small number of African sites have the clinical and laboratory capacity to design, manage and carry out HIV/AIDS prevention trials. This project is based on the premise that many of the required skills are already present at additional locations, but need further development. The grant will facilitate interaction ...

  12. The Potential of Human Rights Education for Conflict Prevention and Security

    Science.gov (United States)

    Davies, Lynn

    2010-01-01

    This paper examines the contribution of human rights education (HRE) to conflict prevention and to the promotion of security. It outlines the difficulties in evaluating the long-term impact of HRE, but then proposes five benefits of a rights-based approach to education--rights as secular, man-made, requiring transparency, enabling freedom from…

  13. Violent Extremism, National Security and Prevention. Institutional Discourses and Their Implications for Schooling

    Science.gov (United States)

    Mattsson, Christer; Säljö, Roger

    2018-01-01

    Currently, threats to societal security from extremist groups are high on the political agenda in many countries. Politicians, policymakers at various levels and communities are searching for methods to counteract recruitment to violent organizations. These efforts are often referred to as Prevention of Violent Extremism (PVE-programmes). One of…

  14. Closed Circuit TV Surveillance Systems in Educational Buildings: Crime Prevention in Schools. Building Bulletin 75.

    Science.gov (United States)

    Whitehouse, B.; Patel, M.; Gofton, K.

    Recent years have shown an increase in arson, theft, and vandalism committed in educational facilities resulting in a need for managers to formulate security policies. This document provides technical advice and guidance on policy for the design, specification, installation, maintenance, operation, and management of closed circuit TV (CCTV)…

  15. Pollution prevention opportunity assessment for Building 922 solid office waste

    International Nuclear Information System (INIS)

    Phillips, N.M.

    1995-01-01

    Building 922 houses all of SNL/California's ES and H Departments: Health Protection, Environmental Protection, Safety, and Environmental Operations. It covers approximately 10,000 square feet and houses about 80 people. The office personnel generate nonhazardous solid office wastes in their daily activities. To determine the types and amounts of waste generated, a special PPOA sorting team sorted all of the trash collected from the building for a period of one-week (including paper and aluminum cans in the recycling bins). The team sorted the trash into major categories: paper, plastic, metals, glass, wet garbage, rest room waste, and miscellaneous materials. They then sorted it into subcategories within each major category. Rest room waste was collected but not sorted. The waste in each category was weighed separately. The total amount of trash collected during the week was approximately 168.8 kg (371.4 lbs). The results of this PPOA indicate that SNL/California is minimizing most nonhazardous office waste and reductions planned for the near future will add significantly to the minimization efforts

  16. Contextual community prevention theory: building interventions with community agency collaboration.

    Science.gov (United States)

    Morales, Eduardo S

    2009-11-01

    Translation from research to practice faces numerous problems that include replicating effectiveness, fidelity to the protocol and processes, and adaptations to different types of target populations. Working collaboratively with existing service providers can speed up the time for development and can ease the implementation of empirical randomized trials. Contextual community prevention theory is an innovative approach that focuses on changing behaviors of community members by creating a visible institutional presence that draws and pulls the targeted population into the organization's activities and interventions. The result is an institution or organization within the community that provides a new active and dynamic context, engaging its community members into its activities, interventions, and functions. An HIV prevention program developed collaboratively from the ground up for Latino gay/bisexual men is presented. Results from the program evaluation efforts across the years suggest promise for testing its efficacy through a randomized trial. HIV prevention efforts need to develop dynamic support systems within communities where these men have ownership, have control, and feel safe; otherwise HIV infection rates in this population will increase. Copyright 2009 by the American Psychological Association

  17. HACCP-Based Programs for Preventing Disease and Injury from Premise Plumbing: A Building Consensus

    Directory of Open Access Journals (Sweden)

    William F. McCoy

    2015-07-01

    Full Text Available Thousands of preventable injuries and deaths are annually caused by microbial, chemical and physical hazards from building water systems. Water is processed in buildings before use; this can degrade the quality of the water. Processing steps undertaken on-site in buildings often include conditioning, filtering, storing, heating, cooling, pressure regulation and distribution through fixtures that restrict flow and temperature. Therefore, prevention of disease and injury requires process management. A process management framework for buildings is the hazard analysis and critical control point (HACCP adaptation of failure mode effects analysis (FMEA. It has been proven effective for building water system management. Validation is proof that hazards have been controlled under operating conditions and may include many kinds of evidence including cultures of building water samples to detect and enumerate potentially pathogenic microorganisms. However, results from culture tests are often inappropriately used because the accuracy and precision are not sufficient to support specifications for control limit or action triggers. A reliable negative screen is based on genus-level Polymerase Chain Reaction (PCR for Legionella in building water systems; however, building water samples with positive results from this test require further analysis by culture methods.

  18. HACCP-Based Programs for Preventing Disease and Injury from Premise Plumbing: A Building Consensus

    Science.gov (United States)

    McCoy, William F.; Rosenblatt, Aaron A.

    2015-01-01

    Thousands of preventable injuries and deaths are annually caused by microbial, chemical and physical hazards from building water systems. Water is processed in buildings before use; this can degrade the quality of the water. Processing steps undertaken on-site in buildings often include conditioning, filtering, storing, heating, cooling, pressure regulation and distribution through fixtures that restrict flow and temperature. Therefore, prevention of disease and injury requires process management. A process management framework for buildings is the hazard analysis and critical control point (HACCP) adaptation of failure mode effects analysis (FMEA). It has been proven effective for building water system management. Validation is proof that hazards have been controlled under operating conditions and may include many kinds of evidence including cultures of building water samples to detect and enumerate potentially pathogenic microorganisms. However, results from culture tests are often inappropriately used because the accuracy and precision are not sufficient to support specifications for control limit or action triggers. A reliable negative screen is based on genus-level Polymerase Chain Reaction (PCR) for Legionella in building water systems; however, building water samples with positive results from this test require further analysis by culture methods. PMID:26184325

  19. Accident prevention and security measures to prevent intentional harm and damage through nuclear energy

    International Nuclear Information System (INIS)

    Rauschning, D.

    1984-01-01

    The author explains the authorities' duty to provide for protection against intentional damage or physical harm through the use of nuclear energy. It belongs to the competence of the various authorities to define ways and means to afford protection, and to establish an appropriate network of provisions. There are provisions belonging to criminal law, those concerning liability and indemnity, and security regulations incorporated in the law on licensing and supervision. The author presents a detailed account of the law applicable and discusses the conflict of interests between governmental duties and intentions and the civil rights of the individual affected by the provisions. (HSCH) [de

  20. Prevention of uncontrolled progressive collapse of a high-rise brick building

    Directory of Open Access Journals (Sweden)

    Pakhmurin Oleg

    2018-01-01

    Full Text Available In recent years, there is a trend towards increasing the failure rate of buildings and structures as a result of unforeseen situations. This study is aimed at assessing the operational reliability of the structure to prevent emergencies and progressive collapse. The behavior of structures affected by various factors was analyzed. The operational condition of a building with stone walls and a rigid structural frame constructed in the middle of the 20th century was considered. By means of a detailed instrumental examination, effects of long-term operation, climatic factors and violations during construction on the serviceability of the building were analyzed. Geotechnical conditions of the site were investigated. Necessary re-calculations for load-bearing structural elements and foundations were carried out. An expected failure diagram for vertical load-bearing structures of the building is presented. Proposals for preventing progressive collapse were developed on the basis of the author's technique.

  1. Safety distance for preventing hot particle ignition of building insulation materials

    OpenAIRE

    Jiayun Song; Supan Wang; Haixiang Chen

    2014-01-01

    Trajectories of flying hot particles were predicted in this work, and the temperatures during the movement were also calculated. Once the particle temperature decreased to the critical temperature for a hot particle to ignite building insulation materials, which was predicted by hot-spot ignition theory, the distance particle traveled was determined as the minimum safety distance for preventing the ignition of building insulation materials by hot particles. The results showed that for sphere ...

  2. Adoption of Smart Structures for Prevention of Health Hazards in Buildings

    Science.gov (United States)

    Oke, Ayodeji; Aigbavboa, Clinton; Ngema, Wiseman

    2017-11-01

    The importance of building quality to the health and well-being of occupants and surrounding neighbors cannot be overemphasized. Smart structures were construed to proffer solution to various issues of sustainable development including social factors that is concerned with health and safety of people. Based on existing literature materials on building quality, smart structures and general aspect of sustainable developments, this study examined the benefits of smart structures in the prevention of various health issues in infrastructural buildings, which has been a concern for stakeholders in the architecture, engineering and construction industry. The criterion for indoor environmental quality was adopted and various health and bodily issues related to building quality were explained. The adoption of smart structure concept will help to manage physical, chemical, biological and psychological factors of building with a view to enhancing better quality of life of occupants.

  3. Preventive Security-Constrained Optimal Power Flow Considering UPFC Control Modes

    Directory of Open Access Journals (Sweden)

    Xi Wu

    2017-08-01

    Full Text Available The successful application of the unified power flow controller (UPFC provides a new control method for the secure and economic operation of power system. In order to make the full use of UPFC and improve the economic efficiency and static security of a power system, a preventive security-constrained power flow optimization method considering UPFC control modes is proposed in this paper. Firstly, an iterative method considering UPFC control modes is deduced for power flow calculation. Taking into account the influence of different UPFC control modes on the distribution of power flow after N-1 contingency, the optimization model is then constructed by setting a minimal system operation cost and a maximum static security margin as the objective. Based on this model, the particle swarm optimization (PSO algorithm is utilized to optimize power system operating parameters and UPFC control modes simultaneously. Finally, a standard IEEE 30-bus system is utilized to demonstrate that the proposed method fully exploits the potential of static control of UPFC and significantly increases the economic efficiency and static security of the power system.

  4. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    Science.gov (United States)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  5. TanZamBo Capacity Building for HIV Prevention Research Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This grant will support the development of HIV/AIDS prevention trial expertise in Botswana, Tanzania and Zambia using existing collaborations between Africa, Canada and the United States. The Botswana-Tanzania-Zambia Capacity Building Network (TanZamBo) is composed of two African institutions with fairly well ...

  6. Excessive Heat Events and National Security: Building Resilience based on Early Warning Systems

    Science.gov (United States)

    Vintzileos, A.

    2017-12-01

    Excessive heat events (EHE) affect security of Nations in multiple direct and indirect ways. EHE are the top cause for morbidity/mortality associated to any atmospheric extremes. Higher energy consumption used for cooling can lead to black-outs and social disorder. EHE affect the food supply chain reducing crop yield and increasing the probability of food contamination during delivery and storage. Distribution of goods during EHE can be severely disrupted due to mechanical failure of transportation equipment. EHE during athletic events e.g., marathons, may result to a high number of casualties. Finally, EHE may also affect military planning by e.g. reducing hours of exercise and by altering combat gear. Early warning systems for EHE allow for building resilience. In this paper we first define EHE as at least two consecutive heat days; a heat day is defined as a day with a maximum heat index with probability of occurrence that exceeds a certain threshold. We then use retrospective forecasts performed with a multitude of operational models and show that it is feasible to forecast EHE at forecast lead of week-2 and week-3 over the contiguous United States. We finally introduce an improved definition of EHE based on an intensity index and investigate forecast skill of the predictive system in the tropics and subtropics.

  7. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    Science.gov (United States)

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  8. Resolution of sick building syndrome in a high-security facility.

    Science.gov (United States)

    Hiipakka, D W; Buffington, J R

    2000-08-01

    The main objective of this article is to serve as a case study for other industrial hygiene (IH) professionals' review as a "real world" effort in responding to a facility perceived as "sick" by its occupants. As many industrial hygienists do not have extensive backgrounds in evaluating microbial air contaminants or the mechanical function of building HVAC units, the overall intent is to provide "lessons learned" to IH generalists who may be asked to participate in indoor environmental quality (IEQ) surveys. In September 1994, a suspected case of "sick building syndrome" was investigated (with significant airborne fungal loads confirmed) at a communications center after numerous occupants reported upper respiratory disease and/or allergy-type symptoms. The setting was a two-story structure approximately 30 years old, with a normal occupancy load of 350 to 400 persons. In addition to continual structural modifications, the central HVAC air conditioning systems had poor maintenance histories. Inspection of HVAC components revealed visible fungal growth on air filters and air ducts and in cooling fan condensate drip pans. Fungal air samples were collected with an Anderson N6 air sampler and Sabouraund dextrose agar media. Over a study period of 23 months, three rounds of 26 air samples were collected for 5 minutes each at 28.3 liters/minute airflow. Cultures exhibited fungi such as Aspergillus, Penicillium, Alternaria, and Cladosporium. Certain strains of these fungi produce mycotoxins that may cause a variety of deleterious health effects such as those described by occupants. Initial 1994 airborne fungal concentrations ranged from 85 to 6157 colony forming units (CFUs) per cubic meter of sampled air (CFU/m3). Some investigators have reported fungal concentrations as low as 245 CFU/m3 associated with complaint sites in other buildings. Remediation efforts involved hiring a dedicated mechanic to implement a HVAC preventive maintenance program (including regular

  9. Doorstep: A doorbell security system for the prevention of doorstep crime.

    Science.gov (United States)

    Ennis, Andrew; Cleland, Ian; Patterson, Timothy; Nugent, Chris D; Cruciani, Federico; Paggetti, Cristiano; Morrison, Gareth; Taylor, Richard

    2016-08-01

    Safety and security rank highly in the priorities of older people on both an individual and policy level. Older people are commonly targeted as victims of doorstep crime, as they can be perceived as being vulnerable. As a result, this can have a major effect on the victim's health and wellbeing. There have been numerous prevention strategies implemented in an attempt to combat and reduce the number of doorstep crimes. There is, however, little information available detailing the effectiveness of these strategies and how they impact on the fear of crime, particularly with repeat victims. There is therefore clear merit in the creation and piloting of a technology based solution to combat doorstep crime. This paper presents a developed solution to provide increased security for older people within their home.

  10. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  11. Radon prevention in the design and construction of schools and other large buildings

    International Nuclear Information System (INIS)

    Leovic, K.W.; Craig, A.B.; Harris, D.B.

    1991-01-01

    The paper discusses radon prevention in the design and construction of schools and other large buildings. The U.S. EPA's Office of Research and Development (ORD) has started incorporating radon control measures into the design and construction of new schools and other large buildings. The goal of the new designs is twofold: (1) to prevent elevated radon levels in the completed building, and (2) to provide the protection at a fraction of the cost of retrofit systems. ORD's Air and Energy Engineering Research Laboratory (AEERL) has conducted the research necessary to develop viable designs. The Indoor Radon Abatement Act of 1988 set a national long-term goal for indoor radon of 0.5 picocurie per liter (pCi/L)--the same as that typically found in outdoor air. The EPA currently recommends that homeowners take action to reduce radon levels to below 4 pCi/L. To achieve the national goal set in the 1988 Act for new construction in radon-prone areas, AEERL research is using a combination of active subslab depressurization (ASD) and operation of the heating, ventilation, and air-conditioning (HVAC) system to pressurize buildings. These measures are described briefly, along with a case history of one building

  12. Measuring the burden of preventable diabetic hospitalisations in the Mexican Institute of Social Security (IMSS).

    Science.gov (United States)

    Lugo-Palacios, David G; Cairns, John; Masetto, Cynthia

    2016-08-02

    The prevalence of diabetes among adults in Mexico has increased markedly from 6.7 % in 1994 to 14.7 % in 2015. Although the main diabetic complications can be prevented or delayed with timely and effective primary care, a high percentage of diabetic patients have developed them imposing an important preventable burden on Mexican society and on the health system. This paper estimates the financial and health burden caused by potentially preventable hospitalisations due to diabetic complications in hospitals operated by the largest social security institution in Latin America, the Mexican Institute of Social Security (IMSS), in the period 2007-2014. Hospitalisations in IMSS hospitals whose main cause was a diabetic complication were identified. The financial burden was estimated using IMSS diagnostic-related groups. To estimate the health burden, DALYs were computed under the assumption that patients would not have experienced complications if they had received timely and effective primary care. A total of 322,977 hospitalisations due to five diabetic complications were identified during the period studied, of which hospitalisations due to kidney failure and diabetic foot represent 78 %. The financial burden increased by 8.4 % in real terms between 2007 and 2014. However, when measured as cost per IMSS affiliate, it decreased by 11.3 %. The health burden had an overall decrease of 13.6 % and the associated DALYs in 2014 reached 103,688. Resources used for the hospital treatment of diabetic complications are then not available for other health care interventions. In order to prevent these hospitalisations more resources might need to be invested in primary care; the first step could be to consider the financial burden of these hospitalisations as a potential target for switching resources from hospital care to primary care services. However, more evidence of the effectiveness of different primary care interventions is needed to know how much of the burden could

  13. CSER 79-028, Addendum 2: Security bar addition to pedestal storage racks in Room 3 in 2736-Z Building

    International Nuclear Information System (INIS)

    Miller, E.M.

    1994-01-01

    The Plutonium Finishing Plant (PFP) is installing security bars on plutonium storage racks in Room 3 in 2736-Z Building to meet International Atomic Energy Agency (IAEA) material control requirements. Figures show the existing arrangement and design of the security bars. The security bars are to be fabricated of aluminum or carbon steel. The detailed fabrication sketches are reproduced in Appendix C. The security bars are to be installed close to the chains of plutonium so a determination of their effect on criticality safety needs to be made. The addition of security bars to the storage array of 2.5 kg plutonium buttons in Room 3 can effect reactivity by reflecting neutrons back into the plutonium in the storage cans, by absorbing neutrons, and by moderating neutrons between stored plutonium buttons. The small amount of metal added by the storage bars in comparison to the amount of concrete in the walls and aluminum in the shelf monitors already in place would not significantly increase the k eff of the storage array. Several computer calculations in previous analyses show that the security bars will have a negligible affect on reactivity

  14. Building

    OpenAIRE

    Seavy, Ryan

    2014-01-01

    Building for concrete is temporary. The building of wood and steel stands against the concrete to give form and then gives way, leaving a trace of its existence behind. Concrete is not a building material. One does not build with concrete. One builds for concrete. MARCH

  15. Contributions of the US Centers for Disease Control and Prevention in Implementing the Global Health Security Agenda in 17 Partner Countries.

    Science.gov (United States)

    Fitzmaurice, Arthur G; Mahar, Michael; Moriarty, Leah F; Bartee, Maureen; Hirai, Mitsuaki; Li, Wenshu; Gerber, A Russell; Tappero, Jordan W; Bunnell, Rebecca

    2017-12-01

    The Global Health Security Agenda (GHSA), a partnership of nations, international organizations, and civil society, was launched in 2014 with a mission to build countries' capacities to respond to infectious disease threats and to foster global compliance with the International Health Regulations (IHR 2005). The US Centers for Disease Control and Prevention (CDC) assists partner nations to improve IHR 2005 capacities and achieve GHSA targets. To assess progress through these CDC-supported efforts, we analyzed country activity reports dating from April 2015 through March 2017. Our analysis shows that CDC helped 17 Phase I countries achieve 675 major GHSA accomplishments, particularly in the cross-cutting areas of public health surveillance, laboratory systems, workforce development, and emergency response management. CDC's engagement has been critical to these accomplishments, but sustained support is needed until countries attain IHR 2005 capacities, thereby fostering national and regional health protection and ensuring a world safer and more secure from global health threats.

  16. Supply Ventilation and Prevention of Carbon Monoxide (II) Ingress into Building Premises

    Science.gov (United States)

    Litvinova, N. A.

    2017-11-01

    The article contains the relationships of carbon monoxide (II) concentration versus height-above-ground near buildings derived based on results of studies. The results of studies are crucial in preventing external pollutants ingress into a ventilation system. Being generated by external emission sources, such as motor vehicles and city heating plants, carbon monoxide (II) enters the premises during operation of a supply ventilation system. Fresh air nomographic charts were drawn to select the height of a fresh air intake into the ventilation system. Nomographic charts take into account external sources. The selected emission sources are located at various levels above ground relative to the building. The recommendations allow designing supply ventilation taking into account the quality of ambient air through the whole building height.

  17. Effectiveness of biosecurity measures in preventing badger visits to farm buildings.

    Science.gov (United States)

    Judge, Johanna; McDonald, Robbie A; Walker, Neil; Delahay, Richard J

    2011-01-01

    Bovine tuberculosis caused by Mycobacterium bovis is a serious and economically important disease of cattle. Badgers have been implicated in the transmission and maintenance of the disease in the UK since the 1970s. Recent studies have provided substantial evidence of widespread and frequent visits by badgers to farm buildings during which there is the potential for close direct contact with cattle and contamination of cattle feed. Here we evaluated the effectiveness of simple exclusion measures in improving farm biosecurity and preventing badger visits to farm buildings. In the first phase of the study, 32 farms were surveyed using motion-triggered infrared cameras on potential entrances to farm buildings to determine the background level of badger visits experienced by each farm. In the second phase, they were divided into four treatment groups; "Control", "Feed Storage", "Cattle Housing" and "Both", whereby no exclusion measures were installed, exclusion measures were installed on feed storage areas only, cattle housing only or both feed storage and cattle housing, respectively. Badger exclusion measures included sheet metal gates, adjustable metal panels for gates, sheet metal fencing, feed bins and electric fencing. Cameras were deployed for at least 365 nights in each phase on each farm. Badger visits to farm buildings occurred on 19 of the 32 farms in phase one. In phase two, the simple exclusion measures were 100% effective in preventing badger entry into farm buildings, as long as they were appropriately deployed. Furthermore, the installation of exclusion measures also reduced the level of badger visits to the rest of the farmyard. The findings of the present study clearly demonstrate how relatively simple practical measures can substantially reduce the likelihood of badger visits to buildings and reduce some of the potential for contact and disease transmission between badgers and cattle.

  18. Effectiveness of biosecurity measures in preventing badger visits to farm buildings.

    Directory of Open Access Journals (Sweden)

    Johanna Judge

    Full Text Available BACKGROUND: Bovine tuberculosis caused by Mycobacterium bovis is a serious and economically important disease of cattle. Badgers have been implicated in the transmission and maintenance of the disease in the UK since the 1970s. Recent studies have provided substantial evidence of widespread and frequent visits by badgers to farm buildings during which there is the potential for close direct contact with cattle and contamination of cattle feed. METHODOLOGY: Here we evaluated the effectiveness of simple exclusion measures in improving farm biosecurity and preventing badger visits to farm buildings. In the first phase of the study, 32 farms were surveyed using motion-triggered infrared cameras on potential entrances to farm buildings to determine the background level of badger visits experienced by each farm. In the second phase, they were divided into four treatment groups; "Control", "Feed Storage", "Cattle Housing" and "Both", whereby no exclusion measures were installed, exclusion measures were installed on feed storage areas only, cattle housing only or both feed storage and cattle housing, respectively. Badger exclusion measures included sheet metal gates, adjustable metal panels for gates, sheet metal fencing, feed bins and electric fencing. Cameras were deployed for at least 365 nights in each phase on each farm. RESULTS: Badger visits to farm buildings occurred on 19 of the 32 farms in phase one. In phase two, the simple exclusion measures were 100% effective in preventing badger entry into farm buildings, as long as they were appropriately deployed. Furthermore, the installation of exclusion measures also reduced the level of badger visits to the rest of the farmyard. The findings of the present study clearly demonstrate how relatively simple practical measures can substantially reduce the likelihood of badger visits to buildings and reduce some of the potential for contact and disease transmission between badgers and cattle.

  19. Information Security Analysis: A Study to Analyze the Extent to Which Information Security Systems Can Be Utilized to Prevent Intoxicated Individuals from Driving

    Science.gov (United States)

    Pierre, Joseph D.

    2011-01-01

    Information security systems (ISS) have been designed to protect assets from damages and from unauthorized access internally as well as externally. This research is promising similar protection from ISS methods that could prevent intoxicated individuals under the influence of alcohol from driving. However, previous research has shown significant…

  20. Building Foundations for Nuclear Security Enterprise Analysis Utilizing Nuclear Weapon Data

    Energy Technology Data Exchange (ETDEWEB)

    Josserand, Terry Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis; Young, Leone [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis; Chamberlin, Edwin Phillip [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis

    2017-09-01

    The Nuclear Security Enterprise, managed by the National Nuclear Security Administration - a semiautonomous agency within the Department of Energy - has been associated with numerous assessments with respect to the estimating, management capabilities, and practices pertaining to nuclear weapon modernization efforts. This report identifies challenges in estimating and analyzing the Nuclear Security Enterprise through an analysis of analogous timeframe conditions utilizing two types of nuclear weapon data - (1) a measure of effort and (2) a function of time. The analysis of analogous timeframe conditions that utilizes only two types of nuclear weapon data yields four summary observations that estimators and analysts of the Nuclear Security Enterprise will find useful.

  1. Are green building features safe for preventive maintenance workers? Examining the evidence.

    Science.gov (United States)

    Omar, Mohamed Shamun; Quinn, Margaret M; Buchholz, Bryan; Geiser, Ken

    2013-04-01

    Many newly constructed green buildings (GB) are certified using the United States Green Building Council (USGBC) Leadership in Energy and Environmental Design (LEED) rating system for new construction and major renovation which focuses on architectural and mechanical design to conserve energy, reduce environmental harm, and enhance indoor quality for occupants. This study evaluated the preventive maintenance (PM) worker occupational safety and health (OSH) risks related to the design of GB. PM job hazard analyses (JHA) were performed on the tasks required to operate and maintain five GB features selected from 13 LEED certified GB. A 22-item JHA and OSH risk scoring system were developed. Potentially serious OSH hazards included: green roofs made of slippery material without fall protection; energy recovery wheels and storm water harvesting systems in confined spaces; skylights without guard rails; and tight geothermal well mechanical rooms constraining safe preventive practices. GB can present PM OSH risks and these should be eliminated in the building design phase. Copyright © 2013 Wiley Periodicals, Inc.

  2. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  3. Biosafety and Biosecurity: A Relative Risk-Based Framework for Safer, More Secure, and Sustainable Laboratory Capacity Building.

    Science.gov (United States)

    Dickmann, Petra; Sheeley, Heather; Lightfoot, Nigel

    2015-01-01

    Laboratory capacity building is characterized by a paradox between endemicity and resources: countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity) and capacities (laboratories, trained staff, adequate regulations). Meanwhile, countries with low endemicity of pathogenic agents often have high-containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. A group at Chatham House developed a draft conceptual framework for safer, more secure, and sustainable laboratory capacity building. The draft generic framework is guided by the phrase "LOCAL - PEOPLE - MAKE SENSE" that represents three major principles: capacity building according to local needs (local) with an emphasis on relationship and trust building (people) and continuous outcome and impact measurement (make sense). This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.

  4. Biosafety and Biosecurity: A relative risk-based framework for safer, more secure and sustainable laboratory capacity building

    Directory of Open Access Journals (Sweden)

    Petra eDickmann

    2015-10-01

    Full Text Available Background: Laboratory capacity building is characterized by a paradox between endemicity and resources: Countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity and capacities (laboratories, trained staff, adequate regulations. Meanwhile, countries with low endemicity of pathogenic agents often have high containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. Methods: A group at Chatham House developed a draft conceptual framework for safer, more secure and sustainable laboratory capacity building. Results: The draft generic framework is guided by the phrase ‘LOCAL – PEOPLE – MAKE SENSE’ that represents three major principles: capacity building according to local needs (local with an emphasis on relationship and trust-building (people and continuous outcome and impact measurement (make sense. Conclusions: This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.

  5. Capacity building among african american faith leaders to promote HIV prevention and vaccine research.

    Science.gov (United States)

    Alio, Amina P; Lewis, Cindi A; Bunce, Catherine A; Wakefield, Steven; Thomas, Weldon G; Sanders, Edwin; Keefer, Michael C

    2014-01-01

    In light of the increasing rates of HIV infection in African Americans, it is essential that black faith leaders become more proactive in the fight against the epidemic. The study aim was to engage faith leaders in a sustainable partnership to increase community participation in preventive HIV vaccine clinical research while improving their access to and utilization of HIV/AIDS prevention services. Leadership Development Seminars were adapted for faith leaders in Rochester, NY, with topics ranging from the importance of preventive HIV vaccine research to social issues surrounding HIV/AIDs within a theological framework. Seminars were taught by field-specific experts from the black community and included the development of action plans to institute HIV preventive ministries. To assess the outcome of the Seminars, baseline and post-training surveys were administered and analyzed through paired sample t Tests and informal interviews. 19 faith leaders completed the intervention. In general, the majority of clergy felt that their understanding of HIV vaccine research and its goals had increased postintervention. A critical outcome was the subsequent formation of the Rochester Faith Collaborative by participating clergy seeking to sustain the collaborative and address the implementation of community action plans. Providing scientific HIV/AIDS knowledge within the context of clergy members' belief structure was an effective method for engaging black Church leaders in Rochester, NY. Collaborative efforts with various local institutions and community-based organizations were essential in building trust with the faith leaders, thereby building bridges for better understanding of HIV/AIDS prevention efforts, including HIV vaccine research.

  6. Building a Rice Decision Support System to Support Global Food Security and Commodity Markets, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...

  7. Training and technical assistance to enhance capacity building between prevention research centers and their partners.

    Science.gov (United States)

    Spadaro, Antonia J; Grunbaum, Jo Anne; Dawkins, Nicola U; Wright, Demia S; Rubel, Stephanie K; Green, Diane C; Simoes, Eduardo J

    2011-05-01

    The Centers for Disease Control and Prevention has administered the Prevention Research Centers Program since 1986. We quantified the number and reach of training programs across all centers, determined whether the centers' outcomes varied by characteristics of the academic institution, and explored potential benefits of training and technical assistance for academic researchers and community partners. We characterized how these activities enhanced capacity building within Prevention Research Centers and the community. The program office collected quantitative information on training across all 33 centers via its Internet-based system from April through December 2007. Qualitative data were collected from April through May 2007. We selected 9 centers each for 2 separate, semistructured, telephone interviews, 1 on training and 1 on technical assistance. Across 24 centers, 4,777 people were trained in 99 training programs in fiscal year 2007 (October 1, 2006-September 30, 2007). Nearly 30% of people trained were community members or agency representatives. Training and technical assistance activities provided opportunities to enhance community partners' capacity in areas such as conducting needs assessments and writing grants and to improve the centers' capacity for cultural competency. Both qualitative and quantitative data demonstrated that training and technical assistance activities can foster capacity building and provide a reciprocal venue to support researchers' and the community's research interests. Future evaluation could assess community and public health partners' perception of centers' training programs and technical assistance.

  8. Public security and peace building operations in post-armed conflict periods

    OpenAIRE

    Aguilar, Sérgio Luiz Cruz

    2012-01-01

    The article shows how contemporary peace operations conducted bythe United Nations (UN) to manage and/or resolve armed conflicts have dealt withthe issue of public security. As part of the effort to establish a lasting peace in theseterritories, the activities of the Organization include the security sector reform andthe structuring of a democratic police force as part of a broader process of peacebuilding. Based on specialized literature on the subject, UN documents and personalobservations,...

  9. Flexible and secure labour market transitions: Towards institutional capacity building in the digital economy

    OpenAIRE

    Schmid, Günther

    2016-01-01

    Industry 4.0 and robots are said to speed up productivity thereby inducing a 'quantum leap' towards the 'end of work' and calling for a complete change of social security institutions that have so far been closely linked to employment. Unconditional basic income is the cry of the day, curiously advocated in particular by, for example, employers in high-tech industries and modern financial or distributive services. In the name of freedom, liberty and flexibility they suggest a form of security...

  10. Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities

    Science.gov (United States)

    2015-12-01

    the USASAC leads the AMC Security Assistance Enterprise (ASAE), as well as cases associated with Foreign Military Sales (FMS) (Turner 2012, 5). The...reforms, excess defense articles, U.S. Army Security Assistance Command, Foreign Military Sales 15. NUMBER OF PAGES 73 16. PRICE CODE 17...Contract Audit Agency DCMA Defense Contract Management Agency DCS Direct Commercial Sales DELG Defense Export Loan Guarantee DISAM Defense

  11. Whole Building Design Objectives for Campus Safety and Security: A System Dynamics Approach

    Science.gov (United States)

    Oakes, Charles G.

    2010-01-01

    The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…

  12. Safety distance for preventing hot particle ignition of building insulation materials

    Directory of Open Access Journals (Sweden)

    Jiayun Song

    2014-01-01

    Full Text Available Trajectories of flying hot particles were predicted in this work, and the temperatures during the movement were also calculated. Once the particle temperature decreased to the critical temperature for a hot particle to ignite building insulation materials, which was predicted by hot-spot ignition theory, the distance particle traveled was determined as the minimum safety distance for preventing the ignition of building insulation materials by hot particles. The results showed that for sphere aluminum particles with the same initial velocities and diameters, the horizontal and vertical distances traveled by particles with higher initial temperatures were higher. Smaller particles traveled farther when other conditions were the same. The critical temperature for an aluminum particle to ignite rigid polyurethane foam increased rapidly with the decrease of particle diameter. The horizontal and vertical safety distances were closely related to the initial temperature, diameter and initial velocity of particles. These results could help update the safety provision of firework display.

  13. Energy security of residential buildings as an aspect of managerial activity in the modern concept of globalization

    Science.gov (United States)

    Chumakova, Olga

    2017-10-01

    The paper shows the management aspects of ensuring the safety of residential buildings. The article presents an analytical review of the state of the existing heat supply systems in the Russian Federation, assesses their energy security, highlights the results of research into the causes of accidents in engineering systems in water-bearing communications, and provides methods and comparative calculations of failures of these systems. It is indicated that according to the results of the All-Russian Census of 2010, the total population of the Russian Federation at the time of the survey was 142 million 857 thousand people living in more than 1100 settlements that have the status of the city (subject to their identification by population, administrative and national economic significance and the nature of the building), as well as in almost 160,000 rural settlements. It should be noted that in accordance with the classification of settlements in the Russian Federation, there are five main categories, namely: The above classification of settlements has formed the basis for the analysis of the existing processes of functioning of the heat supply systems of the Russian Federation at the objects of housing, social and industrial development from the point of view of energy security. Thus, for example, it turned out that in large cities with multi-storey buildings the centralized heat supply system is dominated by a system consisting of one or several sources of heat, heat networks having different diameter of pipelines, their number and length, and also serving various types of heat consumers) from cogeneration plants (CHP) of public use, or industrial enterprises. As for the welterweight and small towns, including urban-type settlements with a multi-storey building of the post-war period, they, as a rule, have the majority of IGFs, fed from the city or district boiler houses.

  14. Increasing security of supply: The search for stable models of financing for new nuclear build in the European Union

    International Nuclear Information System (INIS)

    Heffron, Raphael James

    2009-01-01

    Full text: This research assesses models for financing of new nuclear build in European Union (EU) member states to find the most stable form. The countries examined in this study are France, the United Kingdom, Finland and Romania. The results attest that due to various historical, political, competition, and electricity market structural conditions Romania has emerged with the most secure and stable model for financing of new nuclear projects. This paper begins with an assessment of the effects on the nuclear sector from energy, environment and competition legislation in the EU. Then the political and economic climate of the afore mentioned EU member states is completed. Following this an overview of the market structure of the electricity sector in those respective countries is conducted. Then the key research on the models of financing of new nuclear build is explored, contrasted and analysed. The research concludes that there are four main models for financing new nuclear projects in Europe. Each model has transcended from different political and economic forces, and consequently each model has met with varied levels of success. Electricity market structures while operating to the same legal requirements, have been dissimilar in their evolution. The combination of the above factors has led to different models for financing new nuclear build. Upon further analysis it is concluded and demonstrated that the Romanian financing model is the most suitable and provides an example for any new nuclear build aspiring nations in the EU and beyond. (author)

  15. Building a new storyline for Florida's domestic security to provide future resiliency for the state

    OpenAIRE

    Pape, Dominick D.

    2008-01-01

    CHDS State/Local Quickly after the 9/11 event, the state of Florida drafted one of the Nation's first comprehensive counterterrorism strategies to aid in the protection of the state's visitors and citizens. This strategy was drafted early in the new paradigm of Homeland Security. The strategy had several modifications over the years but has not had a comprehensive review since its inception. Many things have changed in the arena of Homeland Security since that first step after the 9/11 ...

  16. Nuclear Security Summit and Workshop 2015: Preventing, Understanding and Recovering from Nuclear Accidents lessons learned from Chernobyl and Fukushima

    Science.gov (United States)

    2016-09-01

    Workshop 2015 "Preventing, Understanding and Recovering from Nuclear Accidents"--lessons learned from Chernobyl and Fukushima Distribution Statement...by the factor to get the U.S. customary unit. “Preventing, Understanding and Recovering from Nuclear Accidents” – lessons learned from Chernobyl ...and Fukushima NUCLEAR SECURITY SUMMIT & WORKSHOP 2015 2 Background The 1986 Chernobyl and the 2011 Fukushima accidents provoked world-wide concern

  17. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks

  18. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps

  19. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  20. THE TEAM BUILDING IN COLLECTIVES AS PREVENTIVE AND THERAPEUTIC ACTIVITY IN ACUTE AND CHRONIC STRESS

    Directory of Open Access Journals (Sweden)

    Tsvetelina Mihaylova

    2018-04-01

    Full Text Available The stress contributes to almost all medical illnesses while the acute and chronic stress - related to work - is a primary cause of such life-threatening conditions as myocardial infarction, brain stroke, etc. The aim of the current study is an investigation of the methods for team building related to prevention and therapy in connection with acute or chronic stress. The accomplishment of the aim set is achieved by means of assessment of the applicability of laughter therapy, as a method for team building suitable in practice. It was found that the laughter therapy may help reduction of stress and tension, improvement of the quality of work, strengthening of the social relations and interrelations, etc. Increasingly more studies maintain the theory that the laughter may have therapeutic value and brings about physical benefits to the particular individual, as a member of the personnel. The laughter is a part of human behavior, and it helps people to clarify their intentions in the social interaction. The laughter is used as a signal for accepting the positive interactions with other people and is a precondition for friendly attitude in the working environment as well. Conclusions may be drawn that the laughter therapy is a suitable method for team building; the laughter therapy is appropriate for everyone as a means for the alleviation of stress, and it has a positive impact on the working process. In terms of business, a positive assessment of the methods for pulling together of members of the collective (team building may be given by a way which has subsequent positive consequences on their work.

  1. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    OpenAIRE

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to pro...

  2. Nation-building e segurança internacional: Um debate em construção Nation-building and international security: A debate under construction

    Directory of Open Access Journals (Sweden)

    Aureo de Toledo Gomes

    2009-08-01

    Full Text Available Este artigo almeja analisar as operações de nation-building, que, desde os atentados terroristas de 11 de setembro de 2001, são consideradas uma das maneiras para se lidar com as novas ameaças de segurança internacional, principalmente os ditos Estados Falidos. Assim sendo, revisaremos a bibliografia sobre o tema, procurando identificar as origens destas operações, assim como as definições utilizadas pelos principais autores e os problemas que elas possam apresentar.This article aims to analyze nation-building operations, which have been considered, since September 11, 2001 terrorist attacks, one of the ways to cope with the new threats to international security, mainly the so-called Failed States. Therefore, we will review the bibliography published, trying to identity not only the origins of such operations but also the definitions used by the main authors and the problems that they might present.

  3. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    Gwin, Jeremy; Frenette, Douglas

    2010-01-01

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 - Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or ''clean,'' building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, ''Final Status Survey Plan for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201'') was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room into one

  4. State-Building and Democracy: Prosperity Representation and Security in Kosovo

    OpenAIRE

    Silander, Daniel; Janzekovitz, John

    2012-01-01

    The traditional assumption of the state sovereignty norm has been that an international society of states will structure the international order to safeguard the interests of the state. The end of the Cold War era transformed international relations and led to a discussion on how states interacted with their populations. From the early 1990s, research on international relations, war and peace, and security studies identified the growing problem of failing states. Such states ar...

  5. A Systematic Approach for Dynamic Security Assessment and the Corresponding Preventive Control Scheme Based on Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Sun, Kai; Rather, Zakir Hussain

    2014-01-01

    This paper proposes a decision tree (DT)-based systematic approach for cooperative online power system dynamic security assessment (DSA) and preventive control. This approach adopts a new methodology that trains two contingency-oriented DTs on a daily basis by the databases generated from power...... system simulations. Fed with real-time wide-area measurements, one DT of measurable variables is employed for online DSA to identify potential security issues, and the other DT of controllable variables provides online decision support on preventive control strategies against those issues. A cost......-effective algorithm is adopted in this proposed approach to optimize the trajectory of preventive control. The paper also proposes an importance sampling algorithm on database preparation for efficient DT training for power systems with high penetration of wind power and distributed generation. The performance...

  6. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    Directory of Open Access Journals (Sweden)

    Luke Howie

    2014-11-01

    Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.

  7. Optimizing a physical security configuration using a highly detailed simulation model

    NARCIS (Netherlands)

    Marechal, T.M.A.; Smith, A.E.; Ustun, V.; Smith, J.S.; Lefeber, A.A.J.; Badiru, A.B.; Thomas, M.U.

    2009-01-01

    This research is focused on using a highly detailed simulation model to create a physical security system to prevent intrusions in a building. Security consists of guards and security cameras. The problem is represented as a binary optimization problem. A new heuristic is proposed to do the security

  8. Advanced fire prevention techniques for ITER-INDIA laboratory building, IPR

    International Nuclear Information System (INIS)

    Modi, D.V.; Channa Reddy, D.

    2016-01-01

    Just as air and water, survival of human life without fire is unimaginable. However, fire can be a boon as well as a bane. The ability to control the use of fire is an art towards improved industrial development. The same phenomenon is also applicable for research and development sector. Fire Safety is a key issue for any kind of research laboratories. Fire hazards in laboratories arise from the storage and use of flammable materials and electrical installations and from hazardous operations carried out there. The risk of damage due to fire depends on the combustible available, their physical arrangement, the geometry of the building, likelihood of the ignition, etc. The risk is also controlled by the fire protection measures in place, which relate to both fire prevention and fire control. (author)

  9. Building a sustainable academic-community partnership: focus on fall prevention.

    Science.gov (United States)

    Gray, Betsey; Macrae, Nancy

    2012-01-01

    To create an interprofessional/interdisciplinary education (IPE), pilot course that provided a representative group of students the opportunity to develop a 6 week fall reduction program for a group of elder volunteers who were independently living in the community. The authors describe the processes that occurred for the course and student-led program to be developed. This pilot course provided opportunities for interprofessional student learning, faculty practice and development, and a program to improve the health of the participants. Sustaining interprofessional collaboration is challenging, primarily due to scheduling difficulties and faculty workloads. More time needs to be devoted to developing the team skills of students, as well as building their knowledge of the contributions each discipline can make to a holistic view of elders. The next phase of this project needs to include pre and post measurement of students' readiness for IPE and elders to more adequately assess the components and effects of the course and program for fall prevention.

  10. A race we can win. The world can - and must - build a stronger security framework

    International Nuclear Information System (INIS)

    ElBaradei, Mohamed

    2005-01-01

    Nuclear proliferation and terrorism represent the single most important threat to global security. Yet fundamental differences of opinion remain on how to deal with this ever growing menace to our survival. Should we opt for diplomacy or force? What are the relative merits of collective versus unilateral action? Is it more effective to pursue a policy of containment or one based on inclusiveness? These are not new questions, by any measure. But they have taken on renewed urgency as nations struggle, both regionally and globally, to cope with an extended array of conflicts, highly sophisticated forms of terrorism, and a growing threat of weapons of mass destruction. In a real sense, we are in a race against time - but it's a race we can win if we work together. The Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits - by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. The question is how do we best move ahead to achieve the security we seek

  11. Security Sector Reform: A Case Study Approach to Transition and Capacity Building

    Science.gov (United States)

    2010-01-01

    the heart of the Serbian empire, under the Nemanjic dynasty. The period sees the building of many Serbian Orthodox churches and monasteries. 27...Serbia regains control of Kosovo from the Turks, recognized by the 1913 Treaty of London. 1918 . Kosovo becomes part of the Kingdom of Serbia. 1941...on the UNMIK and OSCE missions, approximately 499 Formed Police Units (FPU) from Pakistan, Romania , Poland, and the Ukraine were a part of the

  12. Homeland security and virtual reality: building a Strategic Adaptive Response System (STARS).

    Science.gov (United States)

    Swift, Christopher; Rosen, Joseph M; Boezer, Gordon; Lanier, Jaron; Henderson, Joseph V; Liu, Alan; Merrell, Ronald C; Nguyen, Sinh; Demas, Alex; Grigg, Elliot B; McKnight, Matthew F; Chang, Janelle; Koop, C Everett

    2005-01-01

    The advent of the Global War on Terrorism (GWOT) underscored the need to improve the U.S. disaster response paradigm. Existing systems involve numerous agencies spread across disparate functional and geographic jurisdictions. The current architecture remains vulnerable to sophisticated terrorist strikes. To address these vulnerabilities, we must continuously adapt and improve our Homeland Security architecture. Virtual Reality (VR) technologies will help model those changes and integrate technologies. This paper provides a broad overview of the strategic threats, together with a detailed examination of how specific VR technologies could be used to ensure successful disaster responses.

  13. The Latino Migrant Worker HIV Prevention Program: building a community partnership through a community health worker training program.

    Science.gov (United States)

    Sánchez, Jesús; Silva-Suarez, Georgina; Serna, Claudia A; De La Rosa, Mario

    2012-01-01

    There is limited information on the impact of the HIV/AIDS epidemic on Latino migrant workers (LMWs), although available data indicate that this community is being disproportionally affected. The need for prevention programs that address the specific needs of LMWs is becoming well recognized. HIV prevention interventions that train and employ community health workers are a culturally appropriate way to address the issues of community trust and capacity building in this community. This article describes the Latino Migrant Worker HIV Prevention Program and its efforts to train and engage community health workers in the prevention of HIV among LMWs in South Florida.

  14. Network Based Intrusion Detection and Prevention Systems in IP-Level Security Protocols

    OpenAIRE

    R. Kabila

    2008-01-01

    IPsec has now become a standard information security technology throughout the Internet society. It provides a well-defined architecture that takes into account confidentiality, authentication, integrity, secure key exchange and protection mechanism against replay attack also. For the connectionless security services on packet basis, IETF IPsec Working Group has standardized two extension headers (AH&ESP), key exchange and authentication protocols. It is also working on l...

  15. Autonomous Voltage Security Regions to Prevent Cascading Trip Faults in Wind Turbine Generators

    DEFF Research Database (Denmark)

    Niu, Tao; Guo, Qinglai; Sun, Hongbin

    2016-01-01

    Cascading trip faults in large-scale wind power centralized integration areas bring new challenges to the secure operation of power systems. In order to deal with the complexity of voltage security regions and the computation difficulty, this paper proposes an autonomous voltage security region...... wind farm, an AVSR is determined to guarantee the normal operation of each wind turbine generator (WTG), while in the control center, each region is designed in order to guarantee secure operation both under normal conditions and after an N-1 contingency. A real system in Northern China was used...

  16. Enhancing teen pregnancy prevention in local communities: capacity building using the interactive systems framework.

    Science.gov (United States)

    Duffy, Jennifer L; Prince, Mary Severson; Johnson, Erin E; Alton, Forrest L; Flynn, Shannon; Faye, Amy Mattison; Padgett, Polly Edwards; Rollison, Chris; Becker, Dana; Hinzey, Angela L

    2012-12-01

    Getting To Outcomes (GTO), an innovative framework for planning, implementing, evaluating, and sustaining interventions has been shown to be effective in helping community-based organizations (CBOs) introduce science-based approaches into their prevention work. However, the Interactive Systems Framework (ISF) suggests that adopting innovations like GTO requires a significant amount of capacity building through training and technical assistance (T/TA). In this study, 11 CBOs and three schools in South Carolina entered into a 3 year program of intense and proactive T/TA based on the ISF to learn how to apply an adaptation of GTO (Promoting Science-Based Approaches-Getting To Outcomes, PSBA-GTO) to their teen pregnancy prevention programs. Using semi-structured interviews, the partnering organizations were assessed at three points in time, pre-T/TA, 12 months, and post T/TA (30 months) for their performance of the steps of GTO in their work. The seven organizations which participated in T/TA until the end of the project received an average of 76 h of TA and 112 h of training per organization. Interview results showed increased performance of all 10 steps of PSBA-GTO by these organizations when conducting their teen pregnancy programs. These results suggest targeted and proactive T/TA can successfully bridge the gap between research and practice by using a three part delivery system, as prescribed in the ISF, which relies on an intermediary prevention support system to ensure accurate and effective translation of research to the everyday work of community-based practitioners.

  17. Quantifying Biodiversity for Building Resilience for Food Security in Urban Landscapes: Getting Down to Business

    Directory of Open Access Journals (Sweden)

    Åsa Jansson

    2010-09-01

    Full Text Available A steady stream of ecosystem services is essential for human welfare and survival, and it has been convincingly shown that these flows are being eroded. Compelling theoretical knowledge about essential connections between ecosystem service generation, biodiversity, and resilience in social-ecological systems already exists; however, we still, to a great extent, lack spatially explicit quantitative assessments for translating this theoretical knowledge into practice. We propose an approach for measuring the change in flow and resilience of a regulating ecosystem service on a landscape scale over time when the landscape is exposed to both land use change due to urban expansion, and change in a large-scale economic driver. Our results quantitatively show that there can be a substantial decrease in resilience due to negative effects on response diversity without detecting any major decrease in ecosystem service generation over time, thus generating a sense of false security and sustainability.

  18. Promoting self-determination and financial security through innovative asset building approaches.

    Science.gov (United States)

    Burke-Miller, Jane K; Swarbrick, Margaret A; Carter, Tina M; Jonikas, Jessica A; Zipple, Anthony M; Fraser, Virginia V; Cook, Judith A

    2010-01-01

    Studies indicate that asset development programs such as Individual Development Accounts (IDAs) can enhance the economic security of low-income populations; however, only a handful of asset development programs have been implemented specifically to serve people with psychiatric disabilities, and larger programs have not collected disability-specific information. The purpose of this article is to increase our knowledge about the use of IDAs to enhance self-determination and recovery for people with psychiatric disabilities. Background information about IDAs is presented followed by case studies of two IDA programs that serve people with psychiatric disabilities. The use of IDA programs in enhancing self-determination among people with psychiatric disabilities is discussed, along with barriers and future directions.

  19. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.

  20. Importance Sampling Based Decision Trees for Security Assessment and the Corresponding Preventive Control Schemes: the Danish Case Study

    DEFF Research Database (Denmark)

    Liu, Leo; Rather, Zakir Hussain; Chen, Zhe

    2013-01-01

    Decision Trees (DT) based security assessment helps Power System Operators (PSO) by providing them with the most significant system attributes and guiding them in implementing the corresponding emergency control actions to prevent system insecurity and blackouts. DT is obtained offline from time...... and adopts a methodology of importance sampling to maximize the information contained in the database so as to increase the accuracy of DT. Further, this paper also studies the effectiveness of DT by implementing its corresponding preventive control schemes. These approaches are tested on the detailed model...

  1. The Latino Migrant Worker HIV Prevention Program: Building a Community Partnership Through a Community Health Worker Training Program

    OpenAIRE

    Sánchez, Jesús; Silva-Suarez, Georgina; Serna, Claudia A.; De La Rosa, Mario

    2012-01-01

    There is limited information on the impact of the HIV/AIDS epidemic on Latino migrant workers (LMWs), although available data indicate that this community is being disproportionally affected. The need for prevention programs that address the specific needs of LMWs is becoming well recognized. HIV prevention interventions that train and employ community health workers are a culturally appropriate way to address the issues of community trust and capacity building in this community. This article...

  2. Building confidence and partnership through the safe and secure dismantlement of nuclear weapons

    International Nuclear Information System (INIS)

    Goodby, J.E.

    1993-01-01

    The cold war is behind us now. It was with us a long time and we came to know it well. It was a dangerous time, but it had familiar contours and predictable reference points. Now, the topography of the bipolar confrontation is gone. We face great uncertainty and, yes, danger is still our companion. It is close at hand in the deadly relics of the cold war-the thousands of nuclear weapons that have been left behind like mines buried in a battlefield long after the guns have fallen silent. Our challenge is to construct a new and safer framework for our mutual relations beyond the cold war, based not on suspicion and fear, but on confidence and partnership. In doing so, it would be well to reflect on the enormous resources that were devoted to building weapons as compared to the relatively modest resources that will be needed to invest in peace. From that comparison should emerge a sense of proportion as to what we are called upon to do. We have choices. We can idly 'sleepwalk through history' and, once again, allow nuclear weapons to generate suspicion, competition, tension, and arms races reminiscent of the cold war. If we allow that to happen, we will have failed in our duty to posterity, and future generations will and should-judge us harshly. This would truly be the 'march of folly'. But if we seize the moment to build a solid foundation of confidence and partnership, we will surely be celebrated for our legacy of wisdom and peace. This is that moment. Let us now be wise

  3. Building the Capacity of States to Ensure Inclusion of Rural Communities in State and Local Primary Violence Prevention Planning

    Science.gov (United States)

    Cook-Craig, Patricia G.; Lane, Karen G.; Siebold, Wendi L.

    2010-01-01

    Rural, frontier, and geographically isolated communities face unique challenges associated with ensuring that they are equal partners in capacity-building and prevention planning processes at the state and local level despite barriers that can inhibit participation. By their nature, rural, frontier, and geographically isolated communities and…

  4. Striking First: Preemptive and Preventive Attack in U.S. National Security Policy

    National Research Council Canada - National Science Library

    Mueller, Karl P; Castillo, Jasen J; Morgan, Forrest E; Pegahi, Negeen; Rosen, Brian

    2006-01-01

    .... U.S. leaders recast the national security strategy to place greater emphasis on the threats posed by violent nonstate actors and by states from which they might acquire nuclear, biological, or chemical...

  5. The Importance of Information Security Management in Crisis Prevention in the Company

    OpenAIRE

    Wawak, Slawomir

    2010-01-01

    Management information system can be compared to the nervous system of a company. Its malfunction may cause adverse effects in many different areas of the company. Information Security Management is understood as tool of the information confidentiality, availability and integrity assurance. An effective information security management system reduces the risk of crisis in the company. It also allows to reduce the effects of the crisis occurring outside the company.

  6. Data Protection and the Prevention of Cybercrime: The EU as an area of security?

    OpenAIRE

    PORCEDDA, Maria Grazia

    2012-01-01

    (This working paper is a revised version of Ms. Porcedda's EUI LL.M. thesis, 2012.) Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy and security, and the interplay of the policies tackling them with ‘ICT sensitive’ liberties, such as privacy and data protection. This study addresses the subject in two ways. On the one hand, it aims to cast light on the (legal substantive) nature of, ...

  7. Roles of organizers and champions in building campus-community prevention partnerships.

    Science.gov (United States)

    Zakocs, Ronda C; Tiwari, Rashmi; Vehige, Tamara; DeJong, William

    2008-01-01

    A campus-community partnership can be an effective vehicle for launching environmental strategies to prevent college alcohol-related problems. In this study, the authors' primary aim was identifying key factors that facilitate or impede colleges' efforts to build campus-community partnerships. From fall 2004 to summer 2006, administrators at five 4-year colleges participated in a multisite case study. Level of partnership development was the primary outcome. Three interrelated factors facilitated higher-developed partnerships: college staff assigned to facilitate the partnerships who worked as community organizers, higher-level college administrators who served as aggressive champions, and community initiation of the partnership. The authors did not observe this trio of factors among the less-developed partnerships. A lack of administrative support made it more difficult for a champion to emerge, a college administrator who staunchly advocated for a campus-community partnership, and for those assigned to facilitate the partnership to carry out their work. Colleges should appoint higher-level administrators to serve as champions, while also ensuring that those assigned to facilitate a partnership can apply community organizing skills.

  8. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  9. Shaping a novel security approach in chemical industrial clusters to prevent large-scale domino events

    NARCIS (Netherlands)

    Reniers, Genserik L L; Dullaert, Wout; Soudan, Karel

    2009-01-01

    Two aspects are important when it comes to guaranteeing an effective and efficient security policy in a chemical industrial cluster. The first issue involves obtaining an acceptable level of collaboration between the different enterprises forming the cluster. The second topic is to ensure that an

  10. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    Science.gov (United States)

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  11. Macintosh Computer Classroom and Laboratory Security: Preventing Unwanted Changes to the System.

    Science.gov (United States)

    Senn, Gary J.; Smyth, Thomas J. C.

    Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…

  12. Assessment of the Portuguese building thermal code: Newly revised requirements for cooling energy needs used to prevent the overheating of buildings in the summer

    International Nuclear Information System (INIS)

    Oliveira Panao, Marta J.N.; Camelo, Susana M.L.; Goncalves, Helder J.P.

    2011-01-01

    In this paper, cooling energy needs are calculated by the steady-state methodology of the Portuguese building thermal code. After the first period of building code implementation, re-evaluation according to EN ISO 13790 is recommended in order to compare results with the dynamic simulation results. From these analyses, a newly revised methodology arises including a few corrections in procedure. This iterative result is sufficiently accurate to calculate the building's cooling energy needs. Secondly, results show that the required conditions are insufficient to prevent overheating. The use of the gain utilization factor as an overheating risk index is suggested, according to an adaptive comfort protocol, and is integrated in the method used to calculate the maximum value for cooling energy needs. This proposed streamlined method depends on reference values: window-to-floor area ratio, window shading g-value, integrated solar radiation and gain utilization factor, which leads to threshold values significantly below the ones currently used. These revised requirements are more restrictive and, therefore, will act to improve a building's thermal performance during summer. As a rule of thumb applied for Portuguese climates, the reference gain utilization factor should assume a minimum value of 0.8 for a latitude angle range of 40-41 o N, 0.6 for 38-39 o N and 0.5 for 37 o N. -- Highlights: → A newly revised methodology for Portuguese building thermal code. → The use of the gain utilization factor as an overheating risk index is suggested. → The proposed streamlined method depends on reference values. → Threshold maximum values are significantly below the ones currently used.

  13. Conflict Prevention and Confidence Building Measures in the South China Sea

    Science.gov (United States)

    2013-03-01

    Prevention and Conflict Management in Northeast Asia (Uppsala, Sweden: Uppsala University, 2005), 13. 4 Oliver Ramsbotham, Tom Woodhouse, Hugh Miall...Contemporary Conflict Resolution (Cambridge, UK: Polity Press, 2011), 138. 28 5 Niklas Swanström, Conflict Prevention and Conflict Management in...II): Regional Responses”, 4. 19 Niklas Swanström, Conflict Prevention and Conflict Management in Northeast Asia, 8. 20 Kofi A. Annan, Prevention of

  14. Innovation in the Prevention of the Use of Child Soldiers: Women in the Security Sector

    Science.gov (United States)

    2016-03-01

    committed to the Paris Principles defining a child soldiers as: any person below 18 years of age who is or has been recruited or used by an armed force or...armed group in any capacity, including but not limited to children, boys and girls, used as fighters, cooks, porters, messengers, spies or for sexual ... age of women that make up security forces worldwide and the limited professional devel- opment opportunities that are made available to them. Despite

  15. PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION

    Directory of Open Access Journals (Sweden)

    R. Poorvadevi

    2017-01-01

    Full Text Available Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.

  16. Devices and dressings to secure peripheral venous catheters to prevent complications.

    Science.gov (United States)

    Marsh, Nicole; Webster, Joan; Mihala, Gabor; Rickard, Claire M

    2015-06-12

    A peripheral venous catheter (PVC) is typically used for short-term delivery of intravascular fluids and medications. It is an essential element of modern medicine and the most frequent invasive procedure performed in hospitals. However, PVCs often fail before intravenous treatment is completed: this can occur because the device is not adequately attached to the skin, allowing the PVC to fall out, leading to complications such as phlebitis (irritation or inflammation to the vein wall), infiltration (fluid leaking into surrounding tissues) or occlusion (blockage). An inadequately secured PVC also increases the risk of catheter-related bloodstream infection (CRBSI), as the pistoning action (moving back and forth in the vein) of the catheter can allow migration of organisms along the catheter and into the bloodstream. Despite the many dressings and securement devices available, the impact of different securement techniques for increasing PVC dwell time is still unclear; there is a need to provide guidance for clinicians by reviewing current studies systematically. To assess the effects of PVC dressings and securement devices on the incidence of PVC failure. We searched the following electronic databases to identify reports of relevant randomised controlled trials (RCTs): the Cochrane Wounds Group Register (searched 08 April 2015): The Cochrane Central Register of Controlled Trials (CENTRAL; 2015, Issue 3), Ovid MEDLINE (1946 to March 7 2015); Ovid MEDLINE (In-Process & Other Non-Indexed Citations, March 7 2015); Ovid EMBASE (1974 to March 7 2015); and EBSCO CINAHL (1982 to March 8 2015). RCTs or cluster RCTs comparing different dressings or securement devices for the stabilisation of PVCs. Cross-over trials were ineligible for inclusion, unless data for the first treatment period could be obtained. Two review authors independently selected studies, assessed trial quality and extracted data. We contacted study authors for missing information. We used standard

  17. Building little safe and civilized communities: community crime prevention with Chinese characteristics?

    Science.gov (United States)

    Zhong, Lena Y; Broadhurst, Roderic G

    2007-02-01

    This article describes a community crime prevention program in China, set against a background of rapid economic development, large internal population migration, and increasing crime rates. Traditional social control in China has been transformed to adapt to the new reform era, yet some mechanisms remain intact. Crime prevention measures and strategies resemble those adopted in the West; however, the differences, constituting the so-called Chinese characteristics with community crime prevention are significant.

  18. The DISAM Journal of International Security Assistance Management. Volume 29, Number 4, December 2007. Building Partnership Capacity

    Science.gov (United States)

    2007-12-01

    Demographic Diversity and Change in the Central American Isthmus. Ann R. Pebley, Luis Rosero Bixby, and Universidad de Costa Rica. Programa Centroamericano...mirrored in the demographic composition of El Salvador. According to Programa Salvaderaño de Investigación Sobre Desarrollo y Medio Ambiente (PRISMA...regarding the existence of a signifi cant linkage between environmental security and national security. The inclusion of environmental security

  19. Building and Maintaining an Effective Campus-Wide Coalition for Suicide Prevention

    Science.gov (United States)

    Kaslow, Nadine J.; Garcia-Williams, Amanda; Moffitt, Lauren; McLeod, Mark; Zesiger, Heather; Ammirati, Rachel; Berg, John P.; McIntosh, Belinda J.

    2012-01-01

    Preventing suicide is a commonly shared priority among college administrators, faculty, staff, students, and family members. Coalitions are popular health promotion mechanisms for solving community-wide problems and are valuable in campus-wide suicide prevention efforts. This article provides an example of an effective suicide prevention…

  20. Current Technologies and its Trends of Machine Vision in the Field of Security and Disaster Prevention

    Science.gov (United States)

    Hashimoto, Manabu; Fujino, Yozo

    Image sensing technologies are expected as useful and effective way to suppress damages by criminals and disasters in highly safe and relieved society. In this paper, we describe current important subjects, required functions, technical trends, and a couple of real examples of developed system. As for the video surveillance, recognition of human trajectory and human behavior using image processing techniques are introduced with real examples about the violence detection for elevators. In the field of facility monitoring technologies as civil engineering, useful machine vision applications such as automatic detection of concrete cracks on walls of a building or recognition of crowded people on bridge for effective guidance in emergency are shown.

  1. Security of material: Preventing criminal activities involving nuclear and other radioactive materials

    International Nuclear Information System (INIS)

    Nilsson, A.

    2001-01-01

    The report emphasizes the need for national regulatory authorities to include in the regulatory systems, measures to control and protect nuclear materials from being used in illegal activities, as well as aspects of relevance for detecting and responding to illegal activities involving nuclear and other radioactive materials. The report will give an overview of the international treaties and agreements that underpin the establishment of a regulatory structure necessary for States to meet their non-proliferation policy and undertakings. Ongoing work to strengthen the protection of nuclear material and to detect and respond to illegal activities involving nuclear and other radioactive material will be included. The focus of the paper is on the need for standards and national regulation in the nuclear security area. (author)

  2. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    Energy Technology Data Exchange (ETDEWEB)

    Guerin, Emmanuel; Spencer, Thomas

    2011-10-11

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  3. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    International Nuclear Information System (INIS)

    Guerin, Emmanuel; Spencer, Thomas

    2011-01-01

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  4. From 'what' to 'how' -- capacity building in health promotion for HIV/AIDS prevention in the Solomon Islands.

    Science.gov (United States)

    McPhail-Bell, Karen; MacLaren, David; Isihanua, Angela; MacLaren, Michelle

    2007-09-01

    This paper describes a capacity building process undertaken within the HIV/AIDS prevention project of the Adventist Development and Relief Agency (ADRA) in the Solomon Islands. ADRA HIV/AIDS has recently reoriented its project structure, moving beyond its awareness raising approach to incorporate health promotion frameworks, theories, strategies and assumptions. These have been used to inform project practice in project planning, delivery and evaluation. This paper shares what has worked and not worked in the capacity building process, including a project evaluation of the initial HIV/AIDS awareness raising project and the application of a number of capacity building strategies, including utilising a volunteer Australian Youth Ambassador for Development (AYAD) funded by the Australian Agency for International Development (AusAID). Existing and new projects are outlined. The underlying theme is that any capacity building exercise must include structural support (e.g. management, national frameworks) to ensure the incorporation of new initiatives and approaches. With time this enables ownership by counterparts and external partnerships to develop. The presence of an AYAD volunteer has been an effective strategy to achieve this. Reflections from the evaluators, the AYAD volunteer and the HIV/AIDS team are included.

  5. Preventing chronic lung disease in an aging society by improved building ventilation : An economic assessment

    NARCIS (Netherlands)

    Franchimon, F.; Ament, A.H.J.A.; Pernot, C.E.E.; Knies, J.; Bronswijk, van J.E.M.H.

    2008-01-01

    Leading edge ventilation systems in buildings might slow down the degradation of quality of life in a population. We therefore performed an economic assessment to determine the Incremental Cost-Effectiveness Ratio (the amount of money needed to produce one healthy life year) for a full-scale

  6. Prevention of legionella in dwellings and buildings; Legionellapreventie in woningen en gebouwen

    Energy Technology Data Exchange (ETDEWEB)

    Van Mil, R.; Van der Kooij, D.; Kolner, W.P.P.; Wessels, R.; Offinga, M.; Scheffer, W.; Van Wolferen, H.; Doldersum, R.; Van der Lugt, W.; Bertrand, F.; Nijlant, E.

    2011-04-15

    In 10 articles and 1 interview attention is paid to several aspects of Legionella in water heaters, mains, and sanitary installations in dwellings and other buildings. [Dutch] In 10 artikelen en 1 interview wordt aandacht besteed aan verschillende aspecten met betrekking tot legionella in sanitaire installaties, waterverwarmingsinstallaties, en waterleidingen in woningen en andere gebouwen.

  7. Cooperation in Global Environmental Governance for Building A Conflict Prevention Architecture in Natural Resources Torno

    OpenAIRE

    Padilha, Norma Sueli; Cardoso, Simone Alves

    2016-01-01

    This article aims to demonstrate the effectiveness and the importance of cooperation in global environmental governance arrangements to prevent conflicts and promote pea- cebuilding through analysis the partnership between the European Union (EU) and the United Nations (UN) around the natural resources and conflict prevention. The problem to be addressed and the challenge to overcome by the international community is the fra- gility of some countries in creating and maintaining institutions t...

  8. Proposal for an IT Security Standard for Preventing Tax Fraud in Cash Registers

    Science.gov (United States)

    Neuhaus, Mathias; Wolff, Jörg; Zisky, Norbert

    This paper describes a technology solution for preventing tax fraud in electronic cash registers (ECR) and point of sale (POS) systems. The solution is based on electronic signatures, and as a result, any alterations to protected data will be detected. The signed transaction data can be stored on various electronic memory devices. Technical provisions enable the estimation of transaction volumes, even after tampering or loss of data. In this way the solution presented here differs significantly from other fiscal solutions where a pattern of approvals for ECRs and permanent technical supervision of the market is necessary. This paper is focused on the architecture, the protocols and the usability of the proposed system.

  9. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  10. An intelligent and secure system for predicting and preventing Zika virus outbreak using Fog computing

    Science.gov (United States)

    Sareen, Sanjay; Gupta, Sunil Kumar; Sood, Sandeep K.

    2017-10-01

    Zika virus is a mosquito-borne disease that spreads very quickly in different parts of the world. In this article, we proposed a system to prevent and control the spread of Zika virus disease using integration of Fog computing, cloud computing, mobile phones and the Internet of things (IoT)-based sensor devices. Fog computing is used as an intermediary layer between the cloud and end users to reduce the latency time and extra communication cost that is usually found high in cloud-based systems. A fuzzy k-nearest neighbour is used to diagnose the possibly infected users, and Google map web service is used to provide the geographic positioning system (GPS)-based risk assessment to prevent the outbreak. It is used to represent each Zika virus (ZikaV)-infected user, mosquito-dense sites and breeding sites on the Google map that help the government healthcare authorities to control such risk-prone areas effectively and efficiently. The proposed system is deployed on Amazon EC2 cloud to evaluate its performance and accuracy using data set for 2 million users. Our system provides high accuracy of 94.5% for initial diagnosis of different users according to their symptoms and appropriate GPS-based risk assessment.

  11. [Surveillance groups and occupational phisicians for prevention and security in work environment: legal aspects].

    Science.gov (United States)

    Aceto, A

    2006-01-01

    Italian jurisdiction, since the setting up of the Republic in 1948, has experienced a real and proper Copernican revolution, not only in the field of prevention of accidents and safety at work, which has meant that at the centre of the system there is no longer a State-finality but the individual person, in the form of inviolable rights that the Democratic Republic-vehicle recognises and guarantees in every place, including all places of occupation. To this end the entrepreneur/employer has become the guarantor of the health of his employees through a complex series of laws and regulations that imposes the adoption of safety measures on an individual, general and organizational level in the company. This guarantee has been reinforced by bringing in penalties for all those evasions or violations of these obligations of the entrepreneur/employer. The centralizing of the culture of prevention has meant that all the controls converge on the judicial police, with the head of the surveillance bodies having the status of officer of the judicial police, and with the adoption of regulations that follow the code of criminal procedures, which, while being binding for the same surveillance bodies is also a guarantee in respecting the right to be defended of the entrepreneur/employer.

  12. Building a peaceful society: origins, prevention, and reconciliation after genocide and other group violence.

    Science.gov (United States)

    Staub, Ervin

    2013-10-01

    The 20th century was a century of genocide and other great violence between groups within societies. Already at the beginning of the 21st century, there have been mass killings, civil wars, violent conflict, and terrorism. This article summarizes influences that tend to lead to intense group violence. It then considers prevention, stressing early prevention--and reconciliation as an aspect of prevention--and focusing on central principles and practices. The principles include developing positive orientations to previously devalued groups; healing from past victimization and promoting altruism born of suffering; moderating respect for authority; creating constructive ideologies; promoting understanding of the origins of violence, its impact, and avenues to prevention; promoting truth, justice, and a shared history; and raising inclusively caring, morally courageous children. Practices related to all of these are also discussed. The article stresses the role of progressive change, that is, of psychological, behavioral, and social evolution, in both extreme violence and positive relations between groups; the role of passive bystanders in the unfolding of violence; and the role of active bystandership in the prevention of violence, in the promotion of reconciliation, and in the development of harmonious societies. It emphasizes psychological processes but notes the importance of creating societal institutions. The author cites findings from both laboratory research and case studies, reviews interventions and their evaluation in Rwanda, and points to the need for further research. PsycINFO Database Record (c) 2013 APA, all rights reserved

  13. [Research of preferences and security management of tourists in Poyang Lake based on schistosomiasis prevention].

    Science.gov (United States)

    Feng, Shu-hua

    2015-04-01

    To discuss the prevention of schistosomiasis in tourism of lake region. The seasonal distribution of tourism activities and spatial distribution of scenic spots, as well as the coupling between space and temporal of Oncomelania snail distribution and the transmission time of schistosomiasis in Poyang Lake region were analyzed. The travel preference of schistosomiasis susceptible population was surveyed by questionnaires and interviews. There were couplings of space and temporal between tourism activities in Poyang Lake region and transmission time of schistosomiasis as well as space distribution of snails, respectively. The most popular tourism items were Shuishangrenjia (overwater household) and fishing folk culture with property of participation and experience. The suggestion is to establish health records of tourists, carry out health education of schistosomiasis, and enhance the management of tourism and activities of tourists.

  14. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  15. Alzheimer's Prevention Education: If We Build It, Will They Come? www.AlzU.org.

    Science.gov (United States)

    Isaacson, R S; Haynes, N; Seifan, A; Larsen, D; Christiansen, S; Berger, J C; Safdieh, J E; Lunde, A M; Luo, A; Kramps, M; McInnis, M; Ochner, C N

    2014-01-01

    Internet-based educational interventions may be useful for impacting knowledge and behavioral change. However, in AD prevention, little data exists about which educational tools work best in terms of learning and interest in participating in clinical trials. Primary: Assess effectiveness of interactive webinars vs. written blog-posts on AD prevention learning. Secondary: Evaluate the effect of AD prevention education on interest in participating in clinical trials; Assess usability of, and user perceptions about, an online AD education research platform; Classify target populations (demographics, learning needs, interests). Observational. Online. Men/Women, aged 25+, recruited via facebook.com. Alzheimer's Universe (www.AlzU.org) education research platform. Pre/post-test performance, self-reported Likert-scale ratings, completion rates. Over two-weeks, 4268 visits were generated. 503 signed-up for a user account (11.8% join rate), 196 participated in the lessons (39.0%) and 100 completed all beta-testing steps (19.9%). Users randomized to webinar instruction about AD prevention and the stages of AD demonstrated significant increases (p=0.01) in pre vs. post-testing scores compared to blog-post intervention. Upon joining, 42% were interested in participating in a clinical trial in AD prevention. After completing all beta-test activities, interest increased to 86%. Users were primarily women and the largest category was children of AD patients. 66.3% joined to learn more about AD prevention, 65.3% to learn more about AD treatment. Webinar-based education led to significant improvements in learning about AD prevention and the stages of AD. AlzU.org participation more than doubled interest in AD prevention clinical trial participation. Subjects were quickly and cost-effectively recruited, and highly satisfied with the AD education research platform. Based on these data, we will further refine AlzU.org prior to public launch and aim to study the effectiveness of 25

  16. Strategies to Build Readiness in Community Mobilization Efforts for Implementation in a Multi-Year Teen Pregnancy Prevention Initiative.

    Science.gov (United States)

    Bhuiya, Nazmim; House, L Duane; Desmarais, Jeffrey; Fletcher, Erica; Conlin, Maeve; Perez-McAdoo, Sarah; Waggett, Jessica; Tendulkar, Shalini A

    2017-03-01

    This paper describes an assessment of community readiness to implement a community-wide teen pregnancy prevention initiative, Youth First, and presents strategies used to enhance this readiness as informed by the assessment. Twenty-five community stakeholder interviews were conducted to assess four domains of readiness: (1) attitudes, perception, and knowledge of teen pregnancy; (2) perceived level of readiness; (3) resources, existing and current efforts; and (4) leadership. Interview transcripts were coded and analyzed to identify key themes. Stakeholders acknowledged teen pregnancy as an issue but lacked contextual information. They also perceived the community as ready to address the issue and recognized some organizations already championing efforts. However, many key players were not involved, and ongoing data collection to assess teen pregnancy and prevention efforts was limited. Though many stakeholders were ready to engage in teen pregnancy prevention efforts, they required additional information and training to appropriately address the issue. In response to the assessment findings, several strategies were applied to address readiness and build Youth First partners' capacity to implement the community-wide initiative. Thus, to successfully implement community-wide prevention efforts, it is valuable to assess the level of community readiness to address health issues. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  17. The Enough Abuse Campaign: Building the Movement to Prevent Child Sexual Abuse in Massachusetts

    Science.gov (United States)

    Schober, Daniel J.; Fawcett, Stephen B.; Bernier, Jetta

    2012-01-01

    This case study describes the Enough Abuse Campaign, a multidisciplinary, statewide effort to prevent child sexual abuse in Massachusetts. The study uses the Institute of Medicine's Framework for Collaborative Community Action on Health to provide a systematic description of the campaign's process of implementation, which includes: (a) developing…

  18. Building a learning culture and prevention of error - to near miss or not.

    Science.gov (United States)

    Arnold, Anthony

    2017-09-01

    This editorial provides an insight into learning and prevention of error through near miss event reporting. © 2017 The Author. Journal of Medical Radiation Sciences published by John Wiley & Sons Australia, Ltd on behalf of Australian Society of Medical Imaging and Radiation Therapy and New Zealand Institute of Medical Radiation Technology.

  19. Building upon Bystander Intervention: A Multi-Component Prevention Programming Approach for University Sorority Members

    Science.gov (United States)

    Steward, Jennifer M.

    2017-01-01

    Sexual violence on college campuses is a pervasive problem with the potential for extensive physical and psychological health consequences. Institutions have begun implementing prevention programs; however, more research is needed to understand whether these programs are effective. Bystander intervention programs have increased in popularity…

  20. Building a Foundation against Violence: Impact of a School-Based Prevention Program on Elementary Students

    Science.gov (United States)

    Hall, Bruce W.; Bacon, Tina P.

    2005-01-01

    This study examined the effectiveness of the Too Good for Violence Prevention Program (TGFV), a multifaceted interactive intervention. Grounded in Bandura's Social Learning Theory, the TGFV curricula focus on developing personal and interpersonal skills to solve conflict non-violently and resist social influences that lead to violence.…

  1. [Preventive effects of sound insulation windows on the indoor noise levels in a street residential building in Beijing].

    Science.gov (United States)

    Guo, Bin; Huang, Jing; Guo, Xin-biao

    2015-06-18

    To evaluate the preventive effects of sound insulation windows on traffic noise. Indoor noise levels of the residential rooms (on both the North 4th ring road side and the campus side) with closed sound insulation windows were measured using the sound level meter, and comparisons with the simultaneously measured outdoor noise levels were made. In addition, differences of indoor noise levels between rooms with closed sound insulation windows and open sound insulation windows were also compared. The average outdoor noise levels of the North 4th ring road was higher than 70 dB(A), which exceeded the limitation stated in the "Environmental Quality Standard for Noise" (GB 3096-2008) in our country. However, with the sound insulation windows closed, the indoor noise levels reduced significantly to the level under 35 dB(A) (Pwindows had significant influence on the indoor noise levels (Pwindow, when the sound insulation windows were closed, the indoor noise levels reduced 18.8 dB(A) and 8.3 dB(A) in residential rooms facing North 4th ring road side and campus side, respectively. The results indicated that installation of insulation windows had significant noise reduction effects on street residential buildings especially on the rooms facing major traffic roads. Installation of the sound insulation windows has significant preventive effects on indoor noise in the street residential building.

  2. [Research on competency building standards of institutions of schistosomiasis prevention and control in Hubei Province I Investigation of institution management].

    Science.gov (United States)

    Liu, Han-cheng; Zhong, Chen-hui; Liao, Si-qi; He, Hui

    2014-08-01

    To investigate the current situation of management of institutions of schistosomiasis prevention and control in Hubei Province, so as to explore the probable competency building standards for these institutions at the county and township levels. By using a combination of quantitative and qualitative methods, the institutions of schistosomiasis prevention and control at county and township levels were investigated for the institutional setup, staffing and fulfillment functions since the reform of 2004. Among 63 schistosomiasis endemic counties (cities, districts) of Hubei Province, there were 26 independent schistosomiasis control institutions (41.27%), there were 24 institutions which were incorporated into CDC (38.10%), and there were no institutions in 13 counties (20.63%). Among 518 endemic towns, there were 299 institutions (57.72%). The total staffing size were 1 932, but there were 1 586 (82.09%) people actually working in the post, and therefore there were 346 (17.91%) empty positions. The average rates of carrying out the six functions were 91.48%-71.19%, but only 19.23% of the institutions participated in the comprehensive schistosomiasis control management project and its effect assessment. According to the management model for schistosomiasis control institutions under the current institutional mechanisms, we need a rigorous industry standard to constrain, guide and standardize the management and capacity-building of the institutions in different historical periods.

  3. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union.

    Science.gov (United States)

    Bartholomew, James C; Pearson, Andrew D; Stenseth, Nils Chr; LeDuc, James W; Hirschberg, David L; Colwell, Rita R

    2015-01-01

    Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world's great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to

  4. International conference on security of material. Measures to prevent, intercept and respond to illicit uses of nuclear material and radioactive sources. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-10-01

    The papers cover the subjects relating to the trafficking of highly enriched nuclear materials, less radioactive, radioactive materials, radiations sources, prevention of crime, capabilities of preventing smuggling, radiation detection devices that are or should be applied on borders. Different aspects of physical protection, security and safety of nuclear materials in a number of countries are discussed. A number of papers are devoted to detectors, and measuring methods

  5. International conference on security of material. Measures to prevent, intercept and respond to illicit uses of nuclear material and radioactive sources. Book of extended synopses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-10-01

    The papers cover the subjects relating to the trafficking of highly enriched nuclear materials, less radioactive, radioactive materials, radiations sources, prevention of crime, capabilities of preventing smuggling, radiation detection devices that are or should be applied on borders. Different aspects of physical protection, security and safety of nuclear materials in a number of countries are discussed. A number of papers are devoted to detectors, and measuring methods.

  6. PREVENTIVE MEASURES - EXCEPTION TO THE PRINCIPLE OF THE RIGHT TO LIBERTY AND SECURITY

    Directory of Open Access Journals (Sweden)

    Marin-Alin DĂNILĂ

    2016-05-01

    Full Text Available Considering the specific obligations arising from the exercise of criminal action and civil action in criminal proceedings and taking into account the need to ensure a better conduct of activities that are undertaken in solving criminal cases, it sometimes appears necessary, taking certain procedural measures. Procedural measures were defined [1] as institutions available for criminal procedural law and criminal judicial bodies consisting of privations or certain constraints, real or personal, of the conditions and circumstances under which the criminal proceedings are being realized. By the function pursued by the legislature, these measures work as a legal means of prevention or suppression of circumstances or situations likely to jeopardize the effectiveness of the criminal proceedings through the obstacles, difficulties and confusion which they can produce [2]. Procedural measures arise as opportunities, but not being specific to any criminal case, judicial bodies take measures according to the specific circumstances of each criminal case. From this derives the adjacent character of the criminal procedural measures to the main job [3].

  7. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  8. Strengthening the European Union Climate and Energy Package. To build a low carbon, competitive and energy secure European Union

    International Nuclear Information System (INIS)

    Guerin, E.; Spencer, Th.

    2011-01-01

    As the EU's climate and energy goals defined in its Climate and Energy Package (CEP) are to protect the climate, to protect EU economic competitiveness, and to protect EU energy security, the authors first define these notions (time consistency, competitiveness, energy security) and stress the importance of strengthening the CEP, notably by fostering low carbon technology investment and low carbon products and services innovation. They discuss several policy recommendations for the development of a low carbon, competitive and energy secure EU. These recommendations are notably based on the strengthening of current instruments and on the implementation of new tools to reach the 20% energy efficiency target, on an increase stringency and predictability of the EU ETS, and on the use of direct public financial support to facilitate the transition towards a EU low carbon economy

  9. Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity

    DEFF Research Database (Denmark)

    Asharov, Gilad; Orlandi, Claudio

    2012-01-01

    We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...... constant probability ε. The idea behind the model is that the fear of being caught cheating will be enough of a deterrent to prevent any cheating attempt. However, in the basic covert security model, the honest parties are not able to persuade any third party (say, a judge) that a cheating occurred. We...... propose (and formally define) an extension of the model where, when an honest party detects cheating, it also receives a certificate that can be published and used to persuade other parties, without revealing any information about the honest party’s input. In addition, malicious parties cannot create fake...

  10. Building a strategy for obesity prevention one piece at a time: the case of sugar-sweetened beverage taxation.

    Science.gov (United States)

    Buhler, Susan; Raine, Kim D; Arango, Manuel; Pellerin, Suzie; Neary, Neil E

    2013-04-01

    Obesity is a major public health issue in Canada that is reaching historically high levels in spite of efforts, targeted primarily at individual behaviour, to promote changes in diet and physical activity. Urgency for change at the population level compels moving "upstream" toward multilevel, societal approaches for obesity prevention. Public health researchers, advocates and policy makers are increasingly recognizing the current food environment, including availability, pricing, and marketing of foods and beverages, promotes overconsumption of unhealthy food and beverage choices and have identified the food environment as a point for intervention for obesity prevention. In April 2011, a consensus conference with invited experts from research, policy and practice fields was held. The conference aimed to build consensus around policy levers to address environmental determinants of obesity, including next logical steps toward further policy action. Using economic policies, such as taxation of sugar-sweetened beverages (SSB), was discussed as one opportunity to promote healthy eating. This article reports on the consensus discussion that led to recommendations to tax sugar-sweetened beverages as one step in a multipronged comprehensive approach to obesity prevention. This recommendation is based on a synthesis of available evidence, including evidence regarding political feasibility, and potential impacts of a tax. In addition, we present additional primary research using current SSB consumption data to model the economic and behavioural impact of such a tax in Canada. Copyright © 2013 Canadian Diabetes Association. Published by Elsevier Inc. All rights reserved.

  11. Building Prevention to Protect: The Inter-American Human Rights System

    Directory of Open Access Journals (Sweden)

    Carlos Portales

    2017-03-01

    Full Text Available The article explores the way that the Inter-American human rights system assumes the “responsibility to protect” in the context of serious violations of human rights that can be characterized as war crimes, crimes against humanity, genocide, and ethnic cleansing. The essay describes  how the Inter-American Commission on Human Rights and the Inter-American Court of Human Rights have responded to such situations by using the ample powers granted to them by the OAS member states. The authors consider that these organs have been some of the most effective tools with which this region has confronted such situations by seeking system has contributed to building democratic regimes in the majority of the countries of the hemisphere. This has been crucial to avoiding serious violations of human rights such as those mentioned above, which would have required urgent international intervention to overcome.

  12. Prevention of upheating stacked buildings; Voorkommen van opwarming in gestapelde bouw

    Energy Technology Data Exchange (ETDEWEB)

    Wessels, R. [biq stadsontwerp, Rotterdam (Netherlands); Nuijten, O. [ISSO, Rotterdam (Netherlands)

    2011-09-15

    Many installers know perfectly which places in residential buildings are 'hot spots'. These areas are warmer than the rest of the house and therefore potentially dangerous. The local heating creates the ideal conditions for Legionella growth in nearby water pipes. Designers and constructors should take care to avoid these situations. [Dutch] Veel installateurs weten de plekken feilloos aan te wijzen: de meterkast, de opstelplaats van de cv-ketel, de hal waar stadsverwarming het huis binnenkomt, de koof achter de trap, de betonnen vloer met een bundel cv- of vloerverwarmingsleidingen. Het zijn stuk voor stuk 'hot spots': plekken die duidelijk warmer zijn dan de rest van de woning en daardoor gevaar kunnen opleveren. Deze vorm van lokale opwarming creeert de ideale conditie voor legionellagroei in nabij gelegen waterleidingen. Het vereist zorg van meerdere disciplines in de ontwerp- en bouwfase om deze situaties te vermijden.

  13. Building capacity for HIV/AIDS prevention among Asian Pacific Islander organizations: the experience of a culturally appropriate capacity-building program in Southern California.

    Science.gov (United States)

    Takahashi, Lois M; Candelario, Jury; Young, Tim; Mediano, Elizabeth

    2007-01-01

    This article has two goals: (1) to outline a conceptual model for culturally appropriate HIV prevention capacity building; (2) to present the experiences from a 3-year program provided by Asian Pacific AIDS Intervention Team to Asian Pacific Islander (API) organizations in southern California. The participating organizations were of two types: lesbian, gay, bisexual, transgender, and questioning (LGBTQ) social organizations and social service agencies not targeting LGBTQ. These organizations were selected for participation because of their commitment to HIV/AIDS issues in API communities. An organizational survey and staff observations were used to explore changes in capacity. The organizations were mostly small, targeted diverse populations, served a large geographic area (southern California as a region), and were knowledgeable about HIV. Organizations became more viable (more capacity in human resources, financial, external relations, and strategic management), but also more unstable (large growth in paid staff and board members), and showed more capacity in HIV knowledge environments (especially less stigma and more sensitivity to diverse populations). The results suggest that capacity can expand over a short period of time, but as capacity increases, organizational viability/stability and HIV knowledge environments change, meaning that different types of technical assistance would be needed for sustainability.

  14. Sustainable Development--Education, Business and Management--Architecture and Building Construction--Agriculture and Food Security

    Science.gov (United States)

    Ghenai, Chaouki, Ed.

    2012-01-01

    Securing the future of the human race will require an improved understanding of the environment as well as of technological solutions, mindsets and behaviors in line with modes of development that the ecosphere of our planet can support. Some experts see the only solution in a global deflation of the currently unsustainable exploitation of…

  15. Building communication strategy on health prevention through the human-centered design

    Directory of Open Access Journals (Sweden)

    Karine de Mello Freire

    2016-03-01

    Full Text Available It has been identified a latent need for developing efficient communication strategies for prevention of diseases and also, design as a potential agent to create communications artifacts that are able to promote self-care. In order to analyze a design process that develops this kind of artifact, an action research in IAPI Health Center in Porto Alegre was done. The action’s goal was to design a strategy to promote self-care to prevent cervical cancer. The process was conducted from the human centered design approach - HCD, which seeks to create solutions desirable for people and feasible for organizations from three main phases: a Hear, in which inspirations are originated from stories collected from people; b Create, which aims to translate these knowledge into prototypes; and, c Deliver, where the prototypes are tested and developed with users. Communication strategies were supported by design studies about visual-verbal rhetoric. As results, this design approach has shown adequate to create communication strategies targeted at self-care behaviors, aiming to empower users to change their behavior.

  16. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  17. Health Promotion for Adolescent Childhood Leukemia Survivors: Building on Prevention Science and eHealth

    Science.gov (United States)

    Elliot, Diane L.; Lindemulder, Susan J.; Goldberg, Linn; Stadler, Diane D.; Smith, Jennifer

    2014-01-01

    Teenage survivors of childhood acute lymphoblastic leukemia (ALL) have increased morbidity likely due to their prior multicomponent treatment. Habits established in adolescence can impact individuals’ subsequent adult behaviors. Accordingly, healthy lifestyles, avoiding harmful actions, and appropriate disease surveillance are of heightened importance among teenage survivors. We review the findings from prevention science and their relevance to heath promotion. The capabilities and current uses of eHealth components including e-learning, serious video games, exergaming, behavior tracking, individual messaging, and social networking are briefly presented. The health promotion needs of adolescent survivors are aligned with those eHealth aspects to propose a new paradigm to enhance the wellbeing of adolescent ALL survivors. PMID:23109253

  18. Process for prevention of water build-up in cryogenic distillation column

    International Nuclear Information System (INIS)

    Hopewell, R.B.

    1988-01-01

    In a process for the separation of a hydrocarbon and acid gas containing feed stream in a cryogenic distillation column, a zone of the column which is operated at a temperature of 60 0 F or less, wherein free water accumulates or forms hydrates in the column from water vapor in the feed stream during the cryogenic process, and which process comprises separating the feed stream in the column into an overhead stream and a bottom stream, this patent describes the improvement which comprises: withdrawing a hydrocarbon and acid gas vapor stream which stream is enriched in water vapor with respect to the feed stream, thereby preventing the excess accumulation of free water or the formation of hydrates in the cryogenic column

  19. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  20. Building an Amphibious Capability for New Zealand in the 21st Century: Essential in an Uncertain Security Environment

    Science.gov (United States)

    2013-04-04

    Solomon Islands. Fiji has had five military coups in the past twenty-seven years21. In addition, natural disasters (predominantly cyclones) necessitate...to assist with development and relief packages within the Pacific Islands, particularly emergency response to natural disasters . This is where the...secured Apia4. From this genesis, New Zealand and the NZDF have continued to conduct military operations in the South Pacific; from disaster relief

  1. An Approach to Building Capacity for Nuclear Security and Safeguards in Thailand and the Southeast Asian Region

    International Nuclear Information System (INIS)

    Pengvanich, P.; Chanyotha, S.; Nilsuwankosit, S.

    2016-01-01

    Full text: A master’s degree programme in nuclear security and safeguards has been developed and offered at Chulalongkorn University for the first time in 2013 in order to develop necessary human resources in the fields of nuclear security and safeguards who can continue to work, conduct research, or serve as educators in these fields in Thailand and the Southeast Asian region. The first group of 20 students joined the programme in 2013 and recently graduated. The programme was one-of-its-kind, as there have not been many similar specialized programmes in nuclear security and safeguards in the past. In this paper, challenges and lessons learned throughout the programme are reported. Experience from the pilot programme will be used to improve the next round of the programme which is expected to start in 2017. With this program, more nuclear knowledge can be shared and maintained among the Association of South East Asian Nations (ASEAN) countries to ensure the peaceful utilization of nuclear technology in the region. (author

  2. Biosafety and Biosecurity: A Relative Risk-Based Framework for Safer, More Secure, and Sustainable Laboratory Capacity Building

    OpenAIRE

    Dickmann, Petra; Sheeley, Heather; Lightfoot, Nigel

    2015-01-01

    Background Laboratory capacity building is characterized by a paradox between endemicity and resources: countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity) and capacities (laboratories, trained staff, adequate regulations). Meanwhile, countries with low endemicity of pathogenic agents often have high-containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high ...

  3. Biosafety and Biosecurity: A relative risk-based framework for safer, more secure and sustainable laboratory capacity building

    OpenAIRE

    Petra eDickmann; Heather eSheeley; Nigel Francis Lightfoot; Nigel Francis Lightfoot

    2015-01-01

    Background: Laboratory capacity building is characterized by a paradox between endemicity and resources: Countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity) and capacities (laboratories, trained staff, adequate regulations). Meanwhile, countries with low endemicity of pathogenic agents often have high containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high bi...

  4. Infection prevention and control training and capacity building during the Ebola epidemic in Guinea.

    Directory of Open Access Journals (Sweden)

    Heidi M Soeters

    Full Text Available During the 2014-2016 Ebola epidemic in West Africa, a key epidemiological feature was disease transmission within healthcare facilities, indicating a need for infection prevention and control (IPC training and support.IPC training was provided to frontline healthcare workers (HCW in healthcare facilities that were not Ebola treatment units, as well as to IPC trainers and IPC supervisors placed in healthcare facilities. Trainings included both didactic and hands-on components, and were assessed using pre-tests, post-tests and practical evaluations. We calculated median percent increase in knowledge.From October-December 2014, 20 IPC courses trained 1,625 Guineans: 1,521 HCW, 55 IPC trainers, and 49 IPC supervisors. Median test scores increased 40% (interquartile range [IQR]: 19-86% among HCW, 15% (IQR: 8-33% among IPC trainers, and 21% (IQR: 15-30% among IPC supervisors (all P<0.0001 to post-test scores of 83%, 93%, and 93%, respectively.IPC training resulted in clear improvements in knowledge and was feasible in a public health emergency setting. This method of IPC training addressed a high demand among HCW. Valuable lessons were learned to facilitate expansion of IPC training to other prefectures; this model may be considered when responding to other large outbreaks.

  5. Infection prevention and control training and capacity building during the Ebola epidemic in Guinea

    Science.gov (United States)

    Koivogui, Lamine; de Beer, Lindsey; Johnson, Candice Y.; Diaby, Dianka; Ouedraogo, Abdoulaye; Touré, Fatoumata; Bangoura, Fodé Ousmane; Chang, Michelle A.; Chea, Nora; Dotson, Ellen M.; Finlay, Alyssa; Fitter, David; Hamel, Mary J.; Hazim, Carmen; Larzelere, Maribeth; Park, Benjamin J.; Rowe, Alexander K.; Thompson-Paul, Angela M.; Twyman, Anthony; Barry, Moumié; Ntaw, Godlove; Diallo, Alpha Oumar

    2018-01-01

    Background During the 2014–2016 Ebola epidemic in West Africa, a key epidemiological feature was disease transmission within healthcare facilities, indicating a need for infection prevention and control (IPC) training and support. Methods IPC training was provided to frontline healthcare workers (HCW) in healthcare facilities that were not Ebola treatment units, as well as to IPC trainers and IPC supervisors placed in healthcare facilities. Trainings included both didactic and hands-on components, and were assessed using pre-tests, post-tests and practical evaluations. We calculated median percent increase in knowledge. Results From October–December 2014, 20 IPC courses trained 1,625 Guineans: 1,521 HCW, 55 IPC trainers, and 49 IPC supervisors. Median test scores increased 40% (interquartile range [IQR]: 19–86%) among HCW, 15% (IQR: 8–33%) among IPC trainers, and 21% (IQR: 15–30%) among IPC supervisors (all P<0.0001) to post-test scores of 83%, 93%, and 93%, respectively. Conclusions IPC training resulted in clear improvements in knowledge and was feasible in a public health emergency setting. This method of IPC training addressed a high demand among HCW. Valuable lessons were learned to facilitate expansion of IPC training to other prefectures; this model may be considered when responding to other large outbreaks. PMID:29489885

  6. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report

    International Nuclear Information System (INIS)

    Tourneur, J.C.

    2009-01-01

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  7. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  8. Can fuel services supply be secured? Building trust in a multi-lateral approach to nuclear fuel cycles

    Energy Technology Data Exchange (ETDEWEB)

    Antoine, B. [Engineering Systems Division, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Room E40-261, Cambridge, MA 02139 (United States); Rodriguez-Vieitez, E. [Belfer Center for Science and International Affairs, Kennedy School of Government, Harvard University, One Brattle Sq., Room 503, Cambridge, MA 02138 (United States)

    2009-06-15

    Global climate change and concerns about energy supply security fuelling the nuclear desires of an increasing number of states, there is growing interest within the nonproliferation community to promote the establishment of an international system for the provision of nuclear fuel cycle services that would be 'equitable and accessible to all users of nuclear energy' (Rauf, 2008) while reducing proliferation risks. Although the idea was already voiced on the cradle of civilian use of nuclear energy (Baruch, 1946), the IAEA director's 2003 call for a group of international experts to examine the issue (ElBaradei, 2003) triggered renewed interest that resulted in up to twelve different proposals for multilateral nuclear fuel cycle arrangements (Rauf, 2008; Simpson, 2008). Nonproliferation experts have examined the conditions under which equitable and accessible access to enrichment, reprocessing and spent fuel disposal services can be granted to all users (Rauf, 2008; Braun 2006; Pellaud and al 2005). They suggested putting together multilateral nuclear approaches (MNA) that could consist in the establishment of mechanisms to assure fuel cycle services, or the shared ownership by recipient and host countries of fuel services facilities through either the creation of new multilateral centers or the conversion of existing national facilities into multinational enterprises. While countries that possess nuclear fuel facilities would benefit from the increased global security and strengthened non-proliferation situation that would result from the establishment of these MNAs, they would also be baited into participating by possible attraction of foreign investments as well as the opportunity to export high value services (Rushkin, 2006). Yet, what incentives would there be for a recipient non-nuclear state to participate in an arrangement that would intrinsically strip it of its sovereign right to ensure its fuel supply security? In addition to the economic

  9. International Nuclear Security Situation And China’s Approach

    Institute of Scientific and Technical Information of China (English)

    Liu Chong

    2016-01-01

    Since 2010,the three Nuclear Security Summits have made a number of achievements,but the international nuclear security situation is still not relaxed.The rapid development of China’s domestic nuclear facilities and a large amount of nuclear and radioactive materials related to nuclear power,active international nuclear black market in China’s surrounding regions,rather serious domestic and international terrorist threats as well as the emerging technology development bring about new challenges to nuclear security.Facing the complicated and long-term nuclear security situation,China from the perspective of monitoring mechanism,laws and regulations system,technical capability-building and nuclear emergency preparedness,takes a series of effective measures to build the national nuclear security capacity,and strictly fulfills its international obligations,actively participates in upgrading the international nuclear non-proliferation regime and relevant international rules,and actively takes part in the Nuclear Security Summit process,strengthens bilateral cooperation on nuclear security with major countries especially the United States of America,and jointly organizes various training with International Atomic Energy Agency,which has made great contributions to upgrading the global nuclear security level.At the end of the Nuclear Security Summit process,China should continue to strengthen its domestic nuclear security capacity building,and promote the international community to treat the root causes and symptoms,adopt a comprehensive strategy,and work together,effectively prevent and dissolve the nuclear terrorist threats.

  10. Climate change, energy security, and risk-debating nuclear new build in Finland, France and the UK

    International Nuclear Information System (INIS)

    Teraevaeinen, Tuula; Lehtonen, Markku; Martiskainen, Mari

    2011-01-01

    Concerns about climate change and energy security have been major arguments used to justify the recent return of nuclear power as a serious electricity generation option in various parts of the world. This article examines the recent public discussion in Finland, France, and the UK - three countries currently in the process of constructing or planning new nuclear power stations. To place the public discussion on nuclear power within the relationship between policy discourses and contexts, the article addresses three interrelated themes: the justifications and discursive strategies employed by nuclear advocates and critics, the similarities and differences in debates between the three countries, and the interaction between the country-specific state orientations and the argumentation concerning nuclear power. Drawing from documentary analysis and semi-structured interviews, the article identifies and analyses key discursive strategies and their use in the context of the respective state orientations: 'technology-and-industry-know-best' in Finland, 'government-knows-best' in France, and 'markets-know-best' in the UK. The nuclear debates illustrate subtle ongoing transformations in these orientations, notably in the ways in which the relations between markets, the state, and civil society are portrayed in the nuclear debates. - Highlights: → Focus on argumentation on new nuclear power in Finland, France, and the UK. → Nuclear power is justified by climate change, energy security, and independence. → The credibility of discursive strategies varies across countries. → Country-specific state orientations shape the success of discursive strategies. → Discursive strategies contain normative claims about state-society relations.

  11. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    Science.gov (United States)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  12. International workshop on transparency technology for nonproliferation cooperation in the Asia Pacific. Applications of remote monitoring and secure communications for regional confidence building

    International Nuclear Information System (INIS)

    Betsill, J. David; Hashimoto, Yu

    2009-08-01

    The Japan Atomic Energy Agency (JAEA) sponsored an international workshop 20-22 February 2008 on 'Transparency Technology for Nonproliferation Cooperation in the Asia Pacific - Applications of Remote Monitoring and Secure Communications for Regional Confidence Building.' The Workshop focused on identifying appropriate roles and functions for Transparency in addressing nonproliferation concerns associated with the use of nuclear energy, particularly in the East Asia region. Participants from several East Asia countries included representatives from nuclear energy research institutions, Ministries, facility operators, and non-governmental organizations. Regional participation from countries currently developing their nuclear energy infrastructure was also encouraged. Several promising students from the University of Tokyo and the Tokyo Institute of Technology, representing the next generation of nuclear energy experts, also participated in the meeting and added significant value and fresh viewpoints. The participants agreed that transparency has many roles and definitions, and that its usefulness ranges for verification and compliance with the Nonproliferation Treaty (NPT) to building trust and confidence in the activities of the state and other regional nuclear energy stakeholders. In addition, they identified a need for further education among the professional community, public, operators, and regulators as a key factor in transparency effectiveness. Also, the education and cultivation of the next generation of nuclear energy experts was identified as crucial to the long-term success and acceptance of nuclear energy development. And finally, that the development, selection, and implementation of technology that is appropriate to the goals and participants of a transparency effort are unique to each situation and are key to the successful acceptance of cooperative transparency and regional confidence building. At the conclusion of the Workshop it was importantly

  13. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  14. Inter-organisational knowledge transfer: building and sustaining the sources of innovation in nuclear safety and security

    International Nuclear Information System (INIS)

    Staude, Fabio; Ramirez, Matias

    2013-01-01

    The current complexity of innovation processes has led to an understanding that the models of innovation have changed from linear model to a model characterised by multiple interactions and complex networks. Within this more multifaceted environment, has emerged a new set of actors, generally termed as intermediaries, performing a variety of tasks in the innovation process. The innovation literature has recognised various important supporting activities performed by intermediaries, by linking and facilitating the movement of information and knowledge between actors within an innovation system, in order to fill information gaps. Complementary, we make the assumption that the intermediary can assume a more central role in the innovation process, performing activities beyond to filling information gaps, since they intervene to create, prioritise, and articulate meaning to practices. Under this argument, this paper explores how intermediaries work in making innovation happen in the Brazilian nuclear safety and security area, demonstrating the influence of intermediary organisations in improving nuclear regulatory activities. We make sense of these processes by analyzing intermediary roles in the recent regulatory activities improvements, specifically those related to the practices involving radiation sources in medicine. Thus, through an empirical case study, this paper examines the issue of intermediation in a wide sense, including strategic activities preformed by intermediaries, associated with accessing, diffusing, coordinating and enabling knowledge activities. (author)

  15. A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack

    OpenAIRE

    Masudur Rahman; Wah Man Cheung

    2014-01-01

    Cloud computing has been considered as one of the crucial and emerging networking technology, which has been changed the architecture of computing in last few years. Despite the security concerns of protecting data or providing continuous service over cloud, many organisations are considering different types cloud services as potential solution for their business. We are researching on cloud computing security issues and potential cost effective solution for cloud service providers. In our fi...

  16. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.

    Science.gov (United States)

    Blanke, Sandra J; McGrady, Elizabeth

    2016-07-01

    Health care stakeholders are concerned about the growing risk of protecting sensitive patient health information from breaches. The Federal Emergency Management Agency (FEMA) has identified cyber attacks as an emerging concern, and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) have increased security requirements and are enforcing compliance through stiff financial penalties. The purpose of this study is to describe health care breaches of protected information, analyze the hazards and vulnerabilities of reported breach cases, and prescribe best practices of managing risk through security controls and countermeasures. Prescriptive findings were used to construct a checklist tool to assess and monitor common risks. This research uses a case methodology to describe specific examples of the 3 major types of cyber breach hazards: portable device, insider, and physical breaches. We utilize a risk management framework to prescribe preventative actions that organizations can take to assess, analyze, and mitigate these risks. The health care sector has the largest number of reported breaches, with 3 major types: portable device, insider, and physical breaches. Analysis of actual cases indicates security gaps requiring prescriptive fixes based on "best practices." Our research culminates in a 25-item checklist that organizations can use to assess existing practices and identify security gaps requiring improvement. © 2016 American Society for Healthcare Risk Management of the American Hospital Association.

  17. Prevention

    DEFF Research Database (Denmark)

    Halken, S; Høst, A

    2001-01-01

    , breastfeeding should be encouraged for 4-6 months. In high-risk infants a documented extensively hydrolysed formula is recommended if exclusive breastfeeding is not possible for the first 4 months of life. There is no evidence for preventive dietary intervention neither during pregnancy nor lactation...... populations. These theories remain to be documented in proper, controlled and prospective studies. Breastfeeding and the late introduction of solid foods (>4 months) is associated with a reduced risk of food allergy, atopic dermatitis, and recurrent wheezing and asthma in early childhood. In all infants....... Preventive dietary restrictions after the age of 4-6 months are not scientifically documented....

  18. Telecommunications Companies to Build Computer Network Security Policy Inquiry%电信企业计算机网络安全构建策略探究

    Institute of Scientific and Technical Information of China (English)

    张国平

    2013-01-01

    The rapid development of Internet technology, the exchange of information to businesses, such as business develop-ment to create good conditions, especially in China's telecommunications companies, Internet technology significantly improves the use of telecommunications services and enterprise management level, at the same time more computer network security prob-lems gradually, to China's telecom enterprises put forward higher requirements. This paper analyzes the status quo of China's tele-communications computer network, and the problems both from a technical and management countermeasures were put forward in order to build a secure telecommunications enterprise network system to provide a reference.%互联网技术迅速发展给各行各业的信息交流、业务开展等创造了良好的条件,尤其在我国电信企业中,互联网技术的运用显著提高了电信企业的服务与管理水平,与此同时更多的计算机网络安全问题逐渐显现,给我国的电信企业提出了更高要求。该文分析了我国电信计算机网络的现状,并对存在的问题从技术和管理两个方面提出了应对措施,以期为构建安全的电信企业网络系统提供参考。

  19. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union

    Directory of Open Access Journals (Sweden)

    James C Bartholomew

    2015-11-01

    Full Text Available Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world scientific capacity has not kept pace with the need, and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to solve the issues. The Republics Georgia, formerly part of the Soviet Union provides a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world’s great epidemics began. The U.S. Cooperative Threat Reduction (CTR Program together with the Georgian government, have worked diligently to improve the capabilities in this region to guard against the potential future risk from especially dangerous pathogens. This effort culminated in the construction of a modern containment laboratory, the Richard G. Lugar Center for Public Health Research in Tbilisi to house both especially dangerous pathogens as well as the research to be conducted on these agents. The need now is to utilize and sustain the investment made by CTR by establishing strong public and animal health science programs tailored to the needs of the region and the goals for which this investment was made. Here we provide the analysis and recommendations of an international panel of expert scientists to provide advice to the stakeholders on the scientific path for the future. The emphasis is on an implementation strategy for decision makers and

  20. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  1. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  2. The Minimum Cost of a Nutritious Diet Study: Building an evidence-base for the prevention of undernutrition in Afghanistan

    International Nuclear Information System (INIS)

    Qarizada, Ahmad Nawid

    2014-01-01

    Full text: Background: In Afghanistan, mortality rates are amongst the highest in the world. Mean life expectancy is 62 years, U5MR is 97 deaths per 1,000 live births, and the MMR is 327 deaths per 100,000 live births while 33% of the population is food insecure. Undernutrition is alarmingly high in children under-five with global acute malnutrition rates of 8.7%, stunting 60.5% and underweight 37.7% , , and 72% are iodine and iron deficient. As part of their prevention efforts, WFP and the MOPH carried out a Cost of Diet study (CoD) in Afghanistan in late-2012. Cost of Diet Study The CoD assesses a household’s food and nutrition security based on economic constraints in accessing their nutrient requirements, especially for the most vulnerable, such as children U2 years. Objectives: 1. How important is access to nutritious food to overcome undernutrition in different areas of Afghanistan? 2. Is a nutritious diet available and affordable to the local populations? Methodology: The CoD tool used linear optimization to generate following output from market surveys and secondary household data: • A diet and the corresponding food baskets meet all nutritional requirements of a typical family, including a child U2 years, and its costs. Any other diet would be more expensive and/or would not meet their nutritional requirements. The tool calculated minimum cost of nutritious diet (MCNUT) in four livelihood zones (LHZ) of Afghanistan. Results: The MCNUT is the baseline nutritious diet. When compared to household income, it shows the number of households who cannot afford to meet their nutrient needs. The MCNUT calculates cheapest combination of food items and quantities to ensure all energy and nutrient requirements are met. It is theoretical and sometimes unrealistic. The Locally Adapted, Cost Optimised Diet (LACON), obtained using questionnaires and focus group discussions, provides a more realistic diet based on dietary preferences. Findings showed that approximately

  3. Strategic Prevention Framework State Incentive Grant Progress Report: Building a Sustainable Substance Abuse Prevention System, State of Hawai'i, 2006-2010

    Science.gov (United States)

    Yuan, S.; Lai, M.C.; Heusel, K.

    2011-01-01

    In 2006, the Hawai'i State Department of Health (DOH) received the Strategic Prevention Framework State Incentive Grant (SPF-SIG) from the Substance Abuse and Mental Health Services Administration (SAMHSA) to establish a comprehensive, coordinated, and sustainable substance abuse prevention infrastructure in Hawai'i. The SPF-SIG Project is funded…

  4. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  5. EU Contribution to Global CBRN Security

    OpenAIRE

    GOULART DE MEDEIROS MARGARIDA; ABOUSAHL SAID; MAIER EDDIE; SIMONART TRISTAN; DUPRE BRUNO

    2016-01-01

    The EU promotes a culture of CBRN safety and security within the EU and internationally. Accordingly, the Instrument Contributing to Stability and Peace (IcSP) contributes to international efforts to mitigate CBRN risks, whether of natural (e.g. pandemics, volcanic eruptions), accidental (Fukushima) or criminal (trafficking, terrorism) origin, following a consistent ‘all hazards’ approach. The aim is twofold: to prevent CBRN incidents and to build partner countries' capacities for emergency r...

  6. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  7. Regional scenario building as a tool to support vulnerability assessment of food & water security and livelihood conditions under varying natural resources managements

    Science.gov (United States)

    Reinhardt, Julia; Liersch, Stefan; Dickens, Chris; Kabaseke, Clovis; Mulugeta Lemenih, Kassaye; Sghaier, Mongi; Hattermann, Fred

    2013-04-01

    Participatory regional scenario building was carried out with stakeholders and local researchers in four meso-scale case studies (CS) in Africa. In all CS the improvement of food and / or water security and livelihood conditions was identified as the focal issue. A major concern was to analyze the impacts of different plausible future developments on these issues. The process of scenario development is of special importance as it helps to identify main drivers, critical uncertainties and patterns of change. Opportunities and constraints of actors and actions become clearer and reveal adaptation capacities. Effective strategies must be furthermore reasonable and accepted by local stakeholders to be implemented. Hence, developing scenarios and generating strategies need the integration of local knowledge. The testing of strategies shows how they play out in different scenarios and how robust they are. Reasons and patterns of social and natural vulnerability can so be shown. The scenario building exercise applied in this study is inspired by the approach from Peter Schwartz. It aims at determining critical uncertainties and to identify the most important driving forces for a specific focal issue which are likely to shape future developments of a region. The most important and uncertain drivers were analyzed and systematized with ranking exercises during meetings with local researchers and stakeholders. Cause-effect relationships were drawn in the form of concept maps either during the meetings or by researchers based on available information. Past observations and the scenario building outcomes were used to conduct a trend analysis. Cross-comparisons were made to find similarities and differences between CS in terms of main driving forces, patterns of change, opportunities and constraints. Driving forces and trends which aroused consistently over scenarios and CS were identified. First results indicate that livelihood conditions of people rely often directly on the

  8. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  9. Building the food secure city

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC

    In the downtown core, hawkers ply their trade in everything from ... In a project supported by the International Development .... governmental organization, Agriproject Foundation Department of ... Lulandala sees this as a missed opportunity.

  10. Risks and threats of tax state security and methods of their neutralization

    Directory of Open Access Journals (Sweden)

    Y.V. Lebedzevych

    2016-12-01

    Full Text Available The article substantiates the relevance of the study to ensure security of the state tax. Scientists studied different approaches to defining the essence of the concept of "security tax" on the key features that would satisfy the interests of all subjects of tax relations and the necessity of legal consolidation of this concept. Analyzed the economic, social and legal nature of the existence of the security tax, identified key indicators of fiscal security of Ukraine. To determine the effectiveness of the tax administration in the interests of the tax security highlights the main threats, tax security risks caused by external and internal factors, and propose measures for their elimination and prevent the possibility of their occurrence. The stages of tax risk management with effective building security tax, designed structurally-logic of the tax risk management security.

  11. Using Social Network Theory to Influence the Development of State and Local Primary Prevention Capacity-Building Teams

    Science.gov (United States)

    Cook-Craig, Patricia G.

    2010-01-01

    This article examines the role that social network theory and social network analysis has played in assessing and developing effective primary prevention networks across a southeastern state. In 2004 the state began an effort to develop a strategic plan for the primary prevention of violence working with local communities across the state. The…

  12. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  13. The SISTA pilot project: understanding the training and technical assistance needs of community-based organizations implementing HIV prevention interventions for African American women--implications for a capacity building strategy.

    Science.gov (United States)

    Fuller, Taleria R; Brown, Mari; King, Winifred; Prather, Cynthia; Cazaubon, Janine; Mack, Justin; Russell, Brandi

    2007-01-01

    The disproportionate rates of HIV/AIDS among African American women in the U.S. signify the ongoing need for targeted HIV prevention interventions. Additionally, building the capacity of service providers to sustain prevention efforts is a major concern. The Centers for Disease Control and Prevention (CDC) conducted a pilot project to disseminate the Sisters Informing Sisters about Topics on AIDS (SISTA), an HIV prevention intervention designed for African American women. The project was to inform the diffusion process and examine the training and technical assistance needs of participating community-based organizations. Results demonstrated a need for extensive pre-planning and skills-building prior to implementation.

  14. Legionellosis prevention in building water and HVAC systems a practical guide for design, operation and maintenance to minimize the risk

    CERN Document Server

    Joppolo, Cesare Maria; Pitera, Luca Alberto; Angermann, Jean Pierre; Izard, Mark

    2013-01-01

    This Guidebook is a practical guide for design, operation and maintenance to minimize the risk of legionellosis in building water and HVAC systmes. It is devided into several themes such as: Air conditioning of the air (by water – humidification), Production of hot water for washing (fundamentally but not only hot water for washing) and Evaporative cooling tower.

  15. Preventing Dampness Related Health Risks at the Design Stage of Buildings in Mediterranean Climates: A Cyprus Case Study

    Directory of Open Access Journals (Sweden)

    Ugochukwu Kenechi Elinwa

    2018-05-01

    Full Text Available Dampness is a major building challenge that poses a health risk by aiding the growth of mold and other related microorganisms in very humid areas. Thus, the correction of these post-effects results in high maintenance costs via energy consumption, due to the prolonged heating of damp rooms and post-treatment, especially during the winter. A survey of 2000 valid respondents living in apartment-style buildings was conducted and analyzed using SPSS software. In this study, the AutoDesk Computational Fluid Dynamics (ACFD software was used to perform a simulation for building materials analysis, to evaluate them for suitability in high humidity areas and to select the best building orientation for adequate and natural ventilation. The analysis aimed to observe the indoor air conditions due to environmental air flow conditions. The relationships of the airflow conditions to the material properties were measured. The methodology involves a Failure Modes and Effects Analysis to determine the level and nature of the dampness sources. The Design-Expert Statistical-Software 10 confirmed the simulation results. The simulation revealed a lower percentage of relative humidity and temperature in Adobe walls than in brick walls.

  16. CWSP Certified Wireless Security Professional Official Study Guide, Exam PW0-204

    CERN Document Server

    Coleman, David D; Harkins, Bryan E

    2010-01-01

    Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.

  17. Building a science of partnership-focused research: forging and sustaining partnerships to support child mental health prevention and services research.

    Science.gov (United States)

    Bradshaw, Catherine P; Haynes, Katherine Taylor

    2012-07-01

    Building on growing interest in translational research, this paper provides an overview of a special issue of Administration and Policy in Mental Health and Mental Health Service Research, which is focused on the process of forging and sustaining partnerships to support child mental health prevention and services research. We propose that partnership-focused research is a subdiscipline of translational research which requires additional research to better refine the theoretical framework and the core principles that will guide future research and training efforts. We summarize some of the major themes across the eight original articles and three commentaries included in the special issue. By advancing the science of partnership-focused research we will be able to bridge the gap between child mental health prevention and services research and practice.

  18. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  19. Building laboratory infrastructure to support scale-up of HIV/AIDS treatment, care, and prevention: in-country experience.

    Science.gov (United States)

    Abimiku, Alash'le G

    2009-06-01

    An unprecedented influx of funds and support through large programs such as the Global Fund for AIDS, Malaria and Tuberculosis and the World Health Organization's and President's Emergency Plan for AIDS Relief (PEPFAR) has made it possible for more than 1 million persons in resource-limited settings to access AIDS treatment and several million more to be in care and prevention programs. Nevertheless, there remain major challenges that prevent AIDS drugs and care from reaching many more in need, especially in rural settings. The roll-out of a high-quality treatment, care, and prevention program depends on an effective and reliable laboratory infrastructure. This article presents a strategy used by the Institute of Human Virology (IHV)-University of Maryland and its affiliate IHV-Nigeria to establish a multifaceted, integrated tier laboratory program to support a PEPFAR-funded scale-up of its AIDS Care Treatment in Nigeria program, in collaboration with the Centers for Disease Control and Prevention and the Nigerian government, as a possible model for overcoming a key challenge that faces several resource-limited countries trying to roll out and scale-up their HIV/AIDS treatment, care, and prevention program.

  20. The Adoption of Ergonomic Innovations for Injury Prevention : Examples from the building construction and health care industries

    OpenAIRE

    Glimskär, Bo

    2014-01-01

    A good work environment is important for the individual, for industry and for society. The work environment research has, predominantly, targeted identification of problems and the measurement of the size of these problems. Innovations to reduce the incidence of musculoskeletal disorder, MSD, have been introduced in different branches of industry, but with limited success. Few of the ergonomic innovations developed for the building and construction industry have reached a sufficient level of ...

  1. The Scenario Approach to the Development of Strategy of Prevention of Raider Seizure for Machine-Building Enterprise

    Directory of Open Access Journals (Sweden)

    Momot Tetiana V.

    2017-12-01

    Full Text Available The article proposes the methodical approach to the choice and substantiation of efficiency of managerial decisions on ensuring economic safety at counteraction of raiding, based on an intellectual instrumental analysis. The ranking of alternatives of managerial decisions on the basis of the received weighted estimates and their fuzzy composition is used. A graphical interpretation of the membership functions of the calculated fuzzy expected utilities of management alternatives for the machine-building enterprises has been constructed and is presented.

  2. Assessment of HIV/AIDS prevention of rural African American Baptist leaders: implications for effective partnerships for capacity building in American communities.

    Science.gov (United States)

    Foster, Pamela Payne; Cooper, Krista; Parton, Jason M; Meeks, John O

    2011-04-01

    This exploratory study sought to elicit information from rural Baptist leaders about their interest in HIV prevention activities within their congregation and other influencers in their human deficiency virus (HIV) prevention activities based on their geographical residence (urban vs rural). This study utilized both qualitative (in-depth interviews, N = 8) and quantitative (written survey, N = 56) methodologies (mixed method) in order to obtain pertinent information. A ministerial liaison was hired to assist in recruitment of participants within a statewide Baptist conference. Written surveys were distributed at a statewide meeting. The majority of participants (N = 50) in this study (89.3%) were receptive to conducting HIV/AIDS prevention activities within their congregations. The study also revealed rural/urban differences, including: interest in HIV/AIDS prevention, direct experiences with infected persons, or whether churches have a health-related ministry. Positive influencers of HIV/AIDS prevention in rural church leaders included either the participant or their spouse being in a health-related occupation, migratory patterns from larger metropolitan areas in other areas of the country to the rural south, and whether the church has a health-related ministry. Findings from this study are significant for a variety of reasons, including use of faith-based models for HIV/ AIDS capacity building and use of potential influencers on HIV/AIDS prevention in African Americans in the rural Deep South, where the epidemic is growing fastest. Future implications of this study might include expansion of faith-based models to include other denominations and health care providers as well of use of positive influencers to develop future HIV/AIDS intervention strategies.

  3. A mixed-method evaluation of the New York State Eat Well Play Hard Community Projects: Building local capacity for sustainable childhood obesity prevention.

    Science.gov (United States)

    Reid, Kaydian S; Sekhobo, Jackson P; Gantner, Leigh A; Holbrook, MaryEllen K; Allsopp, Marie; Whalen, Linda B; Koren-Roth, Amy

    2018-04-01

    This study used a mixed-method, comparative case study approach to assess the level of capacity built for childhood obesity prevention among seven New York State Eat Well Play Hard-Community Projects (EWPH-CP). Data were collected through a self-reported survey in 2007, semi-structured interviews in 2009, and EWPH-CP program documentation throughout the 2006-2010 funding cycle. Quantitative and qualitative analyses were used along with an integrative framework for assessing local capacity building to characterize the capacity built by the study coalitions. Four coalitions rated membership characteristics as a challenge at the beginning of the funding cycle. Towards the end of the funding cycle, all seven coalitions reported activities that were initially focused on building their membership (i.e., member capacity) or positive working relationships (i.e. relational capacity), before eventually pursuing support and resources (i.e., organizational capacity) for implementing their chosen community-oriented programmatic goals (i.e., programmatic capacity). Five coalitions reported environmental changes aimed at increasing physical activity or fruit and vegetable intake. Technical assistance provided to coalitions was credited with contributing to the achievement of programmatic goals. These results suggest that the coalitions succeeded in building local capacity for increasing age-appropriate physical activity or fruit and vegetables intake in the target communities. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  5. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  6. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  7. BASIC CONCEPTS OF TAX SECURITY AS PART OF THE FINANCIAL SECURITY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Sergiy Golikov

    2016-11-01

    the population, the level of shadow economy and low tax culture. The threat of the state of public finances is sufficiently large threat, but not the most dangerous, but the increase in the budget deficit and debt can affect significantly negatively on the tax security of Ukraine. The institutional environment is another threat to the tax security. Its main danger are the low efficiency of the tax authorities and uncertainty and ambiguity of legislation. Practical implications. In order to prevent a drop in tax security it is necessary to conduct continuous monitoring aforementioned factors on the sources of threats. All mentioned sources of threats would help the state authorities to build an effective Concept of Tax Security of Ukraine.

  8. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  9. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  10. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  11. Reducing the threat of RDDs. It's not enough to plug gaps in security systems for radioactive sources. Needed are integrated 'cradle-to-grave' controls to prevent high-risk sources from finding their way into the wrong hands

    International Nuclear Information System (INIS)

    Ferguson, C.D.

    2003-01-01

    Common radioactive materials, such as commercial radioactive sources used in medicine, industry, and scientific research, could fuel radiological dispersal devices (RDDs). While the IAEA has worked toward improving the security of radioactive sources long before the September 11 attacks, the IAEA moved quickly after this date to increase its efforts to prevent these materials from becoming tools of radiological terror. IAEA Director General Elbaradei has spoken often about the need for a 'cradle-to-grave' protection system for radioactive materials. While the IAEA and several Member States have striven to establish such a system, more thinking and work are still required to develop an integrated, layered, and cooperative defense system for radioactive source security. Security improvement should be prioritized on those radioactive sources that pose the greatest security risks. Although perfect security systems do not exist a layered security system should be established. This means that multiple barriers should be in place to lessen the likelihood of a radiological terror act. A summary of the findings of the International Conference on Security of Radioactive sources held in March 2003 is included in this paper

  12. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  13. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  14. Reactor building

    International Nuclear Information System (INIS)

    Ebata, Sakae.

    1990-01-01

    At least one valve rack is disposed in a reactor building, on which pipeways to a main closure valve, valves and bypasses of turbines are placed and contained. The valve rack is fixed to the main body of the building or to a base mat. Since the reactor building is designed as class A earthquake-proofness and for maintaining the S 1 function, the valve rack can be fixed to the building main body or to the base mat. With such a constitution, the portions for maintaining the S 1 function are concentrated to the reactor building. As a result, the dispersion of structures of earthquake-proof portion corresponding to the reference earthquake vibration S 1 can be prevented. Accordingly, the conditions for the earthquake-proof design of the turbine building and the turbine/electric generator supporting rack are defined as only the class B earthquake-proof design conditions. In view of the above, the amount of building materials can be saved and the time for construction can be shortened. (I.S.)

  15. In What Ways Has US Security Cooperation Programs Been Effective in Helping Kenya to Build Partnership Capacity to Counter Transnational Terrorism?

    National Research Council Canada - National Science Library

    Henneke, Jason C

    2007-01-01

    .... In addition to host-nation capacity building, the cooperation of all agencies within the U.S. Government (USG) is required for a coordinated and effective approach to the Global War on Terrorism...

  16. Building Resilience for Palliative Care Clinicians: An Approach to Burnout Prevention Based on Individual Skills and Workplace Factors.

    Science.gov (United States)

    Back, Anthony L; Steinhauser, Karen E; Kamal, Arif H; Jackson, Vicki A

    2016-08-01

    For palliative care (PC) clinicians, the work of caring for patients with serious illness can put their own well-being at risk. What they often do not learn in training, because of the relative paucity of evidence-based programs, are practical ways to mitigate this risk. Because a new study indicates that burnout in PC clinicians is increasing, we sought to design an acceptable, scalable, and testable intervention tailored to the needs of PC clinicians. In this article, we describe our paradigm for approaching clinician resilience, our conceptual model, and curriculum for a workplace resilience intervention for hospital-based PC teams. Our paradigm for approaching resilience is based on upstream, early intervention. Our conceptual model posits that clinician well-being is influenced by personal resources and work demands. Our curriculum for increasing clinician resilience is based on training in eight resilience skills that are useful for common challenges faced by clinicians. To address workplace issues, our intervention also includes material for the team leader and a clinician perception survey of work demands and workplace engagement factors. The intervention will focus on individual skill building and will be evaluated with measures of resilience, coping, and affect. For PC clinicians, resilience skills are likely as important as communication skills and symptom management as foundations of expertise. Future work to strengthen clinician resilience will likely need to address system issues more directly. Copyright © 2016 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  17. Building local research and development capacity for the prevention and cure of neglected diseases: the case of India.

    Science.gov (United States)

    Kettler, H E; Modi, R

    2001-01-01

    This paper examines the proposal to build research and development (R&D) capabilities for dealing with neglected infectious and tropical diseases in countries where they are endemic, as a potentially cost- and time-effective way to fill the gap between the supply of and need for new medicines. With reference to the situation in India, we consider the competencies and incentives needed by companies so that their strategy can be shifted from reverse engineering of existing products to investment in R&D for new products. This requires complex reforms, of which the intellectual property rights agreement is only one. We also consider whether Indian companies capable of conducting research and development are likely to target neglected diseases. Patterns of patenting and of R&D, together with evidence from interviews we have conducted, suggest that Indian companies, like multinational corporations, are likely to target global diseases because of the prospect of much greater returns. Further studies are required on how Indian companies would respond to push and pull incentives originally designed to persuade multinational corporations to do more R&D on neglected diseases.

  18. Knowing, Building and Living Together on Internet and Social Networks: The ConRed Cyberbullying Prevention Program

    Directory of Open Access Journals (Sweden)

    Rosario Ortega-Ruiz

    2012-12-01

    Full Text Available An evaluation of the success of the evidence-based ConRed program, which addresses cyberbullying and other emerging problems linked with the use of the internet and seeks to promote a positive use of this new environment. The main aims of the ConRed program are a to improve perceived control over information on the internet, b to reduce the time dedicated to digital device usage, and c to prevent and reduce cyberbullying. The impact of the program was evaluated with a quasi-experimental design with a sample of 893 students (595 experimental and 298 control. The results of the mixed repeated measures ANOVAs demonstrate that ConRed contributes to reducing cyberbullying and cyber-dependence, to adjusting the perception of information control, and to increasing the perception of safety at school.

  19. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  20. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  1. Android Applications Security

    OpenAIRE

    Paul POCATILU

    2011-01-01

    The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the a...

  2. Implementing Evidence-Based Teen Pregnancy-Prevention Interventions in a Community-Wide Initiative: Building Capacity and Reaching Youth.

    Science.gov (United States)

    House, L Duane; Tevendale, Heather D; Martinez-Garcia, Genevieve

    2017-03-01

    To describe efforts to implement evidence-based interventions (EBIs) within multicomponent, community-wide initiatives to reduce teen pregnancy. During 2011-2014, we collected information about the capacity (i.e., knowledge, confidence, training, and experience) of state and community-based organizations to support implementation of the following: EBIs, number and characteristics of youth served by EBIs, type of EBIs implemented, EBI settings, hours of training, and technical assistance provided. State and community-based organizations reported these data annually; however, training and technical assistance was reported monthly. We used aggregated data from these annual and monthly reports to describe the implementation of EBIs in the community-wide initiative project. From baseline in 2011-2014, state and community-based organizations increased their capacities to support program partners in delivering EBIs. They provided 5,015 hours of technical assistance and training on topics, including ensuring adequate capacity, process and outcome evaluation, program planning, and continuous quality improvement. Program partners increased the number of youth reached by an EBI in targeted communities by 349%, from 4,304 in the first year of implementation in 2012 to 19,344 in 2014. Most youth in 2014 received sexuality education programs (59%), whereas smaller percentages received abstinence-based, youth development, and clinic-based programs. Most youth were reached through schools (72%) and community-based organizations (16%), and smaller numbers were reached in other settings (e.g., faith-based organizations, health centers). Building and monitoring the capacity of program partners to deliver EBIs through technical assistance and training is important. In addition, partnering with schools leads to reaching more youth. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  4. Providing Criminological Security of Minors at the National Level

    Directory of Open Access Journals (Sweden)

    Andrei I. Savelev

    2017-08-01

    Full Text Available The article discusses issues related to the provision of criminological security of minors at the national level. The Author analyzes the normative legal basis and main directions of activity of subjects of prevention of the violation of child rights in the Russian Federation. The Author believes that the current system of legal guarantees of criminological security of minors not fully meet modern requirements of protection of rights, freedoms and legitimate interests of adolescents. In particular, the legislation of the Russian Federation is largely focused on protecting the interests of disadvantaged segments of the population, including minors, being in socially dangerous position. It is proposed to improve the existing legislation through the adoption of a new federal law “The bases of the system of prevention of offences and security of minors”, which will be an important step towards building a legal state.

  5. Chemical Accident Prevention: Site Security

    Science.gov (United States)

    This chemical safety alert assists facilities that routinely handle extremely hazardous substances, along with SERCs, LEPCs, and emergency responders, in their efforts to reduce criminally caused releases and vulnerability to terrorist activity.

  6. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  7. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  8. The State-Society/Citizen Relationship in Security Analysis: Implications for Planning and Implementation of U.S. Intervention and Peace/State-Building Operations

    Science.gov (United States)

    2015-04-01

    of the state. Such threats may come into existence when 9 the organizing principles of two states contradict each other in a context where the...security is that the normal condition of actors in a market econ - omy is one of risk, competition, and uncertainty.12 In other words, the actors in the...liberal principles , federative states have no natural unifying principle and, consequently, are more vulnerable to dismemberment, separatism, and

  9. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  10. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  11. Security and Political Stability in the Mediterranean

    Directory of Open Access Journals (Sweden)

    Antonio Marquina

    1997-09-01

    Full Text Available The author revises with a critical eye the treatment given the issue of security during the Euro-Mediterranean process from the Declaration of Barcelona to the Conference at Malta. According to Marquina, no idea of security exists which gives backbone to theEuro-Mediterranen process and the documents themselves contain incoherencies and significant imprecisions, especially regarding the concepts of cooperative security, preventative diplomacy and ‘good neighbor’ relations. These principles appear to be rather underexplained in both their conceptual and operative aspects. On one hand, the information about matters that affect security is exchanged on both a voluntary and official basis and can be, as such, thus opaque and not always reliable; on the other hand, the issues thataffect security are so wide-ranging that the operative approach - the communications network, mechanisms for early-warning, the conciliation and peaceful resolution of controversies - seems hardly realistic. With respect to confidence-building measures, the author considers that these should be linked to arms control agreements, which are more in accord with the stated objectives of defense sufficiency and the non-proliferation of weapons of mass destruction. Marquina also maintains that the role of civil society and the importance of cultural dialogue - both fundamental to conflict prevention - have not been reinforced even though the principal problems of security in the region are due to structural imbalances –military, economical, political– and, precisely the disparities amongcultures. In this sense, the EU states might consider putting forward unilateral policies that restrict such disparities, provided that a certain reciprocity of policy is put forth from the southern states in the Mediterranean.

  12. Environment and security in the South China Sea region : the role of experts, non-governmental actors and governments in regime building processes

    OpenAIRE

    Næss, Tom

    1999-01-01

    Background: The Spratly islands in the South China Sea are today the focal point of a territorial dispute that represents a serious threat to the regional security in Southeast Asia. Six governments - China, Vietnam, Taiwan, the Philippines, Malaysia and Brunei - have laid claims to all or some of the more than 230 islets, reefs and shoals in the Spratly area. The Peoples Republic of China (PRC) is a key player in the South China Sea conflict. However, the South China Sea is not jus...

  13. Cloud Computing Security

    OpenAIRE

    Ngongang, Guy

    2011-01-01

    This project aimed to show how possible it is to use a network intrusion detection system in the cloud. The security in the cloud is a concern nowadays and security professionals are still finding means to make cloud computing more secure. First of all the installation of the ESX4.0, vCenter Server and vCenter lab manager in server hardware was successful in building the platform. This allowed the creation and deployment of many virtual servers. Those servers have operating systems and a...

  14. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  15. Suggestions for the New Social Entrepreneurship Initiative: Focus on Building a Body of Research-Proven Programs, Shown to Produce Major Gains in Education, Poverty Reduction, Crime Prevention, and Other Areas

    Science.gov (United States)

    Coalition for Evidence-Based Policy, 2009

    2009-01-01

    This paper outlines a possible approach to implementing the Social Entrepreneurship initiative, focused on building a body of research-proven program models/strategies, and scaling them up, so as to produce major progress in education, poverty reduction, crime prevention, and other areas. The paper summarizes the rationale for this approach, then…

  16. RISK MANAGEMENT FROM THE INFORMATION SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Riza Ionuț

    2017-11-01

    Full Text Available Risk management has emerged ever since the appearance of human communities and it has developed at a slow rate. Over time, a significant improvement was made, from accepting hazards to the identification, evaluation and control of unwanted events, threat prevention and exploitation of opportunities through scientific risk management actions. The fundamental role of research in cyber security is to concentrate the efforts on those contexts and conditions which determine the way in which key players reach a common understanding of the way to conceive and eventually answer to certain challenges in cyber security. In order to build a clear perception of these effects, this work presents the main elements which define cyber space, to come to the aid of turning the management process into an efficient one, especially when talking about cyber space as a space for conflicts, both economic and political.

  17. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  18. Security basics for computer architects

    CERN Document Server

    Lee, Ruby B

    2013-01-01

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support fo

  19. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  20. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  1. Consideration of the energetic quality of buildings during specificaton of adequacy limits for the cost of housing and heating in line with the social security statute book; Die Beruecksichtigung der energetischen Gebaeudequalitaet bei der Festlegung von Angemessenheitsgrenzen fuer die Kosten der Unterkunft und Heizung nach dem Sozialgesetzbuch

    Energy Technology Data Exchange (ETDEWEB)

    Malottki, Christian von

    2012-07-27

    The author of the contribution reports on the consideration of the energy quality of buildings during the specification of adequacy limits for the cost of housing and heating in line with the social security statute book. Subsequently to the description of the legal and technical energy starting situation, the methods used to describe the energy quality of buildings, the methods of survey of pricing differences as well as the possibilities of application of an energetically differentiated suitability level are described.

  2. Preventing violence and reinforcing human security: a rights-based framework for top-down and bottom-up action Prevención de la violencia y refuerzo de la seguridad humana: un marco basado en los derechos humanos para la acción en sentidos descendente y ascendente

    Directory of Open Access Journals (Sweden)

    Finn Kjaerulf

    2010-05-01

    Full Text Available This article explores the violence reduction potential in the intersection between health, criminal justice, and development. It emphasizes public health, rule of law, and equality-driven socioeconomic development as principal concerns in preventing violence. In parts of Latin America, violence has become a serious public health and security problem. Prior studies have explored the risk factors associated with violence as well as experiences in its prevention. These studies and existing approaches to violence prevention provide evidence on where to direct attention and build prevention efforts. This article argues for integrated community-driven and national interventions to create cooperative national- local linkages and embed international human rights law at the national and local levels. Nations struggling with violence should be encouraged to apply an integrated framework to prevent violence and reinforce human security.En este artículo se analiza la posibilidad de disminuir la violencia en la intersección entre la salud, la justicia penal y el desarrollo. Se hace hincapié en la salud pública, el imperio de la ley y el desarrollo socioeconómico regido por la igualdad, como inquietudes principales en la prevención de la violencia. En algunas partes de América Latina, la violencia se ha convertido en un problema grave de salud pública y de seguridad. En estudios anteriores se han analizado los factores de riesgo vinculados a la violencia, así como las experiencias en su prevención. Estos estudios y los métodos existentes de prevención de la violencia aportan datos probatorios acerca de dónde debe dirigirse la atención y dónde deben emprenderse iniciativas de prevención. Este artículo aboga por intervenciones comunitarias y nacionales integradas, a fin de crear vínculos de colaboración nacional y local, e instituir la legislación internacional de derechos humanos en los ámbitos nacional y local. Se debe alentar a los pa

  3. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  4. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  5. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  6. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  7. The Development of a Community-Based, Pharmacist-Provided Falls Prevention MTM Intervention for Older Adults: Relationship Building, Methods, and Rationale

    Directory of Open Access Journals (Sweden)

    David A. Mott

    2014-01-01

    Full Text Available The objectives of this article are to discuss the process of community engagement experienced to plan and implement a pilot study of a pharmacist-provided MTM intervention focused on reducing the use of medications associated with falling, and to present the research methods that emerged from the community engagement process to evaluate the feasibility, acceptance, and preliminary impact of the intervention. Key lessons learned from the community engagement process also are presented and discussed. The relationship building and planning process took twelve months. The RE-AIM framework broadly guided the planning process since an overarching goal for the community partners was developing a program that could be implemented and sustained in the future. The planning phase focused on identifying research questions that were of most interest to the community partners, the population to study, the capacity of partners to perform activities, and process evaluation. Much of the planning phase was accomplished with face-to-face meetings. After all study processes, study materials, and data collection tools were developed, a focus group of older adults who represented the likely targets of the MTM intervention provided feedback related to the concept and process of the intervention. Nine key lessons were identified from the community engagement process. One key to successful community engagement is partners taking the time to educate each other about experiences, processes, and successes and failures. Additionally, partners must actively listen to each other to better understand barriers and facilitators that likely will impact the planning and implementation processes. Successful community engagement will be important to develop both formative and summative evaluation processes that will help to produce valid evidence about the effectiveness of pharmacists in modifying drug therapy and preventing falls as well as to promote the adoption and

  8. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  9. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  10. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on food and agriculture: Building better agriculture one atom at a time

    International Nuclear Information System (INIS)

    2012-01-01

    In a world facing the dilemmas posed by exponential population growth and changing climates, nuclear technology offers possible avenues to solve production problems, protect soil and water resources and conserve biodiversity, which, in turn, means increased hope for global food security. Application of nuclear technology has a proven record in increasing agricultural production. Higher and more reliable yields not only improve farmers' livelihoods, they mean better quality and safer food for consumers. The methods used vary: isotope measurements identify and trace the efficiency of crop inputs such as water and fertilizer and of animal feeds; gamma rays sterillize male insects so that when they are returned to the wild they are unable to produce progeny; irradiation stops the growth of pests and expands the shelf life of grains, spices and processed foods; radiation induced mutation speeds up natural genetic changes in crops to support plant breeders; and genetic markers expedite the identification of animal diseases thereby allowing treatment to begin sooner. All of these methods, plus a host of others that come under the heading of nuclear technology, are invaluable tools for agriculture and food production. For almost five decades, the IAEA, together with its partner the FAO, guided development of new nuclear based methodologies, requested by its Member States and facilitated their adaptation, adoption and application. A harbinger of the United Nation's Delivering as One, the Joint FAO/IAEA Division stands as the United Nations' system's only joint venture. It also operates its own agriculture and biotechnology laboratories in Seibersdorf where technical services, R and D and laboratory training activities are conducted in support of the development and transfer of new technologies and their adaptation to local needs and environments.

  11. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  12. Plataforma smart building

    OpenAIRE

    Cidrera Lopez, Alain

    2013-01-01

    The overall project is a system (hardware + software) that allows monitoring and control in a building / office different security systems, energy, communications, home automation, PKI's overall business that will increase all the efficiency of the building and the business and ensure the continuity of it. My participation in this Project will mainly focus on the development of hardware components, monitoring and control system (home automation, energy, safety control elements ...) and softwa...

  13. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  14. [Mutual aid societies for industrial accidents and occupational diseases in the social security service within the framework of the Prevention of Occupational Risk Act].

    Science.gov (United States)

    Albalá-Ortiz, M

    The passing of the Prevention of Industrial Risks Act, in force from 9 February 1996 has altered previous ideas on the subject, which is currently considered to be of utmost importance for national and community legislation. In this article we describe the preventive functions of the Mutual Aid Societies for Industrial Accidents and professional diseases of the National Health Service. We have analysed the current legislation so as to clarify the activities of the Mutual Aid Societies in the field of the prevention of industrial accidents, and have defined the actions which may be taken in this field according to the present laws. Two different types of preventive activities are considered: (1) Those which depend on contributions, included in the professional risks cover, and which are obliged to prepare an annual plan of the measures taken to prevent industrial accidents and professional illness, following the guidelines established by the Ministry of Labor and Social Services and according to certain priorities. (2) The functions corresponding to the services for third-party prevention exclusively for their associated companies when the Mutual Aid Society is approved as a service for third party cover. This requires a voluntary or professional contract and the financial cost is borne by the company which requests it. The objective of the current legislation is, amongst other things, to introduce the new preventive approach established by the Prevention of Industrial Risks Act in the workplace and through the Mutual Aid Societies as well as to foment a new culture of prevention.

  15. Enhancing Parliamentary Oversight for Effective Security Sector ...

    African Journals Online (AJOL)

    2015-06-09

    Jun 9, 2015 ... transition from violent conflict or prolonged authoritarian rule. .... State whose primary interest was to secure his regime and prevent ... June 12, 1993 presidential elections triggered the emergence of violent non-state security.

  16. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  17. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  18. Design of earth slide prevention structure and results of analyzing its behavior in excavation work for main building foundation for No.4 plant in Kashiwazaki-Kariwa Nuclear Power Station

    International Nuclear Information System (INIS)

    Kuroda, Teruo; Shimazu, Masaomi; Terada, Kenji

    1990-01-01

    In the construction works for No.4 plant in Kashiwazaki-Kariwa Nuclear Power Station, Tokyo Electric Power Co., Inc., the excavation work using ground anchor type earth slide prevention structure of about 30 m height intended for soft rocks was carried out. In this report, the outline of the design of the earth slide prevention structure is described, and based on the results of measurement of the earth slide prevention structure and surrounding ground during the period of the excavation work, the effect that the underground continuous wall normally intersecting with the back of the earth slide prevention wall and structurally separated from it exerted to the deformation behavior of the earth slide prevention wall was examined, and the results are reported. The geological features of the site are explained. The excavation work is to excavate the site of +5 m level down to -26 m for the turbine building and to -38.15 m for the reactor building, and the quantity of earth to be excavated is 1.39 million m 3 . These valuable experiences are utilized for the design and construction of the following plants. (K.I.)

  19. Secure Hybrid Encryption from Weakened Key Encapsulation

    NARCIS (Netherlands)

    D. Hofheinz (Dennis); E. Kiltz (Eike); A. Menezes

    2007-01-01

    textabstractWe put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. It

  20. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  1. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  2. What kind of cyber security? Theorising cyber security and mapping approaches

    OpenAIRE

    Laura Fichtner

    2018-01-01

    Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances...

  3. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  4. Building the quantum network

    International Nuclear Information System (INIS)

    Elliott, Chip

    2002-01-01

    We show how quantum key distribution (QKD) techniques can be employed within realistic, highly secure communications systems, using the internet architecture for a specific example. We also discuss how certain drawbacks in existing QKD point-to-point links can be mitigated by building QKD networks, where such networks can be composed of trusted relays or untrusted photonic switches. (author)

  5. Cashew cultivation, access to land and food security in Brong-Ahafo Region, Ghana:\\ud Preventing the intergenerational transmission of poverty

    OpenAIRE

    Evans, Ruth; Mariwah, Simon; Barima Antwi, Kwabena

    2014-01-01

    This research aimed to investigate the implications of changing agricultural land use from food production towards increased cashew cultivation for food security and poverty alleviation in Jaman North District, Brong-Ahafo Region of Ghana. Based on qualitative, participatory research with a total of 60 participants, the research found that increased cashew production had led to improvements in living standards for many farmers and their children over recent years. Global demand for cashew is ...

  6. [Biological security confronting bioterrorism].

    Science.gov (United States)

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.

  7. Comparative U.S.-Israeli Homeland Security

    National Research Council Canada - National Science Library

    Larsen, Jeffrey A; Pravecek, Tasha L

    2006-01-01

    .... It begins with the threats experienced by each nation, examining the respective homeland security organizational structures and ways of preventing attacks and responding to attacks that do occur...

  8. No nuclear safety without security

    International Nuclear Information System (INIS)

    Anon.

    2016-01-01

    ead of Health and Safety - Nuclear Safety and Corporate Security at ENGIE Benelux, Pierre Doumont has the delicate job of defining and implementing measures, including cybersecurity, to prevent the risk of malevolent acts against tangible and intangible assets. He gives some hints on the contribution of nuclear security to safety.

  9. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report; Transition et securite energetiques: quels codes volontaires? Efficacite energetique: dialogue AIE, CEI et ISO. Les mesures de securite, solidarite et efficacite de la commission europeenne. Securiser l'approvisionnement en gaz naturel et favoriser la cogeneration. Des batiments moins gourmands en energie: refonte de la directive sur la performance energetique. Efficacite energetique dans les batiments: GDF Suez au rapport (volontaire)

    Energy Technology Data Exchange (ETDEWEB)

    Tourneur, J.C

    2009-10-15

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  10. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  11. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  12. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  13. Securing Embedded Smart Cameras with Trusted Computing

    Directory of Open Access Journals (Sweden)

    Winkler Thomas

    2011-01-01

    Full Text Available Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analog towards digital systems, the capabilities of cameras are constantly increasing. Today's smart camera systems come with considerable computing power, large memory, and wired or wireless communication interfaces. With onboard image processing and analysis capabilities, cameras not only open new possibilities but also raise new challenges. Often overlooked are potential security issues of the camera system. The increasing amount of software running on the cameras turns them into attractive targets for attackers. Therefore, the protection of camera devices and delivered data is of critical importance. In this work we present an embedded camera prototype that uses Trusted Computing to provide security guarantees for streamed videos. With a hardware-based security solution, we ensure integrity, authenticity, and confidentiality of videos. Furthermore, we incorporate image timestamping, detection of platform reboots, and reporting of the system status. This work is not limited to theoretical considerations but also describes the implementation of a prototype system. Extensive evaluation results illustrate the practical feasibility of the approach.

  14. Calibrating Fundamental British Values: How Head Teachers Are Approaching Appraisal in the Light of the Teachers' Standards 2012, Prevent and the Counter-Terrorism and Security Act, 2015

    Science.gov (United States)

    Revell, Lynn; Bryan, Hazel

    2016-01-01

    In requiring that teachers should "not undermine fundamental British values (FBV)," a phrase originally articulated in the Home Office counter-terrorism document, Prevent, the Teachers' Standards has brought into focus the nature of teacher professionalism. Teachers in England are now required to promote FBV within and outside school,…

  15. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  16. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  17. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  18. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  19. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  20. Audit for Information Systems Security

    Directory of Open Access Journals (Sweden)

    Ana-Maria SUDUC

    2010-01-01

    Full Text Available The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security.

  1. Building Languages

    Science.gov (United States)

    ... Glossary Contact Information Information For… Media Policy Makers Building Languages Recommend on Facebook Tweet Share Compartir Communicating ... any speech and only very loud sounds. Close × “Building Blocks” “Building Blocks” refers to the different skills ...

  2. Building Global Competitiveness through Information Security ...

    African Journals Online (AJOL)

    If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs. Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link ...

  3. Building Collaborative Capacity for Homeland Security

    Science.gov (United States)

    2004-11-01

    Kesner, I. F. (1993). Top Managerial Prestige, Power and Tender Offer Response - a Study of Elite Social Networks and Target Firm Cooperation During...Organization Science, 12(3), 372-388. Galaskiewicz, J., & Burt, R. S. (1991). Interorganization Contagion in Corporate Philanthropy . Administrative

  4. Ground Truth in Building Human Security

    Science.gov (United States)

    2012-11-01

    structured. This allows for the creation of one master matrix where the assessment results are collected for each AO and then weighted ... weighted criteria for a geographic region’s value to overall policy aims, aids in decision- making where to best allocate resources when, as in this...Snow Leopards and Cadastres: Rare Sightings in Afghanistan,” in Land and Post-Conflict Peacebuild- ing, Jon Unruh and Rhodri Williams, Eds

  5. Building Information Security Awareness at Wilmington University

    Science.gov (United States)

    Hufe, Mark J.

    2014-01-01

    This executive position paper proposes recommendations for reducing the risk of a data breach at Wilmington University. A data breach could result in identity theft of students, faculty and staff, which is costly to the individual affected and costly to the University. The University has a legal and ethical obligation to provide safeguards against…

  6. Building Security in the Persian Gulf

    Science.gov (United States)

    2010-01-01

    Erin- Elizabeth Johnson, Steve Kistler, and Jocelyn Lofstrom. Most of all, the author expresses his deep appre- ciation and thanks to his spouse...modified Brus - sels Treaty, through which West Germany and Italy were admitted into what was then to be called the Western European Union, replaced that

  7. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  8. Analysis of Intel IA-64 Processor Support for Secure Systems

    National Research Council Canada - National Science Library

    Unalmis, Bugra

    2001-01-01

    .... Systems could be constructed for which serious security threats would be eliminated. This thesis explores the Intel IA-64 processor's hardware support and its relationship to software for building a secure system...

  9. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  10. 40 CFR 264.14 - Security.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...

  11. 40 CFR 265.14 - Security.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...

  12. Structural and Community Change Outcomes of the Connect-to-Protect Coalitions: Trials and Triumphs Securing Adolescent Access to HIV Prevention, Testing, and Medical Care.

    Science.gov (United States)

    Miller, Robin Lin; Reed, Sarah J; Chiaramonte, Danielle; Strzyzykowski, Trevor; Spring, Hannah; Acevedo-Polakovich, Ignacio D; Chutuape, Kate; Cooper-Walker, Bendu; Boyer, Cherrie B; Ellen, Jonathan M

    2017-09-01

    Connect to Protect (C2P), a 10-year community mobilization effort, pursued the dual aims of creating communities competent to address youth's HIV-related risks and removing structural barriers to youth health. We used Community Coalition Action Theory (CCAT) to examine the perceived contributions and accomplishments of 14 C2P coalitions. We interviewed 318 key informants, including youth and community leaders, to identify the features of coalitions' context and operation that facilitated and undermined their ability to achieve structural change and build communities' capability to manage their local adolescent HIV epidemic effectively. We coded the interviews using an a priori coding scheme informed by CCAT and scholarship on AIDS-competent communities. We found community mobilization efforts like C2P can contribute to addressing the structural factors that promote HIV-risk among youth and to community development. We describe how coalition leadership, collaborative synergy, capacity building, and local community context influence coalitions' ability to successfully implement HIV-related structural change, demonstrating empirical support for many of CCAT's propositions. We discuss implications for how community mobilization efforts might succeed in laying the foundation for an AIDS-competent community. © Society for Community Research and Action 2017.

  13. The cyber security threat stops in the boardroom.

    Science.gov (United States)

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  14. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  15. Radon: the building industry view

    International Nuclear Information System (INIS)

    Farnham, K.G.R.

    1992-01-01

    Guidance on radon preventive measures in new dwellings is covered by the Building Regulations, and adequate guidance has been published by the Building Research Establishment. This is a satisfactory state of affairs which, unfortunately, is not the case for remedial work in existing buildings. Work in existing buildings should be incorporated in Regulations and adequate funding should be provided by government for the training of builders. (Author)

  16. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  17. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  18. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  19. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  20. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  1. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  2. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  3. The Evolution of RFID Security

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home

  4. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  5. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  6. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Military capacity building has increasingly become an integral part of Danish defence. Military capacity is a new way of thinking Danish defence and poses a new set of challenges and opportunities for the Danish military and the Political leadership. On the 12th of december, PhD. Candidate Josefine...... Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from...

  7. SEADE: Countering the Futility of Network Security

    Science.gov (United States)

    2015-10-01

    guards, and computer cages) and logical security measures (network firewall and intrusion detection). However, no matter how many layers of network...security built-in and with minimal security dependence on network security appliances (e.g., firewalls ). As Secretary of Defense Ashton Carter...based analysis that assumes nothing bad will happen to applications/data if those defenses prevent malware transactions at the entrance. The

  8. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  9. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  10. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  11. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  12. Legal and regulatory capacity to support the global health security agenda.

    Science.gov (United States)

    Morhard, Ryan; Katz, Rebecca

    2014-01-01

    On February 13, 2014, 27 nations, along with 3 international organizations, launched the Global Health Security Agenda (GHSA). The intent of GHSA is to accelerate progress in enabling countries around the world to prevent, detect, and respond to public health emergencies-capacities to be achieved through 9 core objectives. Building national, regional, and international capacity includes creating strong legal and regulatory regimes to support national and international capacities to prevent, detect, and respond to public health emergencies. Accordingly, establishing and reinforcing international and national-level legal preparedness is central to advancing elements of each of the 9 objectives of the GHSA.

  13. Using an Opinion Poll to Build an Obesity-Prevention Social Marketing Campaign for Low-Income Asian and Hispanic Immigrants: Report of Findings

    Science.gov (United States)

    Sugerman, Sharon; Backman, Desiree; Foerster, Susan B.; Ghirardelli, Alyssa; Linares, Amanda; Fong, Amy

    2011-01-01

    Objective: To gain opinions from low-income, limited-English-speaking Hispanic and Asian immigrants for formative research in a social marketing campaign. Design: Nineteen questions on obesity prevention-related topics were embedded into a larger random digit-dial survey investigating the effects of language and cultural barriers on health care…

  14. Sick building syndrome

    Directory of Open Access Journals (Sweden)

    Tjandra Y. Aditama

    2002-06-01

    Full Text Available Sick building syndrome describes a number of mostly unspesific complaints of some occupants of the building. The exact pathophysiological mechanism remains elusive. It is a multi factorial event which may include physical, chemical, biological as well as psycological factors. In many cases it is due to insufficient maintenance of the HVAC (heating, ventilation, air conditioning system in the building. Sign and symptoms can be uncomfortable and even disabling, which may include mucus membrane irritation, neurotoxic symptoms, asthma like symptoms, skin complaints, gastrointestinal symptoms and other related symptoms. There are various investigation methods to diagnose sick building syndrome, and on site assessment of the building is extremely useful. Prevention through a proactive air quality monitoring program is far more desirable than dealing with an actual sick building. Indoor air and the sick building symdrome serves as a paradigm of modern occupational and environmental medicine. (Med J Indones 2002; 11:124-31Keywords: indoor air pollution, sick building syndrome, building related illness

  15. Government/Industry Partnership on the Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Cefus, Greg; Colhoun, Stefan C.; Freier, Keith D.; Wright, Kyle A.; Herdes, Gregory A.

    2006-01-01

    In the past, industry radiation protection programs were built almost exclusively around radiation safety and the minimization of radiation dose exposure to employees. Over the last decade, and especially the last few years, the emphasis has shifted to include the physical security and enhanced control of radioactive materials. The threat of nuclear and radiological terrorism is a genuine international security concern. In May 2004, the U.S. Department of Energy/U.S. National Nuclear Security Administration unveiled the Global Threat Reduction Initiative (GTRI) to respond to a growing international concern for the proper control and security of radioactive and nuclear materials. An integral part of the GTRI, the International Radiological Threat Reduction (IRTR) Program, was established in February 2002, originally as a Task Force. The IRTR Program is foremost a government-to-government cooperative program with the mission to reduce the risk posed by vulnerable radioactive materials that could be used in a Radioactive Dispersal Device (RDD). However, governments alone cannot prevent the misuse and illicit trafficking of radioactive sources. By expanding the role of private industry as a partner, existing government regulatory infrastructures can be enhanced by formulating and adopting industry self-regulation and self-policing measures. There is international concern regarding the security and control of the vast number of well-logging sources used during oil exploration operations. The prevalence of these sources, coupled with their portability, is a legitimate security concern. The energy exploration industry has well established safety and security protocols and the IRTR Program seeks to build on this foundation. However, the IRTR Program does not have sufficient resources to address the issue without industry assistance, so it is looking to the oil and gas industry to help identify alternative means for accomplishing our mutual objectives. This paper describes

  16. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  17. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  18. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  19. BUILDING e-CLUSTERS

    OpenAIRE

    Milan Davidovic

    2013-01-01

    E-clusters are strategic alliance in TIMES technology sector (Telecommunication, Information technology, Multimedia, Entertainment, Security) where products and processes are digitalized. They enable horizontal and vertical integration of small and medium companies and establish new added value e-chains. E-clusters also build supply chains based on cooperation relationship, innovation, organizational knowledge and compliance of intellectual properties. As an innovative approach for economic p...

  20. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  1. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  2. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  3. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  4. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  5. Insights in public health: Building support for an evidence-based teen pregnancy and sexually transmitted infection prevention program adapted for foster youth.

    Science.gov (United States)

    Smith, Tamara; Clark, Judith F; Nigg, Claudio R

    2015-01-01

    Hawai'i Youth Services Network (HYSN) was founded in 1980 and is incorporated as a 501(c) (3) organization. HYSN plays a key role in the planning, creation, and funding of local youth services. One of HYSN's focuses is teen pregnancy and sexually transmitted infections (STI) prevention among foster youth. Foster youth are at a greater risk for teen pregnancy and STI due to a variety of complex factors including instability, trauma, and emancipation from the foster care system. This article highlights how HYSN is leveraging both federal and local funding, as well as other resources, in order to implement an evidence-based teen pregnancy and STI prevention program adapted for foster youth.

  6. Communication of Ergonomics in building and construction.

    Science.gov (United States)

    Wiberg, Viveca

    2012-01-01

    For the coming years SWEA is planning for communication and information actions. One of the sectors concerned is the building and construction industry. Focus of the information is to avoid accidents and injuries, and how companies by themselves can prevent risks. The objective of the information is to increase awareness among all stakeholders in order to secure that they are willing and able to reduce risks for workers. At the conference two brochures will be presented. They are designed to provide information and knowledge about specific risks of occupational accidents and occupational diseases which occur frequently during construction work and how they can be prevented. They are directed to all those who are involved in the construction process at different stages and who are subject to SWEAs rules and regulations. New identified risk groups are e.g. students, apprentices, self-employed, and foreign workers temporarily working in Sweden. We also see that work is still being carried out in narrow installation spaces during erection stage of buildings because the people responsible for the drawings do not take notice of the need for sufficient space to do the work. SWEA experienced that it is difficult to reach all the groups concerned with the message about how to avoid injuries and unnecessary musculoskeletal disorders.

  7. Non Security – Premise of Cybercrime

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2012-04-01

    Full Text Available It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for information security management.

  8. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  9. Strengthening nuclear security

    International Nuclear Information System (INIS)

    Kurihara, Hiroyoshi

    2003-01-01

    The international situation after the end of the Cold-War has been quite unstable, due to the occurrence of frequent regional conflicts and domestic wars based on ethnic, religious or racial reasons. Further, threats to the would peace and security by non-state actors, like international terrorist groups, have been recognized after 9.11 terrorist attacks to the World Trade Center buildings and to the Pentagon. Utilization of nuclear energy, which encompasses both peaceful uses and military ones, required an establishment of regulatory system, by which risks associated with the development of nuclear energy can be controlled. Accordingly, nuclear safety control system, and then non-proliferation control system has been developed, both in the international level and notional level. In recognition of the present unstable international situations, it is required to establish, maintain and strengthen a system which control nuclear security aspect, in addition to the present systems. (author)

  10. Spaces of Global Security: Beyond Methodological Nationalism

    OpenAIRE

    Adamson , Fiona B.

    2016-01-01

    The changing political and social meanings of space under conditions of advanced globalization point to the need to analyze security – or the deployment and management of violence -- as a socio-spatial practice. This article draws attention to the “methodological nationalist” bias that has traditionally characterized mainstream security studies, and discusses its effect on how security issues are studied and conceptualized. Building on insights from political geography and sociology, the arti...

  11. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  12. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  13. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  14. Building America

    Energy Technology Data Exchange (ETDEWEB)

    Brad Oberg

    2010-12-31

    IBACOS researched the constructability and viability issues of using high performance windows as one component of a larger approach to building houses that achieve the Building America 70% energy savings target.

  15. Building calculations

    DEFF Research Database (Denmark)

    Jensen, Bjarne Christian; Hansen, Svend Ole

    Textbook on design of large panel building including rules on robustness and a method for producing the Statical documentattion......Textbook on design of large panel building including rules on robustness and a method for producing the Statical documentattion...

  16. The Building Resiliency and Vocational Excellence (BRAVE) Program: a violence-prevention and role model program for young, African American males.

    Science.gov (United States)

    Griffin, James P

    2005-11-01

    There are sharp disparities between non-Hispanic Whites and African Americans in mortality and years of potential life lost for numerous health-related conditions, including HIV/AIDS. The Building Resiliency and Vocational Excellence (BRAVE) Program is an intervention using Resiliency Networking designed for use with African American young men to help offset these disparities. Resiliency Networking incorporates coaching, career planning, and re-definition of gender roles to help young men develop a sense of purpose and future and to manage their lifestyles effectively. In addition to fostering a strong link with an older mentor, the program fosters healthy peer-to-peer relationships. The paper reports on preliminary use of the intervention and recommends future applications.

  17. [Prevention of psychosocial issues and drug addiction in workers employed in building great infrastructures: first outcomes of an experience in the Florence area].

    Science.gov (United States)

    Carpentiero, L; Costa, G; De Luca, G; Piovanelli, S; Venè, D; Righini, S; Marini, M; Baldanzi, S; Selvi, A; Scalas, S; Cassitto, M G; Sartori, S; Lacangellera, D; Bosco, A

    2009-01-01

    The research on stress, mobbing, and substance dependence in workers employed in the building of the great infrastructures is part of the project Euridice-Ten. The 75% of the workers employed took part in the research through an anonymous and structured questionnaire. The Clinica del Lavoro of the University of Milan elaborated the data. They point out a high risk of stress, a low level of control, a marked risk of mobbing, a high chronic fatigue in the most exhausting jobs, sleep disorders, problems in the social life as well as at home, in nourishment and at work. Many workers drink too much alcohol and the 9% of the workers know workers who use cocaine.

  18. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  19. Solar building

    OpenAIRE

    Zhang, Luxin

    2014-01-01

    In my thesis I describe the utilization of solar energy and solar energy with building integration. In introduction it is also mentioned how the solar building works, trying to make more people understand and accept the solar building. The thesis introduces different types of solar heat collectors. I compared the difference two operation modes of solar water heating system and created examples of solar water system selection. I also introduced other solar building applications. It is conv...

  20. Building envelope

    CSIR Research Space (South Africa)

    Gibberd, Jeremy T

    2009-01-01

    Full Text Available for use in the building. This is done through photovoltaic and solar water heating panels and wind turbines. Ideally these are integrated in the design of the building envelope to improve the aesthetic quality of the building and minimise material... are naturally ventilated. Renewable energy The building envelope includes renewable energy generation such as photovoltaics, wind turbines and solar water heaters and 10% of the building’s energy requirements are generated from these sources. Views All...

  1. Public health capacity building in southeastern Europe: a partnership between the Open Society Institute and the US Centers for Disease Control and Prevention.

    Science.gov (United States)

    Simmons, Noah; Brborovic, Ognjen; Fimka, Tozija; Robie, Brian D; Bull, David L; Spasovski, Mome; Baker, Edward L

    2005-01-01

    The political disintegration of former Yugoslavia inaugurated in 1991 resulted in the decentralization of health systems in the federation's successor nation-states. Efforts by the Open Society Institute improved public health planning and management needs consequent to health sector changes. Beginning in Croatia in 2001, the Institute developed ongoing collaborations between Andrija Stampar School of Public Health and the US Centers for Disease Control and Prevention. In 2003 and 2004, it expanded its project to include the republics of Macedonia and of Serbia and Montenegro.

  2. Auxiliary buildings

    International Nuclear Information System (INIS)

    Lakner, I.; Lestyan, E.

    1979-01-01

    The nuclear power station represents a complicated and a particular industrial project. Consequently, the design of the auxiliary buildings serving the power station (offices, kitchen, refreshment room, workshops, depots, water treatment plant building, boiler houses, etc.) requires more attention than usual. This chapter gives a short survey of the auxiliary buildings already completed and discusses the problems of their design, location and structure. (author)

  3. Building 2000

    International Nuclear Information System (INIS)

    Den Ouden, C.; Steemers, T.C.

    1992-01-01

    This is the first volume of Building 2000, a pilot project of the Commission's R and D-programme 'Solar Energy Applications to Buildings' with the purpose of encouraging the adoption of solar architecture in large buildings. In this first rich illustrated volume the results of the design studies illustrating passive solar architecture in buildings in the European Community are presented in particular for the building categories as mentioned in the subtitle. In a second volume, a similar series of studies is presented for the building categories: office buildings, public buildings and hotels and holiday complexes. Several Design Support Workshops were organized during the Building 2000 programme during which Building 2000 design teams could directly exchange ideas with the various design advice experts represented at these workshops. In the second part of the Building 2000 final report a summary of a selection of many reports is presented (15 papers), as produced by Design Support experts. Most of the design support activities resulted in changes of the various designs, as have been reported by the design teams in the brochures presented in the first part of this book. It is to be expected that design aids and simulation tools for passive solar options, daylighting concepts, comfort criteria etc., will be utilized more frequently in the future. This will result in a better exchange of information between the actual design practitioners and the European R and D community. This technology transfer will result in buildings with a higher quality with respect to energy and environmental issues

  4. Building 2000

    Energy Technology Data Exchange (ETDEWEB)

    Den Ouden, C [EGM Engineering BV, Dordrecht (Netherlands); Steemers, T C [Commission of the European Communities, Brussels (Belgium)

    1992-01-01

    This is the first volume of Building 2000, a pilot project of the Commission's R and D-programme 'Solar Energy Applications to Buildings' with the purpose of encouraging the adoption of solar architecture in large buildings. In this first rich illustrated volume the results of the design studies illustrating passive solar architecture in buildings in the European Community are presented in particular for the building categories as mentioned in the subtitle. In a second volume, a similar series of studies is presented for the building categories: office buildings, public buildings and hotels and holiday complexes. Several Design Support Workshops were organized during the Building 2000 programme during which Building 2000 design teams could directly exchange ideas with the various design advice experts represented at these workshops. In the second part of the Building 2000 final report a summary of a selection of many reports is presented (15 papers), as produced by Design Support experts. Most of the design support activities resulted in changes of the various designs, as have been reported by the design teams in the brochures presented in the first part of this book. It is to be expected that design aids and simulation tools for passive solar options, daylighting concepts, comfort criteria etc., will be utilized more frequently in the future. This will result in a better exchange of information between the actual design practitioners and the European R and D community. This technology transfer will result in buildings with a higher quality with respect to energy and environmental issues.

  5. Introduction to network security

    CERN Document Server

    Jacobson, Douglas

    2008-01-01

    … Students can easily understand how things work thanks to the different figures/definitions … students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. … A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. … the book is really well written, and easily understandable without lackin

  6. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  7. Prototype system of secure VOD

    Science.gov (United States)

    Minemura, Harumi; Yamaguchi, Tomohisa

    1997-12-01

    Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.

  8. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  9. Security in the nuclear medicine department

    International Nuclear Information System (INIS)

    Bassingham, S.; Gane, J.; Chan, P.S.; Heenan, S.; Gulliver, N.; McVey, J.

    2005-01-01

    The current threat from terrorism highlights the need for awareness of adequate security of radioactive sources by health bodies to prevent the opportunistic access to, theft of. or accidental loss of sources, together with stringent security measures in place to prevent the international misuse of radioactive sources as a weapon by unauthorised access. This presentation discusses the processes undertaken to ensure the safety and security of radioactive materials within the nuclear medicine department in line with current regulations and guidelines. These include risk assessments, security systems, audit trails, restricted access and personnel background checks

  10. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  11. Strengthening Capacity to Respond to Computer Security Incidents ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... in the form of spam, improper access to confidential data and cyber theft. ... These teams are usually known as computer security incident response teams ... regional capacity for preventing and responding to cyber security incidents in Latin ...

  12. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  13. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  14. Are food insecurity's health impacts underestimated in the U.S. population? Marginal food security also predicts adverse health outcomes in young U.S. children and mothers.

    Science.gov (United States)

    Cook, John T; Black, Maureen; Chilton, Mariana; Cutts, Diana; Ettinger de Cuba, Stephanie; Heeren, Timothy C; Rose-Jacobs, Ruth; Sandel, Megan; Casey, Patrick H; Coleman, Sharon; Weiss, Ingrid; Frank, Deborah A

    2013-01-01

    This review addresses epidemiological, public health, and social policy implications of categorizing young children and their adult female caregivers in the United States as food secure when they live in households with "marginal food security," as indicated by the U.S. Household Food Security Survey Module. Existing literature shows that households in the US with marginal food security are more like food-insecure households than food-secure households. Similarities include socio-demographic characteristics, psychosocial profiles, and patterns of disease and health risk. Building on existing knowledge, we present new research on associations of marginal food security with health and developmental risks in young children (security is positively associated with adverse health outcomes compared with food security, but the strength of the associations is weaker than that for food insecurity as usually defined in the US. Nonoverlapping CIs, when comparing odds of marginally food-secure children's fair/poor health and developmental risk and caregivers' depressive symptoms and fair/poor health with those in food-secure and -insecure families, indicate associations of marginal food security significantly and distinctly intermediate between those of food security and food insecurity. Evidence from reviewed research and the new research presented indicates that households with marginal food security should not be classified as food secure, as is the current practice, but should be reported in a separate discrete category. These findings highlight the potential underestimation of the prevalence of adverse health outcomes associated with exposure to lack of enough food for an active, healthy life in the US and indicate an even greater need for preventive action and policies to limit and reduce exposure among children and mothers.

  15. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  16. Maintenance Planning for Historic Buildings

    Directory of Open Access Journals (Sweden)

    Diana Plian

    2008-01-01

    Full Text Available The key to good maintenance of historic buildings is a long-range maintenance plan. Long-range planning recognizes a responsibility to the future to prolong the useful life of a building by preserving it in its present condition and preventing or slowing deterioration and damage from natural or other causes.

  17. Cryptographic Combinatorial Securities Exchanges

    Science.gov (United States)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  18. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  19. Building 2000

    International Nuclear Information System (INIS)

    Den Ouden, C.; Steemers, T.C.

    1992-01-01

    This is the second volume of Building 2000, a pilot project of the Commission's R and D-programme 'Solar Energy Applications to Buildings' with the purpose of encouraging the adoption of solar architecture in large buildings. In this second rich illustrated volume the results of the design studies illustrating passive solar architecture in buildings in the European Community are presented in particular for the building categories as mentioned in the subtitle. In the first volume, a similar series of studies is presented for the building categories: schools, laboratories and universities, and sports and educational centres. Several Design Support Workshops were organized during the Building 2000 programme during which Building 2000 design teams could directly exchange ideas with the various design advice experts represented at these workshops. In the second part of the Building 2000 final report a summary of a selection of many reports is presented (11 papers), as produced by Design Support experts. Most of the design support activities resulted in changes of the various designs, as have been reported by the design teams in the brochures presented in the first part of this book. It is to be expected that design aids and simulation tools for passive solar options, daylighting concepts, comfort criteria etc., will be utilized more frequently in the future. This will result in a better exchange of information between the actual design practitioners and the European R and D community. This technology transfer will result in buildings with a higher quality with respect to energy and environmental issues

  20. Building 2000

    Energy Technology Data Exchange (ETDEWEB)

    Den Ouden, C [EGM Engineering BV, Dordrecht (Netherlands); Steemers, T C [Commission of the European Communities, Brussels (Belgium)

    1992-01-01

    This is the second volume of Building 2000, a pilot project of the Commission's R and D-programme 'Solar Energy Applications to Buildings' with the purpose of encouraging the adoption of solar architecture in large buildings. In this second rich illustrated volume the results of the design studies illustrating passive solar architecture in buildings in the European Community are presented in particular for the building categories as mentioned in the subtitle. In the first volume, a similar series of studies is presented for the building categories: schools, laboratories and universities, and sports and educational centres. Several Design Support Workshops were organized during the Building 2000 programme during which Building 2000 design teams could directly exchange ideas with the various design advice experts represented at these workshops. In the second part of the Building 2000 final report a summary of a selection of many reports is presented (11 papers), as produced by Design Support experts. Most of the design support activities resulted in changes of the various designs, as have been reported by the design teams in the brochures presented in the first part of this book. It is to be expected that design aids and simulation tools for passive solar options, daylighting concepts, comfort criteria etc., will be utilized more frequently in the future. This will result in a better exchange of information between the actual design practitioners and the European R and D community. This technology transfer will result in buildings with a higher quality with respect to energy and environmental issues.

  1. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  2. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  3. What kind of cyber security? Theorising cyber security and mapping approaches

    Directory of Open Access Journals (Sweden)

    Laura Fichtner

    2018-05-01

    Full Text Available Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.

  4. Challenges of human resource capacity building assistance

    International Nuclear Information System (INIS)

    Noro, Naoko

    2013-01-01

    At the first Nuclear Security Summit in Washington DC in 2010, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency was established based on Japan's National Statement which expressed Japan's strong commitment to contribute to the strengthening of nuclear security in Asian region. ISCN began its activities from JFY 2011. One of the main activities of ISCN is human resource capacity building support. Since JFY 2011, ISCN has offered various nuclear security training courses, seminars and workshops and total number of the participants to the ISCN's event reached more than 700. For the past three years, ISCN has been facing variety of challenges of nuclear security human resource assistance. This paper will briefly illustrate ISCN's achievement in the past years and introduce challenges and measures of ISCN in nuclear security human resource capacity building assistance. (author)

  5. Constructing Secure Mobile Agent Systems Using the Agent Operating System

    NARCIS (Netherlands)

    van t Noordende, G.J.; Overeinder, B.J.; Timmer, R.J.; Brazier, F.M.; Tanenbaum, A.S.

    2009-01-01

    Designing a secure and reliable mobile agent system is a difficult task. The agent operating system (AOS) is a building block that simplifies this task. AOS provides common primitives required by most mobile agent middleware systems, such as primitives for secure communication, secure and

  6. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  7. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  8. "Make Sure You're Not Getting Yourself in Trouble:" Building Sexual Relationships and Preventing Sexual Violence at the U.S. Military Academy at West Point.

    Science.gov (United States)

    Arbeit, Miriam R

    2017-10-01

    Sexual violence continues to present a problem on college campuses nationwide and among members of the U.S. military. This study attended to patterns of response in how students (cadets) at the U.S. Military Academy (West Point) discussed sexual and romantic relationships, both potential and actual, in order to examine how, if at all, they enact their sexuality-related values. Constructivist grounded theory was used to analyze semistructured interviews with three male and three female cadets from each of the 4 years of the undergraduate program, in which they are intended to become "leaders of character" who will serve as Army officers. Findings indicated limitations in cadets' access to developing and implementing sexuality-related skills within this context. Cadets' fear and distrust erected barriers to their pursuing their desires; the ways in which cadets avoided getting in trouble for sexual harassment or sexual assault shifted responsibility from a potential perpetrator onto a potential victim; and cadets were caught in dilemmas regarding romantic relationships as sources of both emotional support and social stigma. These findings have implications for promoting gender equity and for preventing sexual violence at this institution and at others like it, including both university campuses and other military settings.

  9. Using an opinion poll to build an obesity-prevention social marketing campaign for low-income Asian and Hispanic immigrants: report of findings.

    Science.gov (United States)

    Sugerman, Sharon; Backman, Desiree; Foerster, Susan B; Ghirardelli, Alyssa; Linares, Amanda; Fong, Amy

    2011-01-01

    To gain opinions from low-income, limited-English-speaking Hispanic and Asian immigrants for formative research in a social marketing campaign. Nineteen questions on obesity prevention-related topics were embedded into a larger random digit-dial survey investigating the effects of language and cultural barriers on health care access. Participants were selected by ethnic encoding from consumer databases. California's northern, southern, and Central Valley regions. Nine hundred and five adult Hispanic, Chinese, Vietnamese, Hmong, and Korean Californians from households Media usage, food stamp participation, health insurance, health problems, access and availability of fruits and vegetables (FVs) and physical activity, beliefs about overweight, and related regulation and policy change. Descriptive statistics and percentages for all questions. Latinos reported receiving most information from television; Hmong from radio. Hispanics, Koreans, and Vietnamese thought diabetes was the greatest health issue in California. Among Hmong, 83% thought FVs were too expensive, and 49% of Vietnamese thought good quality, affordable fresh FVs were too hard to find. Identifying characteristics and opinions that distinguish these ethnic immigrant populations better enables the Network for a Healthy California to develop culturally relevant social marketing campaigns and materials. Copyright © 2011 Society for Nutrition Education. Published by Elsevier Inc. All rights reserved.

  10. Keeping electronic records secure.

    Science.gov (United States)

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  11. Report on Security 82

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    The 1982 trade fair Security 82 presented a variety of equipment and systems for protection and security in general. Apart from physical protection devices to prevent theft, a great number of fire protection devices, transmitting apparatus, locator systems, metal detectors, protective devices against signal interception, and complete alarm systems were exhibited and explained. By means of specifications and brief descriptions, sometimes with figures, predominantly passive and active infrared sensors, light and microwave sensors, ultrasound and microwave Doppler effect devices for indoor and outdoor physical protection, as well as other alarm systems and fire alarm systems or entry control systems are presented in this report. Design and functioning mode of the equipment presented are illustrated by explaining the fields of employment. (orig.) [de

  12. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  13. Laboratory Building

    Energy Technology Data Exchange (ETDEWEB)

    Herrera, Joshua M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-03-01

    This report is an analysis of the means of egress and life safety requirements for the laboratory building. The building is located at Sandia National Laboratories (SNL) in Albuquerque, NM. The report includes a prescriptive-based analysis as well as a performance-based analysis. Following the analysis are appendices which contain maps of the laboratory building used throughout the analysis. The top of all the maps is assumed to be north.

  14. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  15. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  16. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  17. Building information for systematic improvement of the prevention of hospital-acquired pressure ulcers with statistical process control charts and regression.

    Science.gov (United States)

    Padula, William V; Mishra, Manish K; Weaver, Christopher D; Yilmaz, Taygan; Splaine, Mark E

    2012-06-01

    To demonstrate complementary results of regression and statistical process control (SPC) chart analyses for hospital-acquired pressure ulcers (HAPUs), and identify possible links between changes and opportunities for improvement between hospital microsystems and macrosystems. Ordinary least squares and panel data regression of retrospective hospital billing data, and SPC charts of prospective patient records for a US tertiary-care facility (2004-2007). A prospective cohort of hospital inpatients at risk for HAPUs was the study population. There were 337 HAPU incidences hospital wide among 43 844 inpatients. A probit regression model predicted the correlation of age, gender and length of stay on HAPU incidence (pseudo R(2)=0.096). Panel data analysis determined that for each additional day in the hospital, there was a 0.28% increase in the likelihood of HAPU incidence. A p-chart of HAPU incidence showed a mean incidence rate of 1.17% remaining in statistical control. A t-chart showed the average time between events for the last 25 HAPUs was 13.25 days. There was one 57-day period between two incidences during the observation period. A p-chart addressing Braden scale assessments showed that 40.5% of all patients were risk stratified for HAPUs upon admission. SPC charts complement standard regression analysis. SPC amplifies patient outcomes at the microsystem level and is useful for guiding quality improvement. Macrosystems should monitor effective quality improvement initiatives in microsystems and aid the spread of successful initiatives to other microsystems, followed by system-wide analysis with regression. Although HAPU incidence in this study is below the national mean, there is still room to improve HAPU incidence in this hospital setting since 0% incidence is theoretically achievable. Further assessment of pressure ulcer incidence could illustrate improvement in the quality of care and prevent HAPUs.

  18. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  19. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  1. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  2. Secure Business Process Engineering: a socio-technical approach

    OpenAIRE

    Salnitri, Mattia

    2016-01-01

    Dealing with security is a central activity for todays organizations. Security breaches impact on the activities executed in organizations, preventing them to execute their business processes and, therefore, causing millions of dollars of losses. Security by design principles underline the importance of considering security as early as during the design of organizations to avoid expensive fixes during later phases of their lifecycle. However, the design of secure business processes cannot tak...

  3. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  4. International security and arms control

    International Nuclear Information System (INIS)

    Ekeus, R.

    2000-01-01

    The end of the cold war also ended the focus on the bilateral approach to arms control and disarmament. Key concepts of security needed to be revisited, along with their implications for the disarmament and arms control agenda. Though there is currently a unipolar global security environment, there remain important tasks on the multilateral arms control agenda. The major task is that of reducing and eliminating weapons of mass destruction, especially nuclear weapons. The author contends that maintaining reliance on the nuclear-weapons option makes little sense in a time when the major Powers are strengthening their partnerships in economics, trade, peacemaking and building. (author)

  5. Building Air Quality Guide: A Guide for Building Owners and Facility Managers

    Science.gov (United States)

    The Building Air Quality, developed by the EPA and the National Institute for Occupational Safety and Health, provides practical suggestions on preventing, identifying, and resolving indoor air quality (IAQ) problems in public and commercial buildings.

  6. MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

    OpenAIRE

    Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan

    2011-01-01

    Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is...

  7. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  8. Building a capacity building manual

    CSIR Research Space (South Africa)

    Clinton, DD

    2010-02-01

    Full Text Available Organizations 2010 Building a capacity building manual Daniel D. Clinton, Jr., P.E., F.NSPE Chair, WFEO Capacity Building Committee Dr Andrew Cleland, FIPENZ, Chief Executive, IPENZ, NZ Eng David Botha, FSAICE, Executive Director, SAICE, SA Dawit... 2010 Tertiary level University curricula Coaches and mentors Facilities EXCeeD Remuneration of Academics Experiential training Outreach to Students Students chapters Young members forum World Federation of Engineering Organizations 2010 Post...

  9. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  10. Assessing Security Cooperation as a Preventive Tool

    Science.gov (United States)

    2014-01-01

    Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by...deductible charitable contribution at www.rand.org/giving/contribute.html R® is a registered trademark © Copyright 2014 RAND Corporation This document...OECD—See Organisation for Economic Co-Operation and Development. Organisation for Economic Co-Operation and Development, Development Assistance

  11. Homeland Security: Air Passenger Prescreening and Counterterrorism

    National Research Council Canada - National Science Library

    Elias, Bart; Krouse, William; Rappaport, Ed

    2005-01-01

    ... of their persons or baggage, or to prevent them from boarding an aircraft in the event of a terrorist watch list hit, is likely to be a difficult proposition for the federal agencies tasked with aviation security...

  12. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  13. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  14. Security issues in a parking facility.

    Science.gov (United States)

    Gutman, Abraham; Lew, I Paul

    2009-01-01

    Active security supported by passive security measures which are part of the physical design of a parking facility are essential to preventing crimes from happening wherever and whenever possible, the authors maintain. In the article, they focus on design elements which can be most effective in discouraging potential perpetrators.

  15. Secure Communication using Identity Based Encryption

    NARCIS (Netherlands)

    Roschke, Sebastian; Ibraimi, L.; Cheng, Feng; Meinel, Christoph

    2010-01-01

    Secured communication has been widely deployed to guarantee confidentiality and integrity of connections over untrusted networks, e.g., the Internet. Although secure connections are designed to prevent attacks on the connection, they hide attacks inside the channel from being analyzed by Intrusion

  16. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  17. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  18. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  19. Security Guarantees and Nuclear Non-Proliferation

    International Nuclear Information System (INIS)

    Bruno Tertrais

    2011-01-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  20. Security Guarantees and Nuclear Non-Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bruno Tertrais

    2011-07-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  1. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  2. Marital Biography, Social Security Receipt, and Poverty.

    Science.gov (United States)

    Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.

  3. A Security Approach in System Development Life Cycle

    OpenAIRE

    P.Mahizharuvi; Dr.Alagarsamy

    2011-01-01

    Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today have a wide reach, security has become a more important factor than ever in the history of software engineering can no longer be treated as Separ...

  4. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  5. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  6. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  7. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  8. Building sustainability

    CSIR Research Space (South Africa)

    Mass Media

    2007-11-01

    Full Text Available particu- lar social environment also being awarded. If a building can be used by the community after hours, it should be awarded extra points.” School sports facilities or meeting halls in corporate buildings, are some example. Multi-purpose use..., architect and senior researcher for the CSIR’s Built Environment Unit, the integra- tion of sustainability in building design cannot begin soon enough before it is too late. He says: “Unfortunately nothing is in place in South Africa. For a start...

  9. Building Acoustics

    Science.gov (United States)

    Cowan, James

    This chapter summarizes and explains key concepts of building acoustics. These issues include the behavior of sound waves in rooms, the most commonly used rating systems for sound and sound control in buildings, the most common noise sources found in buildings, practical noise control methods for these sources, and the specific topic of office acoustics. Common noise issues for multi-dwelling units can be derived from most of the sections of this chapter. Books can be and have been written on each of these topics, so the purpose of this chapter is to summarize this information and provide appropriate resources for further exploration of each topic.

  10. New computer security campaign

    CERN Multimedia

    Alizée Dauvergne

    2010-01-01

    A new campaign is taking shape to promote computer security. The slogan “SEC_RITY is not complete without U!” reminds users of the importance of their contribution. The campaign kicks off on 10 June with a public awareness day in the Council Chamber.   The new campaign, organised by CERN’s computer security team, will focus on prevention and involving the user. “This is an education and awareness-raising campaign for all users at CERN,” explains Stefan Lueders, in charge of computer security. “Every day, we register thousands of computer attacks against CERN: there are attempts to tamper with web pages, hack into user accounts, take over servers, and much more. A successful attack could mean confidential user information being divulged, services being interrupted or data being lost. It could even affect operations at CERN. Another factor is the damage that a successful attack could inflict on the Organization’s reputation. &...

  11. Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    Directory of Open Access Journals (Sweden)

    Errol A. Blake

    2007-12-01

    Full Text Available Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach.

  12. Mycotoxins in building materials

    DEFF Research Database (Denmark)

    Nielsen, Kristian Fog; Frisvad, Jens Christian

    2011-01-01

    as in future energy efficient buildings. It brings together different disciplinary points of view on indoor mold, ranging from physics and material science to microbiology and health sciences. The contents have been outlined according to three main issues: Fundamentals, particularly addressing the crucial...... roles of water and materials, Health, including a state-of-the-art description of the health-related effects of indoor molds, and Strategies, integrating remediation, prevention and policies....

  13. Crisis management and crisis prevention

    International Nuclear Information System (INIS)

    Wallensteen, P.

    1988-01-01

    This paper reports that many proposals have come forth to ease the tension between East and West. Some focus on arms developments, others take up diplomatic issues. In addition, some have raised the question of crisis management and crisis prevention. Can crises be prevented even before they have taken place? The Palme Commission on Disarmament and Security suggested, in its 1982 report, ways of restraining superpower involvement in Third World conflicts. Such conflicts, it was argued, could escalate and ultimately result in nuclear confrontation between the United States and the Soviet Union. Certainly, the commission also paid attention to conflicts over issues in Europe and to problems in Eastern or in Western Europe. However, the commission raised a question that lately has received increasing attention: the dangers of superpower confrontation over Third World issues. In his statement to the United Nations on 24 October 1985, President Regan pointed to the need for settling regional conflicts as they play a large role in building suspicions and tensions. Regan's initiative explicitly concerned Afghanistan, Cambodia, Ethiopia, Angola and Nicaragua. It included negotiations with the Soviet Union over Afghanistan, and, at a later stage, also over other issues. The goal, he the, was not to force a settlement on the parties. The initiative concerned issues that have for the American public, justified armaments and reduced Soviet credibility

  14. Building Data

    Data.gov (United States)

    Town of Cary, North Carolina — Explore real estate information about buildings in the Town of Cary.This file is created by the Town of Cary GIS Group. It contains data from both the Wake, Chatham...

  15. Smart Buildings: An Introduction to the Library of the Future.

    Science.gov (United States)

    Hoy, Matthew B

    2016-01-01

    Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.

  16. Museum security and the Thomas Crown Affair.

    Energy Technology Data Exchange (ETDEWEB)

    Michaud, E. C. (Nuclear Engineering Division)

    2010-01-01

    Over the years, I've daydreamed about stealing a Vermeer, a Picasso, or Rembrandt. It tickles me, as much as watching the reboot of The Thomas Crown Affair. Why is it, do you suppose, so much fun to think about stealing a world renowned piece off the wall of a major metropolitan museum? Is it the romantic thoughts of getting away with it, walking past infrared detectors, and pressure sensors ala Indiana Jones with the sack of sand to remove the idol without triggering the security system? Is it the idea of snatching items with such fantastic prices, where the romance of possessing an item of such value is less intoxicating than selling it to a private collector for it to never be seen again? I suspect others share my daydreams as they watch theater or hear of a brazen daylight heist at museums around the world, or from private collections. Though when reality sets in, the mind of the security professional kicks in. How could one do it, why would one do it, what should you do once it's done? The main issue a thief confronts when acquiring unique goods is how to process or fence them. They become very difficult to sell because they are one-of-a-kind, easy to identify, and could lead to the people involved with the theft. The whole issue of museum security takes up an ironic twist when one considers the secretive British street artist 'Banksy'. Banksy has made a name for himself by brazenly putting up interesting pieces of art in broad daylight (though many critics don't consider his work to be art) on building walls, rooftops, or even museums. I bring him up for a interesting take on what may become a trend in museum security. In March of 2005, Banksy snuck a piece of his called 'Vandalized Oil Painting' into the Brooklyn Museum's Great Historical Painting Wing, plus 3 other pieces into major museums in New York. Within several days, 2 paintings had been torn down, but 2 stayed up much longer. In his home country of the UK, a

  17. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  18. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  19. Early Learning Left Out: Building an Early-Learning System to Secure America's Future. Federal, State and School District Investments by Child Age. 4th Edition. 2010-2012

    Science.gov (United States)

    Bruner, Charles

    2013-01-01

    As a society, are we investing enough in our youngest children? The BUILD Initiative's latest report, Early Learning Left Out, by CFPC director Charles Bruner, provides a clear answer that current investments fall far short. The report draws upon the most recent federal, state, and public school budget information--and what we know about effective…

  20. The Justice of Preventive War

    National Research Council Canada - National Science Library

    Stephenson, Henry

    2004-01-01

    In response to the 9/11 attacks and continuing threats of mass-casualty terrorism, the United States has adopted a new security strategy that emphasizes anticipatory actions, including preventive war...

  1. Cooling off health security hot spots: getting on top of it down under.

    Science.gov (United States)

    Murray, Kris A; Skerratt, Lee F; Speare, Rick; Ritchie, Scott; Smout, Felicity; Hedlefs, Robert; Lee, Jonathan

    2012-11-01

    Australia is free of many diseases, pests and weeds found elsewhere in the world due to its geographical isolation and relatively good health security practices. However, its health security is under increasing pressure due to a number of ecological, climatic, demographic and behavioural changes occurring globally. North Queensland is a high risk area (a health security hot spot) for Australia, due in part to its connection to neighbouring countries via the Torres Strait and the Indo-Papuan conduit, its high diversity of wildlife reservoirs and its environmental characteristics. Major outbreaks of exotic diseases, pests and weeds in Australia can cost in excess of $1 billion; however, most expenditure on health security is reactive apart from preventive measures undertaken for a few high profile diseases, pests and weeds. Large gains in health security could therefore be made by spending more on pre-emptive approaches to reduce the risk of outbreaks, invasion/spread and establishment, despite these gains being difficult to quantify. Although biosecurity threats may initially have regional impacts (e.g. Hendra virus), a break down in security in health security hot spots can have national and international consequences, as has been seen recently in other regions with the emergence of SARS and pandemic avian influenza. Novel approaches should be driven by building research and management capacity, particularly in the regions where threats arise, a model that is applicable both in Australia and in other regions of the world that value and therefore aim to improve their strategies for maintaining health security. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  3. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  4. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  5. Structural building screening and evaluation

    Science.gov (United States)

    Kurniawandy, Alex; Nakazawa, Shoji; Hendry, Andy; Ridwan, Firdaus, Rahmatul

    2017-10-01

    An earthquake is a disaster that can be harmful to the community, such as financial loss and also dead injuries. Pekanbaru is a city that located in the middle of Sumatera Island. Even though the city of Pekanbaru is a city that rarely occurs earthquake, but Pekanbaru has ever felt the impact of the big earthquake that occurred in West Sumatera on September 2009. As we know, Indonesia located between Eurasia plate, Pacific plate, and Indo-Australian plate. Particularly the Sumatera Island, It has the Semangko fault or the great Sumatra fault along the island from north to south due to the shift of Eurasia and Indo-Australian Plates. An earthquake is not killing people but the building around the people that could be killing them. The failure of the building can be early prevented by doing an evaluation. In this research, the methods of evaluation have used a guideline for the Federal Emergency Management Agency (FEMA) P-154 and Applied Technology Council (ATC) 40. FEMA P-154 is a rapid visual screening of buildings for potential seismic hazards and ATC-40 is seismic evaluation and retrofit of Concrete Buildings. ATC-40 is a more complex evaluation rather than FEMA P-154. The samples to be evaluated are taken in the surroundings of Universitas Riau facility in Pekanbaru. There are four buildings as case study such as the rent student building, the building of mathematics and natural science faculty, the building teacher training and education faculty and the buildings in the faculty of Social political sciences. Vulnerability for every building facing an earthquake is different, this is depending on structural and non-structural components of the building. Among all of the samples, only the building of mathematics and the natural science faculty is in critical condition according to the FEMA P-154 evaluation. Furthermore, the results of evaluation using ATC-40 for the teacher training building are in damage control conditions, despite the other three buildings are

  6. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  7. Cyber-crime Science = Crime Science + Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality,

  8. Information Security for Business: the Necessity of Reputational Risk Management

    Directory of Open Access Journals (Sweden)

    Vitaly Eduardovich Dorokhov

    2015-06-01

    Full Text Available The article presents the analysis of actual information security problems in commercial segment. The main directions in regulations of the Russian Federation connected with information security assurance are defined. The results indicate the insufficiency of legal regulation in prevention of reputational losses due to information security incidents

  9. Rethinking EU energy security considering past trends and future prospects

    NARCIS (Netherlands)

    Amineh, Mehdi P.; Crijns - Graus, Wina

    2014-01-01

    EU energy policy objectives are directed at three highly interdependent areas: energy supply security, competitiveness and decarbonization to prevent climate change. In this paper, we focus on the issue of energy supply security. Security of energy supply for the immediate and medium-term future is

  10. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  11. Infrared: A Key Technology for Security Systems

    OpenAIRE

    Corsi, Carlo

    2012-01-01

    Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due...

  12. Evaluating and projecting the European security system

    International Nuclear Information System (INIS)

    Dean, J.

    1991-01-01

    Components of the new European security system are described taking into account the new policy making and possibilities to resolve conflicts. Programmes for political and economic integration and co-operation managed by the European Community will provide main positive content of the new European security system. An insight of the future of nuclear armaments in Europe is included together with confidence building measure and the role of NATO

  13. Crime prevention by urban planning and building

    DEFF Research Database (Denmark)

    Grønlund, Bo; Soomeren, Paul van

    2001-01-01

    Forslag til europæisk normtekst færdiggjort i marts/april 2002. Om kriminalpræventiv by- og bebyggelsesplanlægning. Indfaldsvikler, procesforløb, og gode råd for en række forskellige områdetyper, bl.a. bycentre, boligområder, parker....

  14. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  15. CLOUD COMPUTING SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Florin OGIGAU-NEAMTIU

    2012-01-01

    Full Text Available The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.

  16. Are Food Insecurity’s Health Impacts Underestimated in the U.S. Population? Marginal Food Security Also Predicts Adverse Health Outcomes in Young U.S. Children and Mothers123

    Science.gov (United States)

    Cook, John T.; Black, Maureen; Chilton, Mariana; Cutts, Diana; Ettinger de Cuba, Stephanie; Heeren, Timothy C.; Rose-Jacobs, Ruth; Sandel, Megan; Casey, Patrick H.; Coleman, Sharon; Weiss, Ingrid; Frank, Deborah A.

    2013-01-01

    This review addresses epidemiological, public health, and social policy implications of categorizing young children and their adult female caregivers in the United States as food secure when they live in households with “marginal food security,” as indicated by the U.S. Household Food Security Survey Module. Existing literature shows that households in the US with marginal food security are more like food-insecure households than food-secure households. Similarities include socio-demographic characteristics, psychosocial profiles, and patterns of disease and health risk. Building on existing knowledge, we present new research on associations of marginal food security with health and developmental risks in young children (security is positively associated with adverse health outcomes compared with food security, but the strength of the associations is weaker than that for food insecurity as usually defined in the US. Nonoverlapping CIs, when comparing odds of marginally food-secure children’s fair/poor health and developmental risk and caregivers’ depressive symptoms and fair/poor health with those in food-secure and -insecure families, indicate associations of marginal food security significantly and distinctly intermediate between those of food security and food insecurity. Evidence from reviewed research and the new research presented indicates that households with marginal food security should not be classified as food secure, as is the current practice, but should be reported in a separate discrete category. These findings highlight the potential underestimation of the prevalence of adverse health outcomes associated with exposure to lack of enough food for an active, healthy life in the US and indicate an even greater need for preventive action and policies to limit and reduce exposure among children and mothers. PMID:23319123

  17. IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    IAEA Plans of activities include, General Conference in September 2001 which reviewed activities relevant to preventing nuclear terrorism and proposed master plan. The Board of Governors approved new Nuclear Security Plan for the next four years. Three activity areas are; - needs assessment, analysis and coordination, prevention and detection and response.

  18. Competence Building

    DEFF Research Database (Denmark)

    Borrás, Susana; Edquist, Charles

    The main question that guides this paper is how governments are focusing (and must focus) on competence building (education and training) when designing and implementing innovation policies. With this approach, the paper aims at filling the gap between the existing literature on competences...... on the one hand, and the real world of innovation policy-making on the other, typically not speaking to each other. With this purpose in mind, this paper discusses the role of competences and competence-building in the innovation process from a perspective of innovation systems; it examines how governments...... and public agencies in different countries and different times have actually approached the issue of building, maintaining and using competences in their innovation systems; it examines what are the critical and most important issues at stake from the point of view of innovation policy, looking particularly...

  19. Building Procurement

    DEFF Research Database (Denmark)

    Andersson, Niclas

    2007-01-01

    evolves from a simple establishment of a contractual relationship to a central and strategic part of construction. The authors relate to cultural, ethical and social and behavioural sciences as the fundamental basis for analysis and understanding of the complexity and dynamics of the procurement system......‘The procurement of construction work is complex, and a successful outcome frequently elusive’. With this opening phrase of the book, the authors take on the challenging job of explaining the complexity of building procurement. Even though building procurement systems are, and will remain, complex...... despite this excellent book, the knowledge, expertise, well-articulated argument and collection of recent research efforts that are provided by the three authors will help to make project success less elusive. The book constitutes a thorough and comprehensive investigation of building procurement, which...

  20. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.