WorldWideScience

Sample records for prevention building security

  1. Building a Secure Library System.

    Science.gov (United States)

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  2. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  3. Building in Prevention

    DEFF Research Database (Denmark)

    Troelsen, Jens

    2013-01-01

    Health interventions can be seen as initiatives that seek to prevent the emergence and development of impaired public health. Initiatives made in the area of prophylaxis can be experienced as anything from direct invasions of personal freedom to small traffic bumps on the roads. In this spectrum...... preventive work might be changed to direct focus onto a greater extent on establishing frameworks for people to master their own lives instead of one-sided initiatives, which leave the individual with a sense of guilt at their own illness....

  4. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  5. Software Security and the "Building Security in Maturity" Model

    CERN Multimedia

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  6. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... into code that implements the communication skeleton of the system and can then be used by the system designer. New output languages can also easily be added to the GSD framework. Additionally, a prototype of the GSD framework was implemented and an ex-ample of using the GSD framework in a real world system...... perspective of the communications between different principals. The notation used in the GSD framework extends that notation with constructs that allow the security requirements of the messages to be described. From that specification, the developer is guided through a semi-automatic translation that enables...

  7. Resilient Infrastructure and Building Security

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew

    to authentication that combines traditional access control systems with the sensing technologies and tracking capabilities offered by smart environments. Our approach is called Persistent Authentication for Location-based Services. Persistent authentication enables the secure provision of location-based services...... from the point of initial authentication to the point where authorisation is requested by location-based services. Facial recognition and appearance analysis are integrated in the persistent authentication system as remote biometric experts that operate at a distance and require no interaction from...... the users. The experts perform continuous authentication by processing samples of the biometric modalities as they become available. Combining scores from multiple biometric experts is known as sensor fusion. A common challenge in this field is that the results from evaluating different biometric...

  8. Information Security - Data Loss Prevention Procedure

    Science.gov (United States)

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  9. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  10. Building the Multi-agent Based Adaptive Security System

    Directory of Open Access Journals (Sweden)

    Sergey Andreevich Petrov

    2013-06-01

    Full Text Available This article is concerned with security of information system. Multi-agent based adaptive security system is offered. Advantages of the system and its potential architecture are presented. The author describes requirements for agents’ functionality and possible variants of agents’ operability. The suggested approach is intended to use for building adaptive security system in accordance with network structure, required safety level and available compute resources.

  11. Building Global Competitiveness through Information Security ...

    African Journals Online (AJOL)

    This paper highlights the relevance of building competitiveness in innovations and technology to improve the quality of life of the Nigeria, and indeed, the African citizens. Discussing new opportunities that could emerge daily from and the adoption of new ideas, it posits that the quest for overall national prosperity would ...

  12. Building and strengthening confidence and security in Asia

    International Nuclear Information System (INIS)

    Corden, P.S.

    1992-01-01

    This paper presents a few thoughts on the question of building and strengthening confidence and security in Asia, in particular in the area centred on the Korean peninsula. This question includes the process of establishing and implementing confidence- and security-building measures, some of which might involve States other than North and South Korea. The development of CSBMs has now been well established in Europe, and there are encouraging signs that such measures are taking hold in other areas of the world, including in Korea. Consequently there is a fairly rich mine of information, precedent and experience from which to draw in focusing on the particular subject at hand. In these remarks the concept of confidence- and security-building is briefly addressed and measures are examined that have proven useful in other circumstances and review some possibilities that appear of interest in the present context

  13. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  14. Maritime Security and Capacity Building in The Gulf of Guinea

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov

    2017-01-01

    It is widely acknowledged that maritime security in the Gulf of Guinea is a highly complex phenomenon, involving a variety issues (legal deficiencies, inadequate military equipment, and challenges like corruption, political unrest, youth unemployment etc.) as well as a multiplicity of external...... response, they are at the same time illustrative of how the maritime capacity building activities of various external actors also ‘succeed’ in having an impact on this regional security landscape – for instance by influencing how certain aspects of this multifaceted problem are prioritized, whilst others...

  15. Building Peace and Security Research Capacity in Eastern Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project aims to create a network of peace and security researchers from academic institutions, research centres and civil society organizations. Through research, information dissemination and dialogue, the network will inform policy, mediate political conflicts, and prevent the initiation and escalation of violent conflict.

  16. Review of Security Cooperation Mechanisms Combatant Commands Utilize to Build Partner Capacity

    Science.gov (United States)

    2013-01-01

    the restriction that prevents use of JCETs to train partners ham - pers their effectiveness as a means of building partner CT capacity, and hence...Windmill 2013 to be led by the Dutch and Germans, high-end allies that could help defend the continent through U.S.-supported enhancements in their...to the Dutch /German-led Optic Windmill exercise. Because of the circuitous process for security funds and the limitations on their use, TCA also

  17. Building effective cybersecurity programs a security manager's handbook

    CERN Document Server

    Schreider, Tari

    2017-01-01

    You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

  18. Building Nuclear Safety and Security Culture Within Regulatory Body

    International Nuclear Information System (INIS)

    Huda, K.

    2016-01-01

    To achieve a higher level of nuclear safety and security, it needs to develop the safety and security culture not only in the facility but also in the regulatory body. The regulatory body, especially needs to develop the safety and security culture within the organization, because it has a function to promote and oversee the culture in the facilities. In this sense, the regulatory body should become a role model. Development of the nuclear safety and security culture should be started by properly understanding its concept and awakening the awareness of individual and organization on the importance of nuclear safety and security. For effectiveness of the culture development in the regulatory body, the following steps are suggested to be taken: setting up of the regulatory requirements, self-assessment, independent assessment review, communication with the licensee, oversight of management system implementation, and integration with regulatory activities. The paper discusses those steps in the framework of development of nuclear safety and security culture in the regulatory body, as well as some important elements in building of the culture in the nuclear facilities. (author)

  19. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    , and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.

  20. Building African Capacity for HIV/AIDS Prevention Trials

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada-Africa Prevention Trials Network : Building African Capacity for HIV/AIDS Prevention Trials. The Canada-Africa Prevention Trials Network (CAPT Network) was formed through a capacity building grant from the Global Health Research Initiative (GHRI). The Network comprises eight African centres (four in Uganda, ...

  1. Canada-Africa Prevention Trials Network : Building African Capacity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada-Africa Prevention Trials Network : Building African Capacity for HIV/AIDS Prevention Trials. The Canada-Africa Prevention Trials Network (CAPT Network) was formed through a capacity building grant from the Global Health Research Initiative (GHRI). The Network comprises eight African centres (four in Uganda, ...

  2. Critical infrastructure security assessment, prevention, detection, response

    CERN Document Server

    FLAMMINI, F

    2012-01-01

    The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physical security from an engineering point of view. The book surveys state-of-the-art methodologies and tools for CI analysis as well as strategies and technologies for CI protection.

  3. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  4. Electronic security systems better ways to crime prevention

    CERN Document Server

    Walker, Philip

    2013-01-01

    Electronic Security Systems: Better Ways to Crime Prevention teaches the reader about the application of electronics for security purposes through the use of case histories, analogies, anecdotes, and other related materials. The book is divided into three parts. Part 1 covers the concepts behind security systems - its objectives, limitations, and components; the fundamentals of space detection; detection of intruder movement indoors and outdoors; surveillance; and alarm communication and control. Part 2 discusses equipments involved in security systems such as the different types of sensors,

  5. Preventive Maintenance for Local Government Buildings: A Best Practices Review.

    Science.gov (United States)

    Hauer, Jody; Bombach, Valerie; Mohr, Caryn; Masse, Ann

    This report identifies seven strategic practices for effectively managing preventive maintenance of Minnesota school district, city, and county buildings; and profiles local jurisdictions currently using them. The following best practices for preventive maintenance are recommended: (1) inventory building components and assess their conditions; (2)…

  6. The Radon Book. Preventive measures in new buildings

    International Nuclear Information System (INIS)

    Clavensjoe, Bertil; Aakerblom, Gustav

    2004-01-01

    This book describes in text and picture how one can prevent that the radon concentrations in new buildings become to high. The book's centre of gravity lies on how to build in order to prevent that radon gas from the ground enters the building. The book contains extensive information about ground radon and how to examine the ground before constructing a new building. Release of radon from ground water and construction material is treated, as well as technology for measurement of radon and gamma radiation. The book presents current threshold values/recommended values for radon and the authorities' regulations and recommendations. The book is directed to persons who professionally need knowledge about radon and how to prevent that radon is accumulated in new buildings

  7. The UN Security Council and prevention of displacement

    Directory of Open Access Journals (Sweden)

    Sanjula Weerasinghe

    2012-12-01

    Full Text Available Respecting the prohibitions against forced and arbitrary displacementcould significantly reduce the risk of, or prevent, displacement insituations of armed conflict, as could insisting on accountabilityfor violations of these prohibitions that amount to war crimes orcrimes against humanity. The UN Security Council has only partiallyaddressed these issues.

  8. Measures to prevent breaches in the security of radioactive materials

    International Nuclear Information System (INIS)

    Zika-Ahlberg, G.

    1998-01-01

    The objective of this paper, which is the result of the co-operation between the Swedish Board of Customs, the Swedish Radiation Protection Institute, the Security Police and the Swedish Nuclear Power Inspectorate, is to give an idea of the national prevention system as to illicit trafficking of nuclear materials and other radioactive sources. (author)

  9. Capacity Building for HIV/AIDS Prevention Trials | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Development Agency (CIDA) is funding the Africa HIV/AIDS Prevention Trials Capacity Building Program under the umbrella of the Global Health Research Initiative (GHRI). The aim of the program is to build the capacity of African researchers and institutions to conduct anticipated clinical trials ...

  10. Building consensus on youth violence prevention and citizen ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-20

    Apr 20, 2016 ... The dialogue was the result of a collaborative effort by a number of national and international institutions, including the Ministries of Public Security ... Building on the IDRC and Organization of American States partnership which established the Network of e-Government Leaders of Latin America and the.

  11. Remote Sensing and Capacity Building to Improve Food Security

    Science.gov (United States)

    Husak, G. J.; Funk, C. C.; Verdin, J. P.; Rowland, J.; Budde, M. E.

    2012-12-01

    The Famine Early Warning Systems Network (FEWS NET) is a U.S. Agency for International Development (USAID) supported project designed to monitor and anticipate food insecurity in the developing world, primarily Africa, Central America, the Caribbean and Central Asia. This is done through a network of partners involving U.S. government agencies, universities, country representatives, and partner institutions. This presentation will focus on the remotely sensed data used in FEWS NET activities and capacity building efforts designed to expand and enhance the use of FEWS NET tools and techniques. Remotely sensed data are of particular value in the developing world, where ground data networks and data reporting are limited. FEWS NET uses satellite based rainfall and vegetation greenness measures to monitor and assess food production conditions. Satellite rainfall estimates also drive crop models which are used in determining yield potential. Recent FEWS NET products also include estimates of actual evapotranspiration. Efforts are currently underway to assimilate these products into a single tool which would indicate areas experiencing abnormal conditions with implications for food production. FEWS NET is also involved in a number of capacity building activities. Two primary examples are the development of software and training of institutional partners in basic GIS and remote sensing. Software designed to incorporate rainfall station data with existing satellite-derived rainfall estimates gives users the ability to enhance satellite rainfall estimates or long-term means, resulting in gridded fields of rainfall that better reflect ground conditions. Further, this software includes a crop water balance model driven by the improved rainfall estimates. Finally, crop parameters, such as the planting date or length of growing period, can be adjusted by users to tailor the crop model to actual conditions. Training workshops in the use of this software, as well as basic GIS and

  12. Building the Capacity of the HIV Prevention Workforce

    Centers for Disease Control (CDC) Podcasts

    2010-07-29

    This podcast provides an overview of CDC's HIV prevention capacity building efforts with community-based organizations and health departments.  Created: 7/29/2010 by National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention.   Date Released: 7/29/2010.

  13. Secure Control Applications in Smart Homes and Buildings

    NARCIS (Netherlands)

    Praus, Friedrich; Kastner, Wolfgang; Palensky, P.

    2016-01-01

    With today’s ongoing integration of heterogeneous building automation systems, increased comfort, energy efficiency, improved building management, sustainability as well as advanced applications such as active & assisted living scenarios become possible. These smart homes and buildings are

  14. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  15. HUMAN SECURITYBUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2015-04-01

    Full Text Available This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declaration and the Millennium Development Goals. The last part evaluates the improvements that the inclusion of the human security on the post-2015 development framework may bring. The results of this analysis present illustrate the opportunity of deepening the MDGs agenda with a more realistic and ethical approach, through the inclusion of the human security paradigm within the development agenda.

  16. Prevention measures of flooding inside building at Hamaoka NPS

    International Nuclear Information System (INIS)

    Kani, Naoya; Wakunaga, Takao; Ishida, Takahisa; Yasuda, Mitsuhiro; Kawabata, Tatsuo

    2013-01-01

    As the lessons learned from the Fukushima Daiichi NPP accident, we will implement installing the sea wall in order to block direct intrusion of tsunami on Hamaoka Nuclear Power Station. In addition, assuming a tsunami higher than the sea wall, we will implement countermeasures to prevent flooding inside the building and the important equipment containment room. In this paper, we present countermeasures to prevent flooding for penetrations and openings of ventilation. (author)

  17. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  18. Building consensus on youth violence prevention and citizen ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC's efforts in negotiation and coalition building contributed to a high-level dialogue that engaged high-level officials and reaffirmed their commitment to preventing violence particularly among youth in Central America. At a meeting held at the Earth University in Costa Rica´s Limon Province in early February, Luis Fallas, ...

  19. HIV/AIDS Prevention Trials Capacity Building Grants

    International Development Research Centre (IDRC) Digital Library (Canada)

    work involve Canadian researchers collaborating with researchers and decision- makers in Asia, Africa, Eastern Europe, the Middle East, Latin America, and the. Caribbean. About this booklet. This booklet presents projects being carried out with grants from GHRI's HIV/AIDS. Prevention Trials Capacity Building Grants ...

  20. Education and Training, and Knowledge Networks for Capacity-Building in Nuclear Security

    International Nuclear Information System (INIS)

    Mrabit, Khammar

    2014-01-01

    Conclusions: • Capacity Building (CB) is critical for States to establish and maintain effective and sustainable nuclear security regime. • IAEA is a worldwide platform promoting international cooperation for CB in nuclear security involving more than 160 countries and over 20 Organizations and Initiatives. • IAEA Division of Nuclear Security is ready to continue supporting States in developing their CB through: – Comprehensive Training Programme: more than 80 training events annually – International Nuclear Security Training and Support Centre Network (NSSC) – Comprehensive Education Programme – International Nuclear Security Network (INSEN)

  1. Preventing violence and reinforcing human security: a rights-based framework for top-down and bottom-up action.

    Science.gov (United States)

    Kjaerulf, Finn; Barahona, Rodrigo

    2010-05-01

    This article explores the violence reduction potential in the intersection between health, criminal justice, and development. It emphasizes public health, rule of law, and equality-driven socioeconomic development as principal concerns in preventing violence. In parts of Latin America, violence has become a serious public health and security problem. Prior studies have explored the risk factors associated with violence as well as experiences in its prevention. These studies and existing approaches to violence prevention provide evidence on where to direct attention and build prevention efforts. This article argues for integrated community-driven and national interventions to create cooperative national- local linkages and embed international human rights law at the national and local levels. Nations struggling with violence should be encouraged to apply an integrated framework to prevent violence and reinforce human security.

  2. Prerequisites for building a computer security incident response capability

    CSIR Research Space (South Africa)

    Mooi, M

    2015-08-01

    Full Text Available There are a number of considerations before one can commence with establishing a Computer Security Incident Response Team (CSIRT). This paper presents the results of a structured literature review investigating the business requirements...

  3. Development of building security integration system using sensors, microcontroller and GPS (Global Positioning System) based android smartphone

    Science.gov (United States)

    Sihombing, P.; Siregar, Y. M.; Tarigan, J. T.; Jaya, I.; Turnip, A.

    2018-03-01

    Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner’s smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.

  4. Integration of the security systems in the architectural design of nuclear and important buildings in Egypt

    International Nuclear Information System (INIS)

    Algohary, S.

    2007-01-01

    The new and emerging threats to buildings and infrastructure which are faced by todays engineering design and facility management community in Egypt demand new approaches and solutions that are innovative and increasingly based on risk management principles. In the wake of the damage of Taba hotel in south Sinai (2004) and Sharm El-Sheik hotels in Egypt (July, 2005), there was a growing awareness of public vulnerability to terrorist attacks. This awareness leads to increase the expectations form and responsibilities of the architects, engineers and construction professionals This study reviews and assesses different types of threats to nuclear and important buildings. It identifies also the architectural design, vulnerability and risk management that can enhance security. It also introduces a new approach for integration of architectural design and security in nuclear and important buildings in Egypt. The results shows that escalating threats and risks to important buildings and infrastructures change the role of planners, architects, engineers and builders by increasing the focus on the importance of applying viable security principles to the building designs. Architects in Egypt can assume an important role in improving the life-safety features of important buildings by increasing and integrating new security principles and approaches to improve the security and performance of the buildings against man made disasters

  5. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  6. Crisis prevention centers as confidence building measures: Suggestions for Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.

    1995-05-01

    Relationships between countries generally exist somewhere in the grey area between war and peace. Crisis prevention activities are particularly important and should have two goals: stabilizing tense situations that could push countries toward war, and supporting or reinforcing efforts to move countries toward peace. A Crisis Prevention Center (CPC) should facilitate efforts to achieve these goals. Its functions can be grouped into three broad, inter-related categories: establishing and facilitating communication among participating countries; supporting negotiations and consensus-building on regional security issues; and supporting implementation of agreed confidence and security building measures. Technology will play a critical role in a CPC. First, technology is required to establishing communication systems and to provide the means for organizing and analyzing this information. Second, technically-based cooperative monitoring can provide an objective source of information on mutually agreed issues. In addition, technology can be a neutral subject of interaction and collaboration between technical communities from different countries. Establishing a CPC in Northeast Asia does not require the existence of an Asian security regime. Potential first steps for such a CPC should include establishing communication channels and a dedicated communications center in each country, together with an agreement to use the system as a {open_quotes}Hot Line{close_quotes} in bilateral and multilateral emergency situations. A central CPC could also be established as a regional communications hub. The central CPC could coordinate a number of functions aimed at stabilizing regional tensions and supporting confidence building activities, perhaps initially in an unofficial capacity. Specific recommendations for confidence building measures are discussed.

  7. Development of national standards related to the integrated safety and security of high-rise buildings

    Science.gov (United States)

    Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov

    2018-03-01

    The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  8. Development of national standards related to the integrated safety and security of high-rise buildings

    Directory of Open Access Journals (Sweden)

    Voskresenskaya Elena

    2018-01-01

    Full Text Available The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  9. Building a world class information security governance model

    CSIR Research Space (South Africa)

    Lessing, M

    2008-05-01

    Full Text Available The lack of a fully inclusive guideline document to assist the functioning of sufficient Information Security Governance is common in the business environment. This article focuses on developing such a guideline document, based on a number of best...

  10. Building Peace and Security Research Capacity in Eastern Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project aims to create a network of peace and security researchers from academic institutions, research centres and civil society organizations. Through research ... Selected papers from the project will be featured in three special editions of Africa Peace and Conflict Journal, a UPEACE publication. The research ...

  11. Crisis Prevention Centers as confidence building measures: Suggestions for the Middle East

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.

    1995-05-01

    Relationships between countries generally exist somewhere in the grey area between war and peace. Crisis prevention activities are important in this area, and should have two goals: stabilizing tense situations that could push countries toward war, and supporting or reinforcing efforts to move countries toward peace. A Crisis Prevention Center (CPC) should facilitate efforts to achieve these goals. Its functions can be grouped into three broad, interrelated categories: establishing and facilitating communication among participating countries; supporting negotiations and consensus-building on regional security issues; and supporting implementation of agreed confidence and security building measures. Technology will play a critical role in a CPC. Technology is required for establishing communication systems to ensure the timely flow of information between countries and to provide the means for organizing and analyzing this information. Technically-based cooperative monitoring can provide an objective source of information on mutually agreed issues, thereby supporting the implementation of confidence building measures and treaties. Technology can be a neutral subject of interaction and collaboration between technical communities from different countries, thereby providing an important channel for improving relationships. Potential first steps for a CPC in the Middle Ease could include establishing communication channels and a dedicated communications center in each country, together with an agreement to use the system as a ``Hot Line` in bilateral and multilateral-lateral emergency situations. Bilateral cooperative monitoring centers could be established to assist with implementation of agreements. A centrally located CPC could serve as a regional communications hub, coordinating a number of functions aimed at stabilizing regional tensions and supporting confidence building activities. Specific recommendations for confidence building activities are discussed.

  12. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  13. Fairtrade, Food Security and Globalization: Building Alternative Food Systems

    Directory of Open Access Journals (Sweden)

    Martin Calisto Friant

    2016-05-01

    Full Text Available This article examines the politics and practices of Fairtrade certification in order to assess whether this alternative trading system could contribute to innovative solutions for global food security. The analysis begins by assessing the main challenges and problems characterizing the contemporary global food system. It then explores the history, vision and certification standards of the Fairtrade label. In the third section, the results of the impact studies of Fairtrade certification on producer livelihoods are discussed, analyzing the various strengths and weaknesses. Finally the article analyzes whether, and how, the Fairtrade system could positively contribute to improving global food security. To conclude this paper argues that the greatest strength of Fairtrate is not the certification mechanism itself but rather the social and environmental principles it represents. Fairtrade standards could serve to inform broader international policies, which could lead to a sustainable transformation of the global food system.

  14. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological...

  15. Peekaboo Power: To Ease Separation and Build Secure Relationships.

    Science.gov (United States)

    Szamreta, Joanne M.

    2003-01-01

    Describes how peekaboo games were used with a toddler at home and in a parent-toddler play group setting to support the toddler's developmental need for autonomy, to help her gain control over separation from her mother, assist the play group leader to build a relationship with the toddler, and thereby enable the toddler to make the transition…

  16. Security Force Assistance Brigades: A Permanent Force for Regional Engagement and Building Operational Depth

    Science.gov (United States)

    2017-05-25

    its vision to prevent, shape, and win our nation’s wars in the near future. 15. SUBJECT TERMS Security Force Assistance Brigades; Security Force...involved with creating and employing these brigades, it can better meet its vision to prevent, shape, and win our nation’s wars in the near future...include then-Secretary of Defense Robert Gates, rebuked these ideas because the military did not have the resources to allocate for these concepts.21 After

  17. Croatia’s police and security community building in the Western Balkans

    Directory of Open Access Journals (Sweden)

    Sandro KNEZOVIĆ

    2017-12-01

    Full Text Available The article examines the eventual existence of a security community within the Western Balkans region by exploring the contribution of police as a profession/epistemic community in Croatia to the security community building process. In order to do so, two theoretical concepts have been applied: first, the one of security community which, according to Deutsch, as well as Adler and Barnett, is something that is leading IR and humanity out of the era of nation-state; secondly, the one of professions as exclusive occupational groups in Abbott’s interpretation (wherein the police is considered to be a profession. Our approach builds on a combination of the aforementioned theories, while the study itself has been based on the developments in the field of policing in Croatia since 1990 and its implications for the creation of a security community in the region.

  18. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  19. Confidence- and security-building in North-East Asia. Working group I

    International Nuclear Information System (INIS)

    Cotton, J.

    1991-01-01

    In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty

  20. Enhancing Homeland Security Efforts by Building Strong Relationships between the Muslim Community and Local Law Enforcement

    National Research Council Canada - National Science Library

    Jensen, Dennis L

    2006-01-01

    ... to follow up on the incident and to prevent future attacks. It is undeniable that building a strong relationship between the local police and the Muslim community is essential in defending America against acts of terrorism...

  1. Building Food Security and Social Resilience to HIV/AIDS in Malawi ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Building Food Security and Social Resilience to HIV/AIDS in Malawi. In Malawi, small farmers face many challenges in sustaining a viable food system and are therefore highly vulnerable to climate change. Previous work in Ekwendi and Kasungu (projects 100670 and 101829) identified knowledge gaps and social equity ...

  2. Willpower building: a new element in relapse prevention

    Directory of Open Access Journals (Sweden)

    Ryan Kemp

    2016-05-01

    Full Text Available Willpower, self-control and self-regulation may be important ingredients in recovering from addiction. The authors contend that findings from controlled experiments into self-control and self-regulation can be usefully translated into clinical practice as part of a relapse prevention programme. This would be in the form of willpower building, with willpower being broadly synonymous with self-control and self-regulation. Numerous studies indicate that self-control is a capacity which functions like a muscle. In this sense, self-control can be built up, but is also subject to depletion when utilised. Findings suggest that there is direct applicability for self-control in relation to addiction, and recovery in general. It is possible that this capacity can be developed through individual or group sessions. It is argued that clinical sessions should focus on: awareness, planning, building protective habits and exercising self-regulation. While some of these areas are covered in traditional psychological treatments of addiction (i.e., Cognitive Behaviour Therapy and Motivational Interviewing, making this capacity more explicit would be advantageous. Our challenge is for researchers to test these notions in controlled clinical studies.

  3. Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard.

    Science.gov (United States)

    Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok

    2017-09-25

    An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation.

  4. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  5. Preventive Safety Measures: A Guide to Security Hardware.

    Science.gov (United States)

    Gottwalt, T. J.

    2003-01-01

    Emphasizes the importance of an annual security review of a school facility's door hardware and provides a description of the different types of locking devices typically used on schools and where they are best applied. (EV)

  6. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  7. Walk the Talk: Progress in Building a Supply Chain Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-31

    Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  8. Walk the Talk: Progress in Building a Supply Chain Security Culture

    International Nuclear Information System (INIS)

    Hund, Gretchen

    2016-01-01

    Pacific Northwest National Laboratory (PNNL) has engaged industry to ''go beyond compliance'' for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  9. The EU as a Promoter of Preventive Criminal Justice and the Internal Security Context

    NARCIS (Netherlands)

    Herlin Karnell, S.E.M.

    2015-01-01

    This paper discusses the current tendency in the EU to promote a criminal justice model focusing on prevention. In doing so, I examine the EU’s internal security agenda with regard to criminal law and assess the extent to which this strategy fits the picture of an European Area of Freedom, Security

  10. Preventive Interventions and Sustained Attachment Security in Maltreated Children

    Science.gov (United States)

    Stronach, Erin Pickreign; Toth, Sheree L.; Rogosch, Fred; Cicchetti, Dante

    2013-01-01

    Thirteen-month-old maltreated infants (n = 137) and their mothers were randomly assigned to one of three conditions: child-parent psychotherapy (CPP), psychoeducational parenting intervention (PPI), and community standard (CS). A fourth group of nonmaltreated infants (n =52) and their mothers served as a normative comparison (NC) group. A prior investigation found that the CPP and PPI groups demonstrated substantial increases in secure attachment at post-intervention, whereas this change was not found in the CS and NC groups. The current investigation involved the analysis of data obtained at a follow-up assessment that occurred 12-months after the completion of treatment. At follow-up, children in the CPP group had higher rates of secure and lower rates of disorganized attachment than did children in the PPI or CS groups. Rates of disorganized attachment did not differ between the CPP and NC groups. Intention-to-treat analyses (ITT) also showed higher rates of secure attachment at follow-up in the CPP group relative to the PPI and CS groups. However, groups did not differ on disorganized attachment. Both primary and ITT analyses demonstrated that maternal reported child behavior problems did not differ among the four groups at the follow-up assessment. This is the first investigation to demonstrate sustained attachment security in maltreated children 12 months after the completion of an attachment theory-informed intervention. Findings also suggest that, while effective in the short term, parenting interventions alone may not be effective in maintaining secure attachment in children over time. PMID:24229539

  11. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    Science.gov (United States)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  12. Genocide Prevention and Western National Security: The Limitations of Making R2P All About Us

    Directory of Open Access Journals (Sweden)

    Maureen S. Hiebert

    2015-11-01

    Full Text Available The case for turning R2P and genocide prevention from principle to practice usually rests on the invocation of moral norms and duties to others. Calls have been made by some analysts to abandon this strategy and “sell” genocide prevention to government by framing it as a matter of our own national interest including our security. Governments’ failure to prevent atrocities abroad, it is argued, imperils western societies at home. If we look at how the genocide prevention-as-national security argument has been made we can see, however, that this position is not entirely convincing. I review two policy reports that make the case for genocide prevention based in part on national security considerations: Preventing Genocide: A Blue Print for U.S. Policymakers (Albright-Cohen Report; and the Will to Intervene Project. I show that both reports are problematic for two reasons: the “widened” traditional security argument advocated by the authors is not fully substantiated by the evidence provided in the reports; and alternate conceptions of security that would seem to support the linking of genocide prevention to western security—securitization and risk and uncertain—do not provide a solid logical foundation for operationalizing R2P. I conclude by considering whether we might appeal instead to another form of self interest, “reputational stakes”, tied to western states’ construction of their own identity as responsible members of the international community.

  13. A game-theoretical approach for reciprocal security-related prevention investment decisions

    International Nuclear Information System (INIS)

    Reniers, Genserik; Soudan, Karel

    2010-01-01

    Every company situated within a chemical cluster faces important security risks from neighbouring companies. Investing in reciprocal security preventive measures is therefore necessary to avoid major accidents. These investments do not, however, provide a direct return on investment for the investor-company and thus plants are hesitative to invest. Moreover, there is likelihood that even if a company has fully invested in reciprocal security prevention, its neighbour has not, and as a result the company can experience a major accident caused by an initial (minor or major) accident that occurred in an adjacent chemical enterprise. In this article we employ a game-theoretic approach to interpret and model behaviour of two neighbouring chemical plants while negotiating and deciding on reciprocal security prevention investments.

  14. Fire Risk Analysis and Optimization of Fire Prevention Management for Green Building Design and High Rise Buildings: Hong Kong Experience

    Directory of Open Access Journals (Sweden)

    Yau Albert

    2014-12-01

    Full Text Available There are many iconic high rise buildings in Hong Kong, for example, International Commercial Centre, International Financial Centre, etc. Fire safety issue in high rise buildings has been raised by local fire professionals in terms of occupant evacuation, means of fire-fighting by fire fighters, sprinkler systems to automatically put off fires in buildings, etc. Fire risk becomes an important issue in building fire safety because it relates to life safety of building occupants where they live and work in high rise buildings in Hong Kong. The aim of this research is to identify the fire risk for different types of high rise buildings in Hong Kong and to optimise the fire prevention management for those high rise buildings with higher level of fire risk and to validate the model and also to carry out the study of the conflict between the current fire safety building code and the current trend of green building design. Survey via the 7-point scale questionnaire was conducted through 50 participants and their responses were received and analysed via the statistical tool SPSS software computer program. A number of statistical methods of testing for significantly difference in samples were adopted to carry out the analysis of the data received. When the statistical analysis was completed, the results of the data analysis were validated by two Fire Safety Experts in this area of specialisation and also by quantitative fire risk analysis.

  15. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Koech, H.K.

    2010-01-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  16. Building relationships and resilience in the prevention of youth violence.

    Science.gov (United States)

    Gabriel, R M; Hopson, T; Haskins, M; Powell, K E

    1996-01-01

    Self Enhancement, Inc., is a grassroots, community-service organization working in the most disadvantaged high-risk community in Portland, Oregon. Its violence-prevention program targets middle-school and high-school students by providing classroom and community activities to these young people. These activities are designed to enhance protective factors and build resilience in youths to enable them to attain healthy and productive lives and to resist the threats of gangs, violence, and drugs. RMC Research Corporation works in partnership with Self Enhancement, Inc., to conduct research and evaluation on the effectiveness of its programs. The Self Enhancement, Inc., program works primarily at the individual student and interpersonal relationship levels. Resilience Theory and its culturally specific Relationship Model drive the formulation of specific strategies and activities. Program staff mentor each student through his or her preadolescent and adolescent years, promoting positive, prosocial norms and expectations for behavior through their peer group activities. The Self Enhancement, Inc., program consists of three major components: classroom, exposure, and proactive education. Classroom education focuses on anger management, conflict resolution, and problem solving. Exposure education consists of quarterly field trips to agencies and organizations in the Portland area that deal with the causes and consequences of violence in the community. Proactive education includes newsletters, student-run assemblies and conferences, and radio/ television public service announcements that communicate antiviolence messages. The evaluation plan is a longitudinal matched comparison group designed to assess the outcomes of the violence-prevention program. Key outcomes are protective factors, health-risk behaviors, and academic measures. Standardized assessment instruments (the Individual Protective Factors Index and the Youth Risk Behavior Survey) were administered to all

  17. Innovation in the Prevention of the Use of Child Soldiers: Women in the Security Sector

    Science.gov (United States)

    2016-03-01

    civil society organizations in: transforming public perception of the military and police, strengthening disarmament, and recruiting women for the... leadership roles for the women in the security sector, as this is a key element to the overall peace and security agenda? 4. New tactics to prevent...Youngman, “The Warrior Ethic,” in Women in Uniform, Perceptions and Pathways, Kathryn Spurling and Elizabeth Greenlaugh, eds. (Canberra: School of

  18. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  19. How to permanently build up the prevention of occupational cancers

    International Nuclear Information System (INIS)

    Hery, Michel; Goutet, Pierre; Calvez, Olivier; Fontaine, Bernard; Bastos, Henri; Guseva-Canu, Irina; Telle-Lamberton, Maylis; Pourquet, Michel; Fontaine, Jean-Raymond; Silvente, Eric; Malenfer, Marc; Risse-Fleury, Mathilde; Lepocreau, Antoine; Guimon, Michele; Laine, Patrick; Fares, Nadim; Hermouet, Christine; Chauvet, Claire; Haeflinger, Raphael; Vogel, Laurent; Counil, Emilie; Bertin, Melanie; Thebaud-Mony, Annie; Certin, Jean-Francois; Goutet, Pierre; Brixi, Omar

    2015-01-01

    As about 2 millions of workers are exposed to carcinogenic agents in different industrial sectors, this expert opinion proposes a presentation of the state of the art of the prevention of carcinogenic risks. The different parts address the contribution of experimental and epidemiologic studies to the knowledge and prevention of occupational cancers (sure and possible factors, classifications and regulations), the knowledge of exposures in working environments (exposure modalities and principle of assessment of exposures, traceability and retrospective assessment), the risk management within a company (identification, suppression and substitution, design of work equipment, prevention of exposure for the personnel of subcontracting companies and in the waste and recycling sectors), the evolution from risk perception to risk prevention, the various strategies for action and professional sectors (general regime, prevention policy of the French national fund of prevention for territorial and hospital public services, the taking into charge of cancers as occupational disease by agriculture regimes of social protection), and the taking into care and restorative actions (medical and legal follow up and remedy, taking inequities into account, acknowledgement of occupational cancers in Europe, critical discussion of the European policy on occupational cancer prevention, lessons learned from Giscop93 inquiry)

  20. Building Capacity for Conducting HIV Prevention Trials in the Health ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The project will consist of the following interlinked components: two Web-based modules on the basics of occupational health and infection control; three four-day face-to-face workshops; problem-based learning and team building; and community-based learning, to take place while conducting an actual participatory action ...

  1. Ecohealth Field Building Leadership in Prevention and Control of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Chagas disease, malaria, leishmaniasis, dengue and dengue hemorrhagic fever constitute about 90% of this burden. This project will build a regional ... Consolidation d'un leadership concernant les démarches écosanté appliquées aux maladies à transmission vectorielle. Les maladies à transmission vectorielle sont ...

  2. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    Science.gov (United States)

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  3. Violent Extremism, National Security and Prevention. Institutional Discourses and Their Implications for Schooling

    Science.gov (United States)

    Mattsson, Christer; Säljö, Roger

    2018-01-01

    Currently, threats to societal security from extremist groups are high on the political agenda in many countries. Politicians, policymakers at various levels and communities are searching for methods to counteract recruitment to violent organizations. These efforts are often referred to as Prevention of Violent Extremism (PVE-programmes). One of…

  4. HIV/AIDS Prevention Trials Capacity Building Grants - Phase II ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada's international response to the HIV/AIDS epidemic is largely built around the work of the Canadian HIV Vaccine Initiative (CHVI). CHVI proposes to increase the capacity of Canada and low- and middle-income countries to respond to the HIV/AIDS pandemic by developing new HIV vaccines and other preventive ...

  5. Reducing the Risk: Building Skills To Prevent Pregnancy.

    Science.gov (United States)

    Barth, Richard P.

    This teacher's guide focuses on ways to prevent teenage pregnancy by teaching and practicing the interpersonal skills necessary to help teenagers abstain or utilize effective contraception methods. The practice in this carefully-tested, 15-lesson curriculum comes in the form of role plays, class discussions, and homework assignments that focus on…

  6. Building Capacity for HIV/AIDS Prevention Trials Research and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    A relatively small number of African sites have the clinical and laboratory capacity to design, manage and carry out HIV/AIDS prevention trials. This project is based on the premise that many of the required skills are already present at additional locations, but need further development. The grant will facilitate interaction ...

  7. Pollution prevention opportunity assessment for Building 922 solid office waste

    International Nuclear Information System (INIS)

    Phillips, N.M.

    1995-01-01

    Building 922 houses all of SNL/California's ES and H Departments: Health Protection, Environmental Protection, Safety, and Environmental Operations. It covers approximately 10,000 square feet and houses about 80 people. The office personnel generate nonhazardous solid office wastes in their daily activities. To determine the types and amounts of waste generated, a special PPOA sorting team sorted all of the trash collected from the building for a period of one-week (including paper and aluminum cans in the recycling bins). The team sorted the trash into major categories: paper, plastic, metals, glass, wet garbage, rest room waste, and miscellaneous materials. They then sorted it into subcategories within each major category. Rest room waste was collected but not sorted. The waste in each category was weighed separately. The total amount of trash collected during the week was approximately 168.8 kg (371.4 lbs). The results of this PPOA indicate that SNL/California is minimizing most nonhazardous office waste and reductions planned for the near future will add significantly to the minimization efforts

  8. Pollution prevention opportunity assessment for Building 922 solid office waste

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, N.M. [Sandia National Labs., Livermore, CA (United States). Environmental Protection Dept.

    1995-01-01

    Building 922 houses all of SNL/California`s ES and H Departments: Health Protection, Environmental Protection, Safety, and Environmental Operations. It covers approximately 10,000 square feet and houses about 80 people. The office personnel generate nonhazardous solid office wastes in their daily activities. To determine the types and amounts of waste generated, a special PPOA sorting team sorted all of the trash collected from the building for a period of one-week (including paper and aluminum cans in the recycling bins). The team sorted the trash into major categories: paper, plastic, metals, glass, wet garbage, rest room waste, and miscellaneous materials. They then sorted it into subcategories within each major category. Rest room waste was collected but not sorted. The waste in each category was weighed separately. The total amount of trash collected during the week was approximately 168.8 kg (371.4 lbs). The results of this PPOA indicate that SNL/California is minimizing most nonhazardous office waste and reductions planned for the near future will add significantly to the minimization efforts.

  9. Contextual community prevention theory: building interventions with community agency collaboration.

    Science.gov (United States)

    Morales, Eduardo S

    2009-11-01

    Translation from research to practice faces numerous problems that include replicating effectiveness, fidelity to the protocol and processes, and adaptations to different types of target populations. Working collaboratively with existing service providers can speed up the time for development and can ease the implementation of empirical randomized trials. Contextual community prevention theory is an innovative approach that focuses on changing behaviors of community members by creating a visible institutional presence that draws and pulls the targeted population into the organization's activities and interventions. The result is an institution or organization within the community that provides a new active and dynamic context, engaging its community members into its activities, interventions, and functions. An HIV prevention program developed collaboratively from the ground up for Latino gay/bisexual men is presented. Results from the program evaluation efforts across the years suggest promise for testing its efficacy through a randomized trial. HIV prevention efforts need to develop dynamic support systems within communities where these men have ownership, have control, and feel safe; otherwise HIV infection rates in this population will increase. Copyright 2009 by the American Psychological Association

  10. Building Partner Capacity: Inventory of Department of Defense Security Cooperation and Department of State Security Assistance Efforts

    Science.gov (United States)

    2017-03-24

    through them as well as through unsynchronized processes, resources, programs, and organizations to execute individual initiatives with partner nations ...Programs Committee on Appropriations United States Senate The Honorable Mac Thornberry Chairman The Honorable Adam Smith Ranking Member...security-related threats—an objective that has become increasingly prominent in U.S. national security strategy and foreign policy in recent years

  11. Transatlantic Transformation: Building a NATO-EU Security Partnership for the 21st Century

    National Research Council Canada - National Science Library

    Preler, Brian J

    2008-01-01

    .... The uncertain realities of the 21st century security environment demand new comprehensive and cooperative approaches to collective security, in which diverse civil and military efforts are employed...

  12. HACCP-Based Programs for Preventing Disease and Injury from Premise Plumbing: A Building Consensus

    Science.gov (United States)

    McCoy, William F.; Rosenblatt, Aaron A.

    2015-01-01

    Thousands of preventable injuries and deaths are annually caused by microbial, chemical and physical hazards from building water systems. Water is processed in buildings before use; this can degrade the quality of the water. Processing steps undertaken on-site in buildings often include conditioning, filtering, storing, heating, cooling, pressure regulation and distribution through fixtures that restrict flow and temperature. Therefore, prevention of disease and injury requires process management. A process management framework for buildings is the hazard analysis and critical control point (HACCP) adaptation of failure mode effects analysis (FMEA). It has been proven effective for building water system management. Validation is proof that hazards have been controlled under operating conditions and may include many kinds of evidence including cultures of building water samples to detect and enumerate potentially pathogenic microorganisms. However, results from culture tests are often inappropriately used because the accuracy and precision are not sufficient to support specifications for control limit or action triggers. A reliable negative screen is based on genus-level Polymerase Chain Reaction (PCR) for Legionella in building water systems; however, building water samples with positive results from this test require further analysis by culture methods. PMID:26184325

  13. Prevention of uncontrolled progressive collapse of a high-rise brick building

    Directory of Open Access Journals (Sweden)

    Pakhmurin Oleg

    2018-01-01

    Full Text Available In recent years, there is a trend towards increasing the failure rate of buildings and structures as a result of unforeseen situations. This study is aimed at assessing the operational reliability of the structure to prevent emergencies and progressive collapse. The behavior of structures affected by various factors was analyzed. The operational condition of a building with stone walls and a rigid structural frame constructed in the middle of the 20th century was considered. By means of a detailed instrumental examination, effects of long-term operation, climatic factors and violations during construction on the serviceability of the building were analyzed. Geotechnical conditions of the site were investigated. Necessary re-calculations for load-bearing structural elements and foundations were carried out. An expected failure diagram for vertical load-bearing structures of the building is presented. Proposals for preventing progressive collapse were developed on the basis of the author's technique.

  14. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    Science.gov (United States)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  15. Crime prevention in terms of designing public space and the role of private security

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir S.

    2015-01-01

    Full Text Available Concern about the security of public spaces has become increasingly important in the last thirty years, both in the public service (police and in private security which is responsible for protection of individual private facilities. It has been concluded that the study of public space design in terms of security is as important as the study of social and other factors of criminal behavior. Modern architectural solutions must take into account a design of space and facilities that prevents and obstructs the exercise of criminal actions to a maximum. Security design should make crime dangerous, less desirable and less justified, i.e. it should change the perception that potential criminals have of the risks of criminal behavior in terms of greater opportunities for its detection and arrest. The paper presents the criteria which should be followed when designing a public space, its effect on the behavior of criminals and notes on how badly designed public space reduces the effects of formal oversight by private security guards and the police. Most of the work is related to the case study of Block 21 in New Belgrade as a typical representative of the public space that has undergone numerous transformations over the past 50 years. There are very important indicators of how design changes of the area affected the state of crime.

  16. Adoption of Smart Structures for Prevention of Health Hazards in Buildings

    Science.gov (United States)

    Oke, Ayodeji; Aigbavboa, Clinton; Ngema, Wiseman

    2017-11-01

    The importance of building quality to the health and well-being of occupants and surrounding neighbors cannot be overemphasized. Smart structures were construed to proffer solution to various issues of sustainable development including social factors that is concerned with health and safety of people. Based on existing literature materials on building quality, smart structures and general aspect of sustainable developments, this study examined the benefits of smart structures in the prevention of various health issues in infrastructural buildings, which has been a concern for stakeholders in the architecture, engineering and construction industry. The criterion for indoor environmental quality was adopted and various health and bodily issues related to building quality were explained. The adoption of smart structure concept will help to manage physical, chemical, biological and psychological factors of building with a view to enhancing better quality of life of occupants.

  17. Excessive Heat Events and National Security: Building Resilience based on Early Warning Systems

    Science.gov (United States)

    Vintzileos, A.

    2017-12-01

    Excessive heat events (EHE) affect security of Nations in multiple direct and indirect ways. EHE are the top cause for morbidity/mortality associated to any atmospheric extremes. Higher energy consumption used for cooling can lead to black-outs and social disorder. EHE affect the food supply chain reducing crop yield and increasing the probability of food contamination during delivery and storage. Distribution of goods during EHE can be severely disrupted due to mechanical failure of transportation equipment. EHE during athletic events e.g., marathons, may result to a high number of casualties. Finally, EHE may also affect military planning by e.g. reducing hours of exercise and by altering combat gear. Early warning systems for EHE allow for building resilience. In this paper we first define EHE as at least two consecutive heat days; a heat day is defined as a day with a maximum heat index with probability of occurrence that exceeds a certain threshold. We then use retrospective forecasts performed with a multitude of operational models and show that it is feasible to forecast EHE at forecast lead of week-2 and week-3 over the contiguous United States. We finally introduce an improved definition of EHE based on an intensity index and investigate forecast skill of the predictive system in the tropics and subtropics.

  18. Transatlantic Transformation: Building a NATO-EU Security Partnership for the 21st Century

    National Research Council Canada - National Science Library

    Preler, Brian J

    2008-01-01

    ... together in a coordinated way. This paper examines the fundamental importance of transforming the NATO-EU relationship into an effective Euro-Atlantic security partnership given the challenges of the 21st century security...

  19. Using Action Planning to Build Organizational Capacity for the Prevention of Intimate Partner Violence

    Science.gov (United States)

    Schober, Daniel J.; Fawcett, Stephen B.

    2015-01-01

    The DELTA PREP Project aims to reduce risk for intimate partner violence (IPV). It engaged leadership and staff from 19 statewide domestic violence coalitions in building capacity to prevent IPV before it occurs (rather than solely responding to IPV). This article describes the process and outcomes associated with action planning to create…

  20. TanZamBo Capacity Building for HIV Prevention Research Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This grant will support the development of HIV/AIDS prevention trial expertise in Botswana, Tanzania and Zambia using existing collaborations between Africa, Canada and the United States. The Botswana-Tanzania-Zambia Capacity Building Network (TanZamBo) is composed of two African institutions with fairly well ...

  1. RADON PREVENTION IN THE DESIGN AND CONSTRUCTION OF SCHOOLS AND OTHER LARGE BUILDINGS

    Science.gov (United States)

    The paper discusses radon prevention in the design and construction of schools and other large buildings. ased on studies in progress for the past 3 years, the U.S. EPA's Office of Research and Development (ORD) has started incorporating radon control measures into the design and...

  2. Doorstep: A doorbell security system for the prevention of doorstep crime.

    Science.gov (United States)

    Ennis, Andrew; Cleland, Ian; Patterson, Timothy; Nugent, Chris D; Cruciani, Federico; Paggetti, Cristiano; Morrison, Gareth; Taylor, Richard

    2016-08-01

    Safety and security rank highly in the priorities of older people on both an individual and policy level. Older people are commonly targeted as victims of doorstep crime, as they can be perceived as being vulnerable. As a result, this can have a major effect on the victim's health and wellbeing. There have been numerous prevention strategies implemented in an attempt to combat and reduce the number of doorstep crimes. There is, however, little information available detailing the effectiveness of these strategies and how they impact on the fear of crime, particularly with repeat victims. There is therefore clear merit in the creation and piloting of a technology based solution to combat doorstep crime. This paper presents a developed solution to provide increased security for older people within their home.

  3. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  4. Measuring the burden of preventable diabetic hospitalisations in the Mexican Institute of Social Security (IMSS).

    Science.gov (United States)

    Lugo-Palacios, David G; Cairns, John; Masetto, Cynthia

    2016-08-02

    The prevalence of diabetes among adults in Mexico has increased markedly from 6.7 % in 1994 to 14.7 % in 2015. Although the main diabetic complications can be prevented or delayed with timely and effective primary care, a high percentage of diabetic patients have developed them imposing an important preventable burden on Mexican society and on the health system. This paper estimates the financial and health burden caused by potentially preventable hospitalisations due to diabetic complications in hospitals operated by the largest social security institution in Latin America, the Mexican Institute of Social Security (IMSS), in the period 2007-2014. Hospitalisations in IMSS hospitals whose main cause was a diabetic complication were identified. The financial burden was estimated using IMSS diagnostic-related groups. To estimate the health burden, DALYs were computed under the assumption that patients would not have experienced complications if they had received timely and effective primary care. A total of 322,977 hospitalisations due to five diabetic complications were identified during the period studied, of which hospitalisations due to kidney failure and diabetic foot represent 78 %. The financial burden increased by 8.4 % in real terms between 2007 and 2014. However, when measured as cost per IMSS affiliate, it decreased by 11.3 %. The health burden had an overall decrease of 13.6 % and the associated DALYs in 2014 reached 103,688. Resources used for the hospital treatment of diabetic complications are then not available for other health care interventions. In order to prevent these hospitalisations more resources might need to be invested in primary care; the first step could be to consider the financial burden of these hospitalisations as a potential target for switching resources from hospital care to primary care services. However, more evidence of the effectiveness of different primary care interventions is needed to know how much of the burden could

  5. Building a Secure and Feature-rich Mobile Mapping Service App Using HTML5: Challenges and Best Practices

    Energy Technology Data Exchange (ETDEWEB)

    Karthik, Rajasekar [ORNL; Patlolla, Dilip Reddy [ORNL; Sorokine, Alexandre [ORNL; Myers, Aaron T [ORNL

    2014-01-01

    Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, it is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.

  6. Building Foundations for Nuclear Security Enterprise Analysis Utilizing Nuclear Weapon Data

    Energy Technology Data Exchange (ETDEWEB)

    Josserand, Terry Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis; Young, Leone [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis; Chamberlin, Edwin Phillip [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis

    2017-09-01

    The Nuclear Security Enterprise, managed by the National Nuclear Security Administration - a semiautonomous agency within the Department of Energy - has been associated with numerous assessments with respect to the estimating, management capabilities, and practices pertaining to nuclear weapon modernization efforts. This report identifies challenges in estimating and analyzing the Nuclear Security Enterprise through an analysis of analogous timeframe conditions utilizing two types of nuclear weapon data - (1) a measure of effort and (2) a function of time. The analysis of analogous timeframe conditions that utilizes only two types of nuclear weapon data yields four summary observations that estimators and analysts of the Nuclear Security Enterprise will find useful.

  7. Preventative security as a mode of government. The case of Madrid

    Directory of Open Access Journals (Sweden)

    Sergio García García

    2016-03-01

    Full Text Available The aim of this article is to explore the influence of neoliberal criminological doctrines on the discourses and practices of police management in Madrid. We shall examine in depth what we consider to be the pillars of this security policy: first, the economic procedure that forces a cost and benefit assessment; second, the logic of differentiation of subjects and spaces; third, the relevance given to technical tools to approach both objective and subjective insecurity, and last, the concept of "prevention", which is transverse to all the previous ones, and tries to break away from a repressive approach and manage efficiently any risk of disordering the social order. This analysis is the basis of our thesis: through banal prevention of (insecurity a distributed form of governance is implemented over the social.

  8. Information Security Analysis: A Study to Analyze the Extent to Which Information Security Systems Can Be Utilized to Prevent Intoxicated Individuals from Driving

    Science.gov (United States)

    Pierre, Joseph D.

    2011-01-01

    Information security systems (ISS) have been designed to protect assets from damages and from unauthorized access internally as well as externally. This research is promising similar protection from ISS methods that could prevent intoxicated individuals under the influence of alcohol from driving. However, previous research has shown significant…

  9. Supply Ventilation and Prevention of Carbon Monoxide (II) Ingress into Building Premises

    Science.gov (United States)

    Litvinova, N. A.

    2017-11-01

    The article contains the relationships of carbon monoxide (II) concentration versus height-above-ground near buildings derived based on results of studies. The results of studies are crucial in preventing external pollutants ingress into a ventilation system. Being generated by external emission sources, such as motor vehicles and city heating plants, carbon monoxide (II) enters the premises during operation of a supply ventilation system. Fresh air nomographic charts were drawn to select the height of a fresh air intake into the ventilation system. Nomographic charts take into account external sources. The selected emission sources are located at various levels above ground relative to the building. The recommendations allow designing supply ventilation taking into account the quality of ambient air through the whole building height.

  10. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  11. Effectiveness of biosecurity measures in preventing badger visits to farm buildings.

    Science.gov (United States)

    Judge, Johanna; McDonald, Robbie A; Walker, Neil; Delahay, Richard J

    2011-01-01

    Bovine tuberculosis caused by Mycobacterium bovis is a serious and economically important disease of cattle. Badgers have been implicated in the transmission and maintenance of the disease in the UK since the 1970s. Recent studies have provided substantial evidence of widespread and frequent visits by badgers to farm buildings during which there is the potential for close direct contact with cattle and contamination of cattle feed. Here we evaluated the effectiveness of simple exclusion measures in improving farm biosecurity and preventing badger visits to farm buildings. In the first phase of the study, 32 farms were surveyed using motion-triggered infrared cameras on potential entrances to farm buildings to determine the background level of badger visits experienced by each farm. In the second phase, they were divided into four treatment groups; "Control", "Feed Storage", "Cattle Housing" and "Both", whereby no exclusion measures were installed, exclusion measures were installed on feed storage areas only, cattle housing only or both feed storage and cattle housing, respectively. Badger exclusion measures included sheet metal gates, adjustable metal panels for gates, sheet metal fencing, feed bins and electric fencing. Cameras were deployed for at least 365 nights in each phase on each farm. Badger visits to farm buildings occurred on 19 of the 32 farms in phase one. In phase two, the simple exclusion measures were 100% effective in preventing badger entry into farm buildings, as long as they were appropriately deployed. Furthermore, the installation of exclusion measures also reduced the level of badger visits to the rest of the farmyard. The findings of the present study clearly demonstrate how relatively simple practical measures can substantially reduce the likelihood of badger visits to buildings and reduce some of the potential for contact and disease transmission between badgers and cattle.

  12. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  13. Biosafety and Biosecurity: A relative risk-based framework for safer, more secure and sustainable laboratory capacity building

    Directory of Open Access Journals (Sweden)

    Petra eDickmann

    2015-10-01

    Full Text Available Background: Laboratory capacity building is characterized by a paradox between endemicity and resources: Countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity and capacities (laboratories, trained staff, adequate regulations. Meanwhile, countries with low endemicity of pathogenic agents often have high containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. Methods: A group at Chatham House developed a draft conceptual framework for safer, more secure and sustainable laboratory capacity building. Results: The draft generic framework is guided by the phrase ‘LOCAL – PEOPLE – MAKE SENSE’ that represents three major principles: capacity building according to local needs (local with an emphasis on relationship and trust-building (people and continuous outcome and impact measurement (make sense. Conclusions: This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.

  14. Building a Rice Decision Support System to Support Global Food Security and Commodity Markets, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...

  15. Building Indigenous Security Forces in the Face of an Insurgency: Vietnam

    National Research Council Canada - National Science Library

    Weaver, Michael

    2005-01-01

    .... South Vietnam was in turmoil between 1963 and 1966; political factions were more concerned with governmental power and self-preservation than they were with securing the country against communist insurgents...

  16. Security Sector Reform: A Case Study Approach to Transition and Capacity Building

    Science.gov (United States)

    2010-01-01

    penitentiaries . In such situations, state mechanisms are ineffective, predatory, or absent.1 Security sector reform, commonly referred to as SSR, emerged as...border guards; customs authorities; reserve or local security units; and national guard; as well as corrections and penitentiary officers...suggest that reforms of police, justice, and corrections ( penitentiaries ) must be likened to a three-legged stool. If one leg is weak because of

  17. Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities

    Science.gov (United States)

    2015-12-01

    based on different structures and administered by two different departments. The adoption of reforms would have several advantages in the export control...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...December 2015 3. REPORT TYPE AND DATES COVERED Joint applied project 4. TITLE AND SUBTITLE REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO

  18. Flexible and secure labour market transitions: Towards institutional capacity building in the digital economy

    OpenAIRE

    Schmid, Günther

    2016-01-01

    Industry 4.0 and robots are said to speed up productivity thereby inducing a 'quantum leap' towards the 'end of work' and calling for a complete change of social security institutions that have so far been closely linked to employment. Unconditional basic income is the cry of the day, curiously advocated in particular by, for example, employers in high-tech industries and modern financial or distributive services. In the name of freedom, liberty and flexibility they suggest a form of security...

  19. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  20. Regulation and its role in the prevention of building-associated illness.

    Science.gov (United States)

    Besch, E L

    1989-01-01

    defined as "a state of complete physical, mental and social well-being not merely the absence of disease or infirmity," greater emphasis should be given to the concept of control and maintenance of healthy indoor environments (i.e., "healthy buildings") through utilization of quality assurance measures. Also, human response, system performance, and service factors should be utilized to assure an acceptable building performance. Finally, building designers, contractors, owners, managers, and operators must be knowledgeable regarding indoor air quality problems and their consequences and work together to build and maintain healthy buildings. This includes developing training, education, monitoring, and preventive maintenance programs to assure accountability for the proper management of the building systems. The certification (or licensing) of those responsible for providing indoor air quality has been suggested.

  1. Whole Building Design Objectives for Campus Safety and Security: A System Dynamics Approach

    Science.gov (United States)

    Oakes, Charles G.

    2010-01-01

    The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…

  2. Building

    Directory of Open Access Journals (Sweden)

    Ashwani kumar

    2015-08-01

    This paper discusses existing development scenario and issues to accommodate future development in hill towns located in Indian Himalayan region, also highlights the state of existing building regulations through an in-depth study of building regulations in major hill towns, and briefly discuses possible approaches to change existing building regulations for achieving contextually appropriate development.

  3. Are green building features safe for preventive maintenance workers? Examining the evidence.

    Science.gov (United States)

    Omar, Mohamed Shamun; Quinn, Margaret M; Buchholz, Bryan; Geiser, Ken

    2013-04-01

    Many newly constructed green buildings (GB) are certified using the United States Green Building Council (USGBC) Leadership in Energy and Environmental Design (LEED) rating system for new construction and major renovation which focuses on architectural and mechanical design to conserve energy, reduce environmental harm, and enhance indoor quality for occupants. This study evaluated the preventive maintenance (PM) worker occupational safety and health (OSH) risks related to the design of GB. PM job hazard analyses (JHA) were performed on the tasks required to operate and maintain five GB features selected from 13 LEED certified GB. A 22-item JHA and OSH risk scoring system were developed. Potentially serious OSH hazards included: green roofs made of slippery material without fall protection; energy recovery wheels and storm water harvesting systems in confined spaces; skylights without guard rails; and tight geothermal well mechanical rooms constraining safe preventive practices. GB can present PM OSH risks and these should be eliminated in the building design phase. Copyright © 2013 Wiley Periodicals, Inc.

  4. Energy security of residential buildings as an aspect of managerial activity in the modern concept of globalization

    Science.gov (United States)

    Chumakova, Olga

    2017-10-01

    The paper shows the management aspects of ensuring the safety of residential buildings. The article presents an analytical review of the state of the existing heat supply systems in the Russian Federation, assesses their energy security, highlights the results of research into the causes of accidents in engineering systems in water-bearing communications, and provides methods and comparative calculations of failures of these systems. It is indicated that according to the results of the All-Russian Census of 2010, the total population of the Russian Federation at the time of the survey was 142 million 857 thousand people living in more than 1100 settlements that have the status of the city (subject to their identification by population, administrative and national economic significance and the nature of the building), as well as in almost 160,000 rural settlements. It should be noted that in accordance with the classification of settlements in the Russian Federation, there are five main categories, namely: The above classification of settlements has formed the basis for the analysis of the existing processes of functioning of the heat supply systems of the Russian Federation at the objects of housing, social and industrial development from the point of view of energy security. Thus, for example, it turned out that in large cities with multi-storey buildings the centralized heat supply system is dominated by a system consisting of one or several sources of heat, heat networks having different diameter of pipelines, their number and length, and also serving various types of heat consumers) from cogeneration plants (CHP) of public use, or industrial enterprises. As for the welterweight and small towns, including urban-type settlements with a multi-storey building of the post-war period, they, as a rule, have the majority of IGFs, fed from the city or district boiler houses.

  5. Increasing security of supply: The search for stable models of financing for new nuclear build in the European Union

    International Nuclear Information System (INIS)

    Heffron, Raphael James

    2009-01-01

    Full text: This research assesses models for financing of new nuclear build in European Union (EU) member states to find the most stable form. The countries examined in this study are France, the United Kingdom, Finland and Romania. The results attest that due to various historical, political, competition, and electricity market structural conditions Romania has emerged with the most secure and stable model for financing of new nuclear projects. This paper begins with an assessment of the effects on the nuclear sector from energy, environment and competition legislation in the EU. Then the political and economic climate of the afore mentioned EU member states is completed. Following this an overview of the market structure of the electricity sector in those respective countries is conducted. Then the key research on the models of financing of new nuclear build is explored, contrasted and analysed. The research concludes that there are four main models for financing new nuclear projects in Europe. Each model has transcended from different political and economic forces, and consequently each model has met with varied levels of success. Electricity market structures while operating to the same legal requirements, have been dissimilar in their evolution. The combination of the above factors has led to different models for financing new nuclear build. Upon further analysis it is concluded and demonstrated that the Romanian financing model is the most suitable and provides an example for any new nuclear build aspiring nations in the EU and beyond. (author)

  6. A Systematic Approach for Dynamic Security Assessment and the Corresponding Preventive Control Scheme Based on Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Sun, Kai; Rather, Zakir Hussain

    2014-01-01

    system simulations. Fed with real-time wide-area measurements, one DT of measurable variables is employed for online DSA to identify potential security issues, and the other DT of controllable variables provides online decision support on preventive control strategies against those issues. A cost......This paper proposes a decision tree (DT)-based systematic approach for cooperative online power system dynamic security assessment (DSA) and preventive control. This approach adopts a new methodology that trains two contingency-oriented DTs on a daily basis by the databases generated from power...

  7. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks

  8. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    Gwin, Jeremy; Frenette, Douglas

    2010-01-01

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 - Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or ''clean,'' building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, ''Final Status Survey Plan for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201'') was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room into one

  9. Nation-building e segurança internacional: Um debate em construção Nation-building and international security: A debate under construction

    Directory of Open Access Journals (Sweden)

    Aureo de Toledo Gomes

    2009-08-01

    Full Text Available Este artigo almeja analisar as operações de nation-building, que, desde os atentados terroristas de 11 de setembro de 2001, são consideradas uma das maneiras para se lidar com as novas ameaças de segurança internacional, principalmente os ditos Estados Falidos. Assim sendo, revisaremos a bibliografia sobre o tema, procurando identificar as origens destas operações, assim como as definições utilizadas pelos principais autores e os problemas que elas possam apresentar.This article aims to analyze nation-building operations, which have been considered, since September 11, 2001 terrorist attacks, one of the ways to cope with the new threats to international security, mainly the so-called Failed States. Therefore, we will review the bibliography published, trying to identity not only the origins of such operations but also the definitions used by the main authors and the problems that they might present.

  10. AF Security Forces and Building Partner Capacity Examining Cultural Competency as a Force Enabler

    Science.gov (United States)

    2017-02-03

    personal experiences as a Security Forces commander executing the Police Transition Team mission in Iraq. Ultimately this analysis revolves around... eyes of the indigenous culture, it wasn’t a war for communism, it was a civil war for unification. “Former Secretary of Defense Robert McNamara...in a color coded method for each of the police stations and police chiefs and then report that information up the chain of command in what was called

  11. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jeremy Gwin and Douglas Frenette

    2010-09-30

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 – Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or “clean,” building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, “Final Status Survey Plan for Corrective Action Unit 117 – Pluto Disassembly Facility, Building 2201”) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room

  12. Building Afghanistan’s Security Forces in Wartime: The Soviet Experience

    Science.gov (United States)

    2011-01-01

    both. Many chose to remain anonymous , but I wish particularly to thank former Afghan Minister of Defense Shahnawaz Tanai, Minister of Interior (at...immune to corruption, per a story of a Soviet advisor who was selling medicine, food, and alcohol to the enemy and who, rather than being publicly...Challenges and Responses 67 building contacts with the clergy .30 Officially, the army had 95 trained mullahs on its staff in the mid-1980s (in

  13. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    Directory of Open Access Journals (Sweden)

    Luke Howie

    2014-11-01

    Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.

  14. Helping to build and rebuild secure lives and futures: financial transfers from parents to adult children and grandchildren.

    Science.gov (United States)

    Ploeg, Jenny; Campbell, Lori; Denton, Margaret; Joshi, Anju; Davies, Sharon

    2004-01-01

    This paper explores intergenerational financial transfers from parents to adult children and grandchildren within a life course perspective. Research on intergenerational financial transfers has been sparse, and little is known about the financial support older Canadians provide to family members or about the meaning of that assistance. Survey data from a convenience sample of older Canadians was analysed to determine the types of financial assistance older persons provide, what motivates them to provide this assistance, and what meanings such transfers have for the older persons themselves. Findings suggest that it is often events and transitions in the lives of adult children that shape the financial assistance that is needed and given within these families. Older parents demonstrate a strong desire to help their children and grandchildren through important or difficult transitions to "build or rebuild secure lives and futures". Parents' assistance is also influenced by their own family history of assistance and their desire to pass on an early inheritance during their lifetime.

  15. Laboratory security and emergency response guidance for laboratories working with select agents. Centers for Disease Control and Prevention.

    Science.gov (United States)

    Richmond, Jonathan Y; Nesby-O'Dell, Shanna L

    2002-12-06

    In recent years, concern has increased regarding use of biologic materials as agents of terrorism, but these same agents are often necessary tools in clinical and research microbiology laboratories. Traditional biosafety guidelines for laboratories have emphasized use of optimal work practices, appropriate containment equipment, well-designed facilities, and administrative controls to minimize risk of worker injury and to ensure safeguards against laboratory contamination. The guidelines discussed in this report were first published in 1999 (U.S. Department of Health and Human Services/CDC and National Institutes of Health. Biosafety in microbiological and biomedical laboratories [BMBL]. Richmond JY, McKinney RW, eds. 4th ed. Washington, DC: US Department of Health and Human Services, 1999 [Appendix F]). In that report, physical security concerns were addressed, and efforts were focused on preventing unauthorized entry to laboratory areas and preventing unauthorized removal of dangerous biologic agents from the laboratory. Appendix F of BMBL is now being revised to include additional information regarding personnel risk assessments, and inventory controls. The guidelines contained in this report are intended for laboratories working with select agents under biosafety-level 2, 3, or 4 conditions as described in Sections II and III of BMBL. These recommendations include conducting facility risk assessments and developing comprehensive security plans to minimize the probability of misuse of select agents. Risk assessments should include systematic, site-specific reviews of 1) physical security; 2) security of data and electronic technology systems; 3) employee security; 4) access controls to laboratory and animal areas; 5) procedures for agent inventory and accountability; 6) shipping/transfer and receiving of select agents; 7) unintentional incident and injury policies; 8) emergency response plans; and 9) policies that address breaches in security. The security plan

  16. Promoting self-determination and financial security through innovative asset building approaches.

    Science.gov (United States)

    Burke-Miller, Jane K; Swarbrick, Margaret A; Carter, Tina M; Jonikas, Jessica A; Zipple, Anthony M; Fraser, Virginia V; Cook, Judith A

    2010-01-01

    Studies indicate that asset development programs such as Individual Development Accounts (IDAs) can enhance the economic security of low-income populations; however, only a handful of asset development programs have been implemented specifically to serve people with psychiatric disabilities, and larger programs have not collected disability-specific information. The purpose of this article is to increase our knowledge about the use of IDAs to enhance self-determination and recovery for people with psychiatric disabilities. Background information about IDAs is presented followed by case studies of two IDA programs that serve people with psychiatric disabilities. The use of IDA programs in enhancing self-determination among people with psychiatric disabilities is discussed, along with barriers and future directions.

  17. Quantifying Biodiversity for Building Resilience for Food Security in Urban Landscapes: Getting Down to Business

    Directory of Open Access Journals (Sweden)

    Åsa Jansson

    2010-09-01

    Full Text Available A steady stream of ecosystem services is essential for human welfare and survival, and it has been convincingly shown that these flows are being eroded. Compelling theoretical knowledge about essential connections between ecosystem service generation, biodiversity, and resilience in social-ecological systems already exists; however, we still, to a great extent, lack spatially explicit quantitative assessments for translating this theoretical knowledge into practice. We propose an approach for measuring the change in flow and resilience of a regulating ecosystem service on a landscape scale over time when the landscape is exposed to both land use change due to urban expansion, and change in a large-scale economic driver. Our results quantitatively show that there can be a substantial decrease in resilience due to negative effects on response diversity without detecting any major decrease in ecosystem service generation over time, thus generating a sense of false security and sustainability.

  18. Building public health capacity in Afghanistan to implement the International Health Regulations: a role for security forces.

    Science.gov (United States)

    Chrétien, Jean-Paul; Yingst, Samuel L; Thompson, Donald

    2010-09-01

    The government of Afghanistan, with international partners and donors, has achieved substantial public health improvements during the past 8 years. But a critical gap remains: capacities to detect and respond to disease outbreaks that could constitute a public health emergency of international concern, as required by the International Health Regulations (IHR). The Afghan Ministry of Public Health seeks to build these capacities, but conflict and scarcity of resources hinder public health surveillance and response, diagnostic laboratory and clinical management capacity is limited, and massive international population movements could permit outbreaks to cross international borders. Several diseases covered by the IHR, such as polio, are endemic in Afghanistan, and risk of novel disease emergence may be elevated in some areas. The security forces of the United States and other countries with military presence in Afghanistan are potential partners for the government of Afghanistan in strengthening the public health capacity. They could extend specialized disease surveillance and response capabilities to the Afghan military and civilian sectors and could integrate surveillance and response capacity building into ongoing development programs, especially in insecure areas. The World Health Organization could provide the forum for coordinating military and civilian contributions to public health capacity strengthening in Afghanistan and could help ensure that international health sector development efforts address Afghan public health priorities in addition to IHR requirements.

  19. Building confidence and partnership through the safe and secure dismantlement of nuclear weapons

    International Nuclear Information System (INIS)

    Goodby, J.E.

    1993-01-01

    The cold war is behind us now. It was with us a long time and we came to know it well. It was a dangerous time, but it had familiar contours and predictable reference points. Now, the topography of the bipolar confrontation is gone. We face great uncertainty and, yes, danger is still our companion. It is close at hand in the deadly relics of the cold war-the thousands of nuclear weapons that have been left behind like mines buried in a battlefield long after the guns have fallen silent. Our challenge is to construct a new and safer framework for our mutual relations beyond the cold war, based not on suspicion and fear, but on confidence and partnership. In doing so, it would be well to reflect on the enormous resources that were devoted to building weapons as compared to the relatively modest resources that will be needed to invest in peace. From that comparison should emerge a sense of proportion as to what we are called upon to do. We have choices. We can idly 'sleepwalk through history' and, once again, allow nuclear weapons to generate suspicion, competition, tension, and arms races reminiscent of the cold war. If we allow that to happen, we will have failed in our duty to posterity, and future generations will and should-judge us harshly. This would truly be the 'march of folly'. But if we seize the moment to build a solid foundation of confidence and partnership, we will surely be celebrated for our legacy of wisdom and peace. This is that moment. Let us now be wise

  20. Environmental Planning, Prevention and Disaster Response in The Arabian Gulf USCENTICOM's Regional Environmental Security Conference

    National Research Council Canada - National Science Library

    Griffard, B

    2002-01-01

    .... Such environmental security related disasters hinder economic progress displace populations and facilitate the growth of undesirable elements and the proliferation of weapons of mass destruction...

  1. Enhancing teen pregnancy prevention in local communities: capacity building using the interactive systems framework.

    Science.gov (United States)

    Duffy, Jennifer L; Prince, Mary Severson; Johnson, Erin E; Alton, Forrest L; Flynn, Shannon; Faye, Amy Mattison; Padgett, Polly Edwards; Rollison, Chris; Becker, Dana; Hinzey, Angela L

    2012-12-01

    Getting To Outcomes (GTO), an innovative framework for planning, implementing, evaluating, and sustaining interventions has been shown to be effective in helping community-based organizations (CBOs) introduce science-based approaches into their prevention work. However, the Interactive Systems Framework (ISF) suggests that adopting innovations like GTO requires a significant amount of capacity building through training and technical assistance (T/TA). In this study, 11 CBOs and three schools in South Carolina entered into a 3 year program of intense and proactive T/TA based on the ISF to learn how to apply an adaptation of GTO (Promoting Science-Based Approaches-Getting To Outcomes, PSBA-GTO) to their teen pregnancy prevention programs. Using semi-structured interviews, the partnering organizations were assessed at three points in time, pre-T/TA, 12 months, and post T/TA (30 months) for their performance of the steps of GTO in their work. The seven organizations which participated in T/TA until the end of the project received an average of 76 h of TA and 112 h of training per organization. Interview results showed increased performance of all 10 steps of PSBA-GTO by these organizations when conducting their teen pregnancy programs. These results suggest targeted and proactive T/TA can successfully bridge the gap between research and practice by using a three part delivery system, as prescribed in the ISF, which relies on an intermediary prevention support system to ensure accurate and effective translation of research to the everyday work of community-based practitioners.

  2. Importance Sampling Based Decision Trees for Security Assessment and the Corresponding Preventive Control Schemes: the Danish Case Study

    DEFF Research Database (Denmark)

    Liu, Leo; Rather, Zakir Hussain; Chen, Zhe

    2013-01-01

    and adopts a methodology of importance sampling to maximize the information contained in the database so as to increase the accuracy of DT. Further, this paper also studies the effectiveness of DT by implementing its corresponding preventive control schemes. These approaches are tested on the detailed model......Decision Trees (DT) based security assessment helps Power System Operators (PSO) by providing them with the most significant system attributes and guiding them in implementing the corresponding emergency control actions to prevent system insecurity and blackouts. DT is obtained offline from time...

  3. Simulation of a dead reckoning embedded system security patrol robot for deployment inside structures and buildings

    Science.gov (United States)

    Tickle, Andrew J.; Meng, Yan; Smith, Jeremy S.

    2010-10-01

    Dead Reckoning (DR) is the process of estimating a robot's current position based upon a previously determined position, and advancing that position based upon known speed and direction over time. It is therefore a simple way for an autonomous mobile robot to navigation within a known environment such as a building where measurements have been taken and a predetermined route planned based upon which doors (or areas) the robot would have enough force to enter. Discussed here is the design of a DR navigation system in Altera's DSP Builder graphical design process. The wheel circumference to the step size of stepper motor used to drive the robot are related and so this ratio can be easily changed to easily accommodate changes to the physical design of a robot with minimal changes to the software. The robot calculates its position in relation to the DR map by means of the number of revolutions of the wheels via odometry, in this situation there is no assumed wheel slippage that would induce an accumulative error in the system overtime. The navigation works by using a series of counters, each corresponding to a measurement taken from the environment, and are controlled by a master counter to trigger the correct counter at the appropriate time given the position of robot in the DR map. Each counter has extra safeguards built into them on their enables and outputs to ensure they only count at the correct time and to avoid clashes within the system. The accuracy of the navigation is discussed after the virtual route is plotted in MATLAB as a visual record in addition to how feedback loops, identification of known objects (such as fire safety doors that it would navigate through), and visual object avoidance could later be added to augment the system. The advantages of such a system are that it has the potential to upload different DR maps so that the end robot for can be used in new environments easily.

  4. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  5. Autonomous Voltage Security Regions to Prevent Cascading Trip Faults in Wind Turbine Generators

    DEFF Research Database (Denmark)

    Niu, Tao; Guo, Qinglai; Sun, Hongbin

    2016-01-01

    Cascading trip faults in large-scale wind power centralized integration areas bring new challenges to the secure operation of power systems. In order to deal with the complexity of voltage security regions and the computation difficulty, this paper proposes an autonomous voltage security region...... wind farm, an AVSR is determined to guarantee the normal operation of each wind turbine generator (WTG), while in the control center, each region is designed in order to guarantee secure operation both under normal conditions and after an N-1 contingency. A real system in Northern China was used...... (AVSR) for each wind farm and the point of common coupling (PCC) substation, whose voltage can be controlled in a decoupled way. The computation of the AVSR can be completed using a stepwise search method exchanging voltage and power information between the control center and the wind farms. At each...

  6. Striking First: Preemptive and Preventive Attack in U.S. National Security Policy

    National Research Council Canada - National Science Library

    Mueller, Karl P; Castillo, Jasen J; Morgan, Forrest E; Pegahi, Negeen; Rosen, Brian

    2006-01-01

    .... U.S. leaders recast the national security strategy to place greater emphasis on the threats posed by violent nonstate actors and by states from which they might acquire nuclear, biological, or chemical...

  7. How to use security risk assessments to manage risks, prevent violence and deal with new threats.

    Science.gov (United States)

    Ramsey-Hamilton, Caroline

    2015-01-01

    With a growing number of healthcare security requirements from states as well as regulators like FEMA, CMS, and DHS, the need to conduct comprehensive Security Risk Assessments has become essential, according to the author. In this article, she provides the basic elements of such assessments as well as guidance on how to apply them to a facility report and how to present the report to management.

  8. Data Protection and the Prevention of Cybercrime: The EU as an area of security?

    OpenAIRE

    PORCEDDA, Maria Grazia

    2012-01-01

    (This working paper is a revised version of Ms. Porcedda's EUI LL.M. thesis, 2012.) Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy and security, and the interplay of the policies tackling them with ‘ICT sensitive’ liberties, such as privacy and data protection. This study addresses the subject in two ways. On the one hand, it aims to cast light on the (legal substantive) nature of, ...

  9. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    OpenAIRE

    Howie, Luke

    2014-01-01

    Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terr...

  10. RADON PREVENTION IN THE DESIGN & CONSTRUCTION OF SCHOOLS & OTHER LARGE BUILDINGS

    Science.gov (United States)

    It is typically easier and much less expensive to design and construct a new building with radon-resistant and/or easy-to-mitigate features, than to add these features after the building is completed and occupied. Therefore, when building in an area with the potential for elevate...

  11. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    Science.gov (United States)

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  12. Shaping a novel security approach in chemical industrial clusters to prevent large-scale domino events

    NARCIS (Netherlands)

    Reniers, Genserik L L; Dullaert, Wout; Soudan, Karel

    2009-01-01

    Two aspects are important when it comes to guaranteeing an effective and efficient security policy in a chemical industrial cluster. The first issue involves obtaining an acceptable level of collaboration between the different enterprises forming the cluster. The second topic is to ensure that an

  13. Evaluating the United Nation’s Agenda for Atrocity Prevention: Prospects for the International Regulation of Internal Security

    Directory of Open Access Journals (Sweden)

    Cecilia Jacob

    2015-10-01

    Full Text Available In recent years the UN Secretary-General has promoted mass atrocity prevention as the priority agenda for the Responsibility to Protect (R2P at the UN, redirecting debates on R2P away from military interventionism towards improved state capacity to prevent atrocity crimes and protect populations. This focus has been illustrated in the UNSG’s annual reports on R2P since 2009, and the 2014 “Framework of Analysis for Atrocity Crimes”, that emphasise state institutional capacity and the identification of atrocity-risk indicators. Through a case-study of Pakistan, this article problematizes the relationship between internal security and the UN agenda on atrocity prevention to evaluate the viability of promoting atrocity prevention as currently conceived by the Office of the UNSG in high-risk contexts. It argues that an atrocity prevention agenda informed by a responsive regulation framework would be more effective in taking into account the relational dynamics of atrocity crimes. This includes accounting for the interaction between the micro-dynamics of political violence with macro-dynamics created by lengthy historical conflicts and strategic repertoires.

  14. Devices and dressings to secure peripheral venous catheters to prevent complications.

    Science.gov (United States)

    Marsh, Nicole; Webster, Joan; Mihala, Gabor; Rickard, Claire M

    2015-06-12

    A peripheral venous catheter (PVC) is typically used for short-term delivery of intravascular fluids and medications. It is an essential element of modern medicine and the most frequent invasive procedure performed in hospitals. However, PVCs often fail before intravenous treatment is completed: this can occur because the device is not adequately attached to the skin, allowing the PVC to fall out, leading to complications such as phlebitis (irritation or inflammation to the vein wall), infiltration (fluid leaking into surrounding tissues) or occlusion (blockage). An inadequately secured PVC also increases the risk of catheter-related bloodstream infection (CRBSI), as the pistoning action (moving back and forth in the vein) of the catheter can allow migration of organisms along the catheter and into the bloodstream. Despite the many dressings and securement devices available, the impact of different securement techniques for increasing PVC dwell time is still unclear; there is a need to provide guidance for clinicians by reviewing current studies systematically. To assess the effects of PVC dressings and securement devices on the incidence of PVC failure. We searched the following electronic databases to identify reports of relevant randomised controlled trials (RCTs): the Cochrane Wounds Group Register (searched 08 April 2015): The Cochrane Central Register of Controlled Trials (CENTRAL; 2015, Issue 3), Ovid MEDLINE (1946 to March 7 2015); Ovid MEDLINE (In-Process & Other Non-Indexed Citations, March 7 2015); Ovid EMBASE (1974 to March 7 2015); and EBSCO CINAHL (1982 to March 8 2015). RCTs or cluster RCTs comparing different dressings or securement devices for the stabilisation of PVCs. Cross-over trials were ineligible for inclusion, unless data for the first treatment period could be obtained. Two review authors independently selected studies, assessed trial quality and extracted data. We contacted study authors for missing information. We used standard

  15. PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION

    Directory of Open Access Journals (Sweden)

    R. Poorvadevi

    2017-01-01

    Full Text Available Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.

  16. Building Company Health Promotion Capacity: A Unique Collaboration Between Cargill and the Centers for Disease Control and Prevention

    OpenAIRE

    Lang, Jason E.; Hersey, James C.; Lynch, Christina M.; Isenberg, Karen L.; Majestic, Elizabeth

    2009-01-01

    Background The US Centers for Disease Control and Prevention (CDC) helps protect the health and safety of all people. The workplace can be used to reach millions of workers and their families with programs, policies, and benefits that promote health. We describe a CDC-led project to build Cargill's workplace health promotion capacity and identify the importance of a company liaison in the public-private relationship. Context The project goals were to engage diverse Cargill personnel, conduct ...

  17. Pollution prevention opportunity assessment for building 878, manufacturing science and technology, organization 14100.

    Energy Technology Data Exchange (ETDEWEB)

    Klossner, Kristin Ann

    2004-05-01

    This report describes the methodology, analysis and conclusions of a preliminary assessment carried out for activities and operations at Sandia National Laboratories Building 878, Manufacturing Science and Technology, Organization 14100. The goal of this assessment is to evaluate processes being carried out within the building to determine ways to reduce waste generation and resource use. The ultimate purpose of this assessment is to analyze and prioritize processes within Building 878 for more in-depth assessments and to identify projects that can be implemented immediately.

  18. Building company health promotion capacity: a unique collaboration between Cargill and the Centers for Disease Control and Prevention.

    Science.gov (United States)

    Lang, Jason E; Hersey, James C; Isenberg, Karen L; Lynch, Christina M; Majestic, Elizabeth

    2009-04-01

    The US Centers for Disease Control and Prevention (CDC) helps protect the health and safety of all people. The workplace can be used to reach millions of workers and their families with programs, policies, and benefits that promote health. We describe a CDC-led project to build Cargill's workplace health promotion capacity and identify the importance of a company liaison in the public-private relationship. The project goals were to engage diverse Cargill personnel, conduct a workplace health assessment, aid in the development of a workplace health program action plan, and develop Cargill's internal capacity using knowledge and skill-building. CDC partnered with Cargill on a workplace health promotion project to build Cargill's capacity. A multicomponent assessment was conducted to determine priority employee health issues, stakeholder meetings were held to engage and educate Cargill management and employees, and technical assistance was provided regularly between CDC and Cargill. Identifying a company liaison to work with an external assessment team is critical to building capacity for a successful workplace health project. This relationship creates an understanding of company culture and operations, facilitates access to key stakeholders and data, and provides opportunities to enhance capacity and sustainability. Employers undertaking workplace health promotion projects should identify a senior-level person to serve as the company health leader or liaison and who can devote the time necessary to build trusting relationships with partners to ensure project success. This person is valuable in facilitating communications, data collection, logistical support, troubleshooting, and influencing employer workplace health practices.

  19. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    Energy Technology Data Exchange (ETDEWEB)

    Guerin, Emmanuel; Spencer, Thomas

    2011-10-11

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  20. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    International Nuclear Information System (INIS)

    Guerin, Emmanuel; Spencer, Thomas

    2011-01-01

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  1. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  2. Building little safe and civilized communities: community crime prevention with Chinese characteristics?

    Science.gov (United States)

    Zhong, Lena Y; Broadhurst, Roderic G

    2007-02-01

    This article describes a community crime prevention program in China, set against a background of rapid economic development, large internal population migration, and increasing crime rates. Traditional social control in China has been transformed to adapt to the new reform era, yet some mechanisms remain intact. Crime prevention measures and strategies resemble those adopted in the West; however, the differences, constituting the so-called Chinese characteristics with community crime prevention are significant.

  3. Security of material: Preventing criminal activities involving nuclear and other radioactive materials

    International Nuclear Information System (INIS)

    Nilsson, A.

    2001-01-01

    The report emphasizes the need for national regulatory authorities to include in the regulatory systems, measures to control and protect nuclear materials from being used in illegal activities, as well as aspects of relevance for detecting and responding to illegal activities involving nuclear and other radioactive materials. The report will give an overview of the international treaties and agreements that underpin the establishment of a regulatory structure necessary for States to meet their non-proliferation policy and undertakings. Ongoing work to strengthen the protection of nuclear material and to detect and respond to illegal activities involving nuclear and other radioactive material will be included. The focus of the paper is on the need for standards and national regulation in the nuclear security area. (author)

  4. TanZamBo Capacity Building for HIV Prevention Research Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... for HIV/AIDS prevention trials (Tropical Diseases Research Centre, Ndola, Zambia) and two institutions with advanced facilities for HIV/AIDS prevention research and clinical trials (McGill University, Montreal, and Harvard University School of Public Health, Boston). Team members will use their comparative advantages in ...

  5. Building and Maintaining an Effective Campus-Wide Coalition for Suicide Prevention

    Science.gov (United States)

    Kaslow, Nadine J.; Garcia-Williams, Amanda; Moffitt, Lauren; McLeod, Mark; Zesiger, Heather; Ammirati, Rachel; Berg, John P.; McIntosh, Belinda J.

    2012-01-01

    Preventing suicide is a commonly shared priority among college administrators, faculty, staff, students, and family members. Coalitions are popular health promotion mechanisms for solving community-wide problems and are valuable in campus-wide suicide prevention efforts. This article provides an example of an effective suicide prevention…

  6. Building Capability from the Technical Revolution That Has Happened. Report of the Belfer Center Conference on National Security Transformation

    National Research Council Canada - National Science Library

    White, JOhn

    2004-01-01

    ... an adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  7. From 'what' to 'how' -- capacity building in health promotion for HIV/AIDS prevention in the Solomon Islands.

    Science.gov (United States)

    McPhail-Bell, Karen; MacLaren, David; Isihanua, Angela; MacLaren, Michelle

    2007-09-01

    This paper describes a capacity building process undertaken within the HIV/AIDS prevention project of the Adventist Development and Relief Agency (ADRA) in the Solomon Islands. ADRA HIV/AIDS has recently reoriented its project structure, moving beyond its awareness raising approach to incorporate health promotion frameworks, theories, strategies and assumptions. These have been used to inform project practice in project planning, delivery and evaluation. This paper shares what has worked and not worked in the capacity building process, including a project evaluation of the initial HIV/AIDS awareness raising project and the application of a number of capacity building strategies, including utilising a volunteer Australian Youth Ambassador for Development (AYAD) funded by the Australian Agency for International Development (AusAID). Existing and new projects are outlined. The underlying theme is that any capacity building exercise must include structural support (e.g. management, national frameworks) to ensure the incorporation of new initiatives and approaches. With time this enables ownership by counterparts and external partnerships to develop. The presence of an AYAD volunteer has been an effective strategy to achieve this. Reflections from the evaluators, the AYAD volunteer and the HIV/AIDS team are included.

  8. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  9. Proposal for an IT Security Standard for Preventing Tax Fraud in Cash Registers

    Science.gov (United States)

    Neuhaus, Mathias; Wolff, Jörg; Zisky, Norbert

    This paper describes a technology solution for preventing tax fraud in electronic cash registers (ECR) and point of sale (POS) systems. The solution is based on electronic signatures, and as a result, any alterations to protected data will be detected. The signed transaction data can be stored on various electronic memory devices. Technical provisions enable the estimation of transaction volumes, even after tampering or loss of data. In this way the solution presented here differs significantly from other fiscal solutions where a pattern of approvals for ECRs and permanent technical supervision of the market is necessary. This paper is focused on the architecture, the protocols and the usability of the proposed system.

  10. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union.

    Science.gov (United States)

    Bartholomew, James C; Pearson, Andrew D; Stenseth, Nils Chr; LeDuc, James W; Hirschberg, David L; Colwell, Rita R

    2015-01-01

    Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world's great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to

  11. Iron-regulatory proteins secure iron availability in cardiomyocytes to prevent heart failure.

    Science.gov (United States)

    Haddad, Saba; Wang, Yong; Galy, Bruno; Korf-Klingebiel, Mortimer; Hirsch, Valentin; Baru, Abdul M; Rostami, Fatemeh; Reboll, Marc R; Heineke, Jörg; Flögel, Ulrich; Groos, Stephanie; Renner, André; Toischer, Karl; Zimmermann, Fabian; Engeli, Stefan; Jordan, Jens; Bauersachs, Johann; Hentze, Matthias W; Wollert, Kai C; Kempf, Tibor

    2017-02-01

    Iron deficiency (ID) is associated with adverse outcomes in heart failure (HF) but the underlying mechanisms are incompletely understood. Intracellular iron availability is secured by two mRNA-binding iron-regulatory proteins (IRPs), IRP1 and IRP2. We generated mice with a cardiomyocyte-targeted deletion of Irp1 and Irp2 to explore the functional implications of ID in the heart independent of systemic ID and anaemia. Iron content in cardiomyocytes was reduced in Irp-targeted mice. The animals were not anaemic and did not show a phenotype under baseline conditions. Irp-targeted mice, however, were unable to increase left ventricular (LV) systolic function in response to an acute dobutamine challenge. After myocardial infarction, Irp-targeted mice developed more severe LV dysfunction with increased HF mortality. Mechanistically, the activity of the iron-sulphur cluster-containing complex I of the mitochondrial electron transport chain was reduced in left ventricles from Irp-targeted mice. As demonstrated by extracellular flux analysis in vitro, mitochondrial respiration was preserved at baseline but failed to increase in response to dobutamine in Irp-targeted cardiomyocytes. As shown by 31P-magnetic resonance spectroscopy in vivo, LV phosphocreatine/ATP ratio declined during dobutamine stress in Irp-targeted mice but remained stable in control mice. Intravenous injection of ferric carboxymaltose replenished cardiac iron stores, restored mitochondrial respiratory capacity and inotropic reserve, and attenuated adverse remodelling after myocardial infarction in Irp-targeted mice but not in control mice. As shown by electrophoretic mobility shift assays, IRP activity was significantly reduced in LV tissue samples from patients with advanced HF and reduced LV tissue iron content. ID in cardiomyocytes impairs mitochondrial respiration and adaptation to acute and chronic increases in workload. Iron supplementation restores cardiac energy reserve and function in iron

  12. [Research of preferences and security management of tourists in Poyang Lake based on schistosomiasis prevention].

    Science.gov (United States)

    Feng, Shu-hua

    2015-04-01

    To discuss the prevention of schistosomiasis in tourism of lake region. The seasonal distribution of tourism activities and spatial distribution of scenic spots, as well as the coupling between space and temporal of Oncomelania snail distribution and the transmission time of schistosomiasis in Poyang Lake region were analyzed. The travel preference of schistosomiasis susceptible population was surveyed by questionnaires and interviews. There were couplings of space and temporal between tourism activities in Poyang Lake region and transmission time of schistosomiasis as well as space distribution of snails, respectively. The most popular tourism items were Shuishangrenjia (overwater household) and fishing folk culture with property of participation and experience. The suggestion is to establish health records of tourists, carry out health education of schistosomiasis, and enhance the management of tourism and activities of tourists.

  13. Strengthening the European Union Climate and Energy Package. To build a low carbon, competitive and energy secure European Union

    Energy Technology Data Exchange (ETDEWEB)

    Guerin, E.; Spencer, Th.

    2011-07-01

    As the EU's climate and energy goals defined in its Climate and Energy Package (CEP) are to protect the climate, to protect EU economic competitiveness, and to protect EU energy security, the authors first define these notions (time consistency, competitiveness, energy security) and stress the importance of strengthening the CEP, notably by fostering low carbon technology investment and low carbon products and services innovation. They discuss several policy recommendations for the development of a low carbon, competitive and energy secure EU. These recommendations are notably based on the strengthening of current instruments and on the implementation of new tools to reach the 20% energy efficiency target, on an increase stringency and predictability of the EU ETS, and on the use of direct public financial support to facilitate the transition towards a EU low carbon economy

  14. Strengthening the European Union Climate and Energy Package. To build a low carbon, competitive and energy secure European Union

    International Nuclear Information System (INIS)

    Guerin, E.; Spencer, Th.

    2011-01-01

    As the EU's climate and energy goals defined in its Climate and Energy Package (CEP) are to protect the climate, to protect EU economic competitiveness, and to protect EU energy security, the authors first define these notions (time consistency, competitiveness, energy security) and stress the importance of strengthening the CEP, notably by fostering low carbon technology investment and low carbon products and services innovation. They discuss several policy recommendations for the development of a low carbon, competitive and energy secure EU. These recommendations are notably based on the strengthening of current instruments and on the implementation of new tools to reach the 20% energy efficiency target, on an increase stringency and predictability of the EU ETS, and on the use of direct public financial support to facilitate the transition towards a EU low carbon economy

  15. Building a peaceful society: origins, prevention, and reconciliation after genocide and other group violence.

    Science.gov (United States)

    Staub, Ervin

    2013-10-01

    The 20th century was a century of genocide and other great violence between groups within societies. Already at the beginning of the 21st century, there have been mass killings, civil wars, violent conflict, and terrorism. This article summarizes influences that tend to lead to intense group violence. It then considers prevention, stressing early prevention--and reconciliation as an aspect of prevention--and focusing on central principles and practices. The principles include developing positive orientations to previously devalued groups; healing from past victimization and promoting altruism born of suffering; moderating respect for authority; creating constructive ideologies; promoting understanding of the origins of violence, its impact, and avenues to prevention; promoting truth, justice, and a shared history; and raising inclusively caring, morally courageous children. Practices related to all of these are also discussed. The article stresses the role of progressive change, that is, of psychological, behavioral, and social evolution, in both extreme violence and positive relations between groups; the role of passive bystanders in the unfolding of violence; and the role of active bystandership in the prevention of violence, in the promotion of reconciliation, and in the development of harmonious societies. It emphasizes psychological processes but notes the importance of creating societal institutions. The author cites findings from both laboratory research and case studies, reviews interventions and their evaluation in Rwanda, and points to the need for further research. PsycINFO Database Record (c) 2013 APA, all rights reserved

  16. Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity

    DEFF Research Database (Denmark)

    Asharov, Gilad; Orlandi, Claudio

    2012-01-01

    We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...... constant probability ε. The idea behind the model is that the fear of being caught cheating will be enough of a deterrent to prevent any cheating attempt. However, in the basic covert security model, the honest parties are not able to persuade any third party (say, a judge) that a cheating occurred. We...... propose (and formally define) an extension of the model where, when an honest party detects cheating, it also receives a certificate that can be published and used to persuade other parties, without revealing any information about the honest party’s input. In addition, malicious parties cannot create fake...

  17. Strategies to Build Readiness in Community Mobilization Efforts for Implementation in a Multi-Year Teen Pregnancy Prevention Initiative.

    Science.gov (United States)

    Bhuiya, Nazmim; House, L Duane; Desmarais, Jeffrey; Fletcher, Erica; Conlin, Maeve; Perez-McAdoo, Sarah; Waggett, Jessica; Tendulkar, Shalini A

    2017-03-01

    This paper describes an assessment of community readiness to implement a community-wide teen pregnancy prevention initiative, Youth First, and presents strategies used to enhance this readiness as informed by the assessment. Twenty-five community stakeholder interviews were conducted to assess four domains of readiness: (1) attitudes, perception, and knowledge of teen pregnancy; (2) perceived level of readiness; (3) resources, existing and current efforts; and (4) leadership. Interview transcripts were coded and analyzed to identify key themes. Stakeholders acknowledged teen pregnancy as an issue but lacked contextual information. They also perceived the community as ready to address the issue and recognized some organizations already championing efforts. However, many key players were not involved, and ongoing data collection to assess teen pregnancy and prevention efforts was limited. Though many stakeholders were ready to engage in teen pregnancy prevention efforts, they required additional information and training to appropriately address the issue. In response to the assessment findings, several strategies were applied to address readiness and build Youth First partners' capacity to implement the community-wide initiative. Thus, to successfully implement community-wide prevention efforts, it is valuable to assess the level of community readiness to address health issues. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. Alzheimer's Prevention Education: If We Build It, Will They Come? www.AlzU.org.

    Science.gov (United States)

    Isaacson, R S; Haynes, N; Seifan, A; Larsen, D; Christiansen, S; Berger, J C; Safdieh, J E; Lunde, A M; Luo, A; Kramps, M; McInnis, M; Ochner, C N

    2014-01-01

    Internet-based educational interventions may be useful for impacting knowledge and behavioral change. However, in AD prevention, little data exists about which educational tools work best in terms of learning and interest in participating in clinical trials. Primary: Assess effectiveness of interactive webinars vs. written blog-posts on AD prevention learning. Secondary: Evaluate the effect of AD prevention education on interest in participating in clinical trials; Assess usability of, and user perceptions about, an online AD education research platform; Classify target populations (demographics, learning needs, interests). Observational. Online. Men/Women, aged 25+, recruited via facebook.com. Alzheimer's Universe (www.AlzU.org) education research platform. Pre/post-test performance, self-reported Likert-scale ratings, completion rates. Over two-weeks, 4268 visits were generated. 503 signed-up for a user account (11.8% join rate), 196 participated in the lessons (39.0%) and 100 completed all beta-testing steps (19.9%). Users randomized to webinar instruction about AD prevention and the stages of AD demonstrated significant increases (p=0.01) in pre vs. post-testing scores compared to blog-post intervention. Upon joining, 42% were interested in participating in a clinical trial in AD prevention. After completing all beta-test activities, interest increased to 86%. Users were primarily women and the largest category was children of AD patients. 66.3% joined to learn more about AD prevention, 65.3% to learn more about AD treatment. Webinar-based education led to significant improvements in learning about AD prevention and the stages of AD. AlzU.org participation more than doubled interest in AD prevention clinical trial participation. Subjects were quickly and cost-effectively recruited, and highly satisfied with the AD education research platform. Based on these data, we will further refine AlzU.org prior to public launch and aim to study the effectiveness of 25

  19. International conference on security of material. Measures to prevent, intercept and respond to illicit uses of nuclear material and radioactive sources. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-10-01

    The papers cover the subjects relating to the trafficking of highly enriched nuclear materials, less radioactive, radioactive materials, radiations sources, prevention of crime, capabilities of preventing smuggling, radiation detection devices that are or should be applied on borders. Different aspects of physical protection, security and safety of nuclear materials in a number of countries are discussed. A number of papers are devoted to detectors, and measuring methods

  20. PREVENTIVE MEASURES - EXCEPTION TO THE PRINCIPLE OF THE RIGHT TO LIBERTY AND SECURITY

    Directory of Open Access Journals (Sweden)

    Marin-Alin DĂNILĂ

    2016-05-01

    Full Text Available Considering the specific obligations arising from the exercise of criminal action and civil action in criminal proceedings and taking into account the need to ensure a better conduct of activities that are undertaken in solving criminal cases, it sometimes appears necessary, taking certain procedural measures. Procedural measures were defined [1] as institutions available for criminal procedural law and criminal judicial bodies consisting of privations or certain constraints, real or personal, of the conditions and circumstances under which the criminal proceedings are being realized. By the function pursued by the legislature, these measures work as a legal means of prevention or suppression of circumstances or situations likely to jeopardize the effectiveness of the criminal proceedings through the obstacles, difficulties and confusion which they can produce [2]. Procedural measures arise as opportunities, but not being specific to any criminal case, judicial bodies take measures according to the specific circumstances of each criminal case. From this derives the adjacent character of the criminal procedural measures to the main job [3].

  1. [Preventive effects of sound insulation windows on the indoor noise levels in a street residential building in Beijing].

    Science.gov (United States)

    Guo, Bin; Huang, Jing; Guo, Xin-biao

    2015-06-18

    To evaluate the preventive effects of sound insulation windows on traffic noise. Indoor noise levels of the residential rooms (on both the North 4th ring road side and the campus side) with closed sound insulation windows were measured using the sound level meter, and comparisons with the simultaneously measured outdoor noise levels were made. In addition, differences of indoor noise levels between rooms with closed sound insulation windows and open sound insulation windows were also compared. The average outdoor noise levels of the North 4th ring road was higher than 70 dB(A), which exceeded the limitation stated in the "Environmental Quality Standard for Noise" (GB 3096-2008) in our country. However, with the sound insulation windows closed, the indoor noise levels reduced significantly to the level under 35 dB(A) (Pwindows had significant influence on the indoor noise levels (Pwindow, when the sound insulation windows were closed, the indoor noise levels reduced 18.8 dB(A) and 8.3 dB(A) in residential rooms facing North 4th ring road side and campus side, respectively. The results indicated that installation of insulation windows had significant noise reduction effects on street residential buildings especially on the rooms facing major traffic roads. Installation of the sound insulation windows has significant preventive effects on indoor noise in the street residential building.

  2. Sustainable Development--Education, Business and Management--Architecture and Building Construction--Agriculture and Food Security

    Science.gov (United States)

    Ghenai, Chaouki, Ed.

    2012-01-01

    Securing the future of the human race will require an improved understanding of the environment as well as of technological solutions, mindsets and behaviors in line with modes of development that the ecosphere of our planet can support. Some experts see the only solution in a global deflation of the currently unsustainable exploitation of…

  3. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  4. The Enough Abuse Campaign: Building the Movement to Prevent Child Sexual Abuse in Massachusetts

    Science.gov (United States)

    Schober, Daniel J.; Fawcett, Stephen B.; Bernier, Jetta

    2012-01-01

    This case study describes the Enough Abuse Campaign, a multidisciplinary, statewide effort to prevent child sexual abuse in Massachusetts. The study uses the Institute of Medicine's Framework for Collaborative Community Action on Health to provide a systematic description of the campaign's process of implementation, which includes: (a) developing…

  5. Building a Peaceful Society: Origins, Prevention, and Reconciliation after Genocide and Other Group Violence

    Science.gov (United States)

    Staub, Ervin

    2013-01-01

    The 20th century was a century of genocide and other great violence between groups within societies. Already at the beginning of the 21st century, there have been mass killings, civil wars, violent conflict, and terrorism. This article summarizes influences that tend to lead to intense group violence. It then considers prevention, stressing early…

  6. Developing the Political Citizen: How Teachers Are Navigating the Statutory Demands of the Counter-Terrorism and Security Act 205 and the Prevent Duty

    Science.gov (United States)

    Bryan, Hazel

    2017-01-01

    The "Revised Prevent Duty Guidance for England and Wales" presents statutory guidance under section 29 of the Counter-Terrorism and Security Act 2015. This guidance states that "Schools should be safe spaces in which children and young people can understand and discuss sensitive topics, including terrorism and the extremist ideas…

  7. An Approach to Building Capacity for Nuclear Security and Safeguards in Thailand and the Southeast Asian Region

    International Nuclear Information System (INIS)

    Pengvanich, P.; Chanyotha, S.; Nilsuwankosit, S.

    2016-01-01

    Full text: A master’s degree programme in nuclear security and safeguards has been developed and offered at Chulalongkorn University for the first time in 2013 in order to develop necessary human resources in the fields of nuclear security and safeguards who can continue to work, conduct research, or serve as educators in these fields in Thailand and the Southeast Asian region. The first group of 20 students joined the programme in 2013 and recently graduated. The programme was one-of-its-kind, as there have not been many similar specialized programmes in nuclear security and safeguards in the past. In this paper, challenges and lessons learned throughout the programme are reported. Experience from the pilot programme will be used to improve the next round of the programme which is expected to start in 2017. With this program, more nuclear knowledge can be shared and maintained among the Association of South East Asian Nations (ASEAN) countries to ensure the peaceful utilization of nuclear technology in the region. (author

  8. Building Prevention to Protect: The Inter-American Human Rights System

    Directory of Open Access Journals (Sweden)

    Carlos Portales

    2017-03-01

    Full Text Available The article explores the way that the Inter-American human rights system assumes the “responsibility to protect” in the context of serious violations of human rights that can be characterized as war crimes, crimes against humanity, genocide, and ethnic cleansing. The essay describes  how the Inter-American Commission on Human Rights and the Inter-American Court of Human Rights have responded to such situations by using the ample powers granted to them by the OAS member states. The authors consider that these organs have been some of the most effective tools with which this region has confronted such situations by seeking system has contributed to building democratic regimes in the majority of the countries of the hemisphere. This has been crucial to avoiding serious violations of human rights such as those mentioned above, which would have required urgent international intervention to overcome.

  9. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report

    International Nuclear Information System (INIS)

    Tourneur, J.C.

    2009-01-01

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  10. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  11. Building communication strategy on health prevention through the human-centered design

    Directory of Open Access Journals (Sweden)

    Karine de Mello Freire

    2016-03-01

    Full Text Available It has been identified a latent need for developing efficient communication strategies for prevention of diseases and also, design as a potential agent to create communications artifacts that are able to promote self-care. In order to analyze a design process that develops this kind of artifact, an action research in IAPI Health Center in Porto Alegre was done. The action’s goal was to design a strategy to promote self-care to prevent cervical cancer. The process was conducted from the human centered design approach - HCD, which seeks to create solutions desirable for people and feasible for organizations from three main phases: a Hear, in which inspirations are originated from stories collected from people; b Create, which aims to translate these knowledge into prototypes; and, c Deliver, where the prototypes are tested and developed with users. Communication strategies were supported by design studies about visual-verbal rhetoric. As results, this design approach has shown adequate to create communication strategies targeted at self-care behaviors, aiming to empower users to change their behavior.

  12. Health promotion for adolescent childhood leukemia survivors: building on prevention science and ehealth.

    Science.gov (United States)

    Elliot, Diane L; Lindemulder, Susan J; Goldberg, Linn; Stadler, Diane D; Smith, Jennifer

    2013-06-01

    Teenage survivors of childhood acute lymphoblastic leukemia (ALL) have increased morbidity likely due to their prior multicomponent treatment. Habits established in adolescence can impact individuals' subsequent adult behaviors. Accordingly, healthy lifestyles, avoiding harmful actions, and appropriate disease surveillance are of heightened importance among teenage survivors. We review the findings from prevention science and their relevance to heath promotion. The capabilities and current uses of eHealth components including e-learning, serious video games, exergaming, behavior tracking, individual messaging, and social networking are briefly presented. The health promotion needs of adolescent survivors are aligned with those eHealth aspects to propose a new paradigm to enhance the wellbeing of adolescent ALL survivors. Copyright © 2012 Wiley Periodicals, Inc.

  13. Cancer prevention among rural youth: building a "bridge" to better health with genealogy.

    Science.gov (United States)

    Harmon, A Lisa; Westerberg, Alice L; Bond, Dale S; Hoy, Kristyn N; Fries, Elizabeth A; Danish, Steven J

    2005-01-01

    The Bridge to Better Health (BRIDGE) project is a program that focuses on providing rural high school youth with motivation, knowledge, and skills essential to cancer prevention. In this pilot intervention, we used instruction in personal health genealogy as a means of increasing awareness and knowledge of health risk and motivation to change several screening and cancer-related behaviors. We administered a Bridge to Better Health survey to 173 ninth- and 10th-grade students from a rural Southeastern Virginia high school before and after delivery of the BRIDGE pilot intervention. Significant preintervention to postintervention changes were observed for general genealogy knowledge, personal health genealogy, self-efficacy, and intention to practice self-examinations (breast, testicular, and skin) and eating a high-fiber and low-fat diet. These project results demonstrate the importance of theory-driven interventions for increasing cancer knowledge and changing cancer-related dietary and screening behaviors.

  14. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security

  15. Enhancing global capacity in the surveillance, prevention, and control of chronic diseases: seven themes to consider and build upon.

    Science.gov (United States)

    Choi, B C K; McQueen, D V; Puska, P; Douglas, K A; Ackland, M; Campostrini, S; Barceló, A; Stachenko, S; Mokdad, A H; Granero, R; Corber, S J; Valleron, A-J; Skinner, H A; Potemkina, R; Lindner, M C; Zakus, D; de Salazar, L M; Pak, A W P; Ansari, Z; Zevallos, J C; Gonzalez, M; Flahault, A; Torres, R E

    2008-05-01

    Chronic diseases are now a major health problem in developing countries as well as in the developed world. Although chronic diseases cannot be communicated from person to person, their risk factors (for example, smoking, inactivity, dietary habits) are readily transferred around the world. With increasing human progress and technological advance, the pandemic of chronic diseases will become an even bigger threat to global health. Based on our experiences and publications as well as review of the literature, we contribute ideas and working examples that might help enhance global capacity in the surveillance of chronic diseases and their prevention and control. Innovative ideas and solutions were actively sought. Ideas and working examples to help enhance global capacity were grouped under seven themes, concisely summarised by the acronym "SCIENCE": Strategy, Collaboration, Information, Education, Novelty, Communication and Evaluation. Building a basis for action using the seven themes articulated, especially by incorporating innovative ideas, we presented here, can help enhance global capacity in chronic disease surveillance, prevention and control. Informed initiatives can help achieve the new World Health Organization global goal of reducing chronic disease death rates by 2% annually, generate new ideas for effective interventions and ultimately bring global chronic diseases under greater control.

  16. Aviation and Health: A Key Nexus for the US Air Force’s Regional Security-Building Efforts

    Science.gov (United States)

    2015-06-01

    would advance through a network of air- strips near medical facilities including both simple dispensaries and hospitals to connect patients...preventive, community- based health care with a focus on public health research.18 AMREF continues to fly surgeons to rural hospitals where they not only...flyers support humanitarian assistance and domestic flying operations, including tourism , to bolster the economy via scheduled and chartered flights

  17. Some Opinions on the Relation between Security Economy and Economic Security

    Directory of Open Access Journals (Sweden)

    VALERIU IOAN-FRANC

    2010-12-01

    Full Text Available The paper basically deals with two important concepts: security economy and economic security. The former is a relatively new term implying the way of building an entire system of protection by measures and activities to prevent deliberate actions affecting the quality of life and goods, while the latter is a term understood only post factum, when the threats to the economic security of a state have had effect. Therefore, a macroeconomic equilibrium at the world level should be correlated with internal political, economic and social equilibrium in order to ensure long-term sustainable development of the economy.

  18. Prevention

    Science.gov (United States)

    ... Error processing SSI file About Heart Disease & Stroke Prevention Heart disease and stroke are an epidemic in ... secondhand smoke. Barriers to Effective Heart Disease & Stroke Prevention Many people with key risk factors for heart ...

  19. International workshop on transparency technology for nonproliferation cooperation in the Asia Pacific. Applications of remote monitoring and secure communications for regional confidence building

    International Nuclear Information System (INIS)

    Betsill, J. David; Hashimoto, Yu

    2009-08-01

    The Japan Atomic Energy Agency (JAEA) sponsored an international workshop 20-22 February 2008 on 'Transparency Technology for Nonproliferation Cooperation in the Asia Pacific - Applications of Remote Monitoring and Secure Communications for Regional Confidence Building.' The Workshop focused on identifying appropriate roles and functions for Transparency in addressing nonproliferation concerns associated with the use of nuclear energy, particularly in the East Asia region. Participants from several East Asia countries included representatives from nuclear energy research institutions, Ministries, facility operators, and non-governmental organizations. Regional participation from countries currently developing their nuclear energy infrastructure was also encouraged. Several promising students from the University of Tokyo and the Tokyo Institute of Technology, representing the next generation of nuclear energy experts, also participated in the meeting and added significant value and fresh viewpoints. The participants agreed that transparency has many roles and definitions, and that its usefulness ranges for verification and compliance with the Nonproliferation Treaty (NPT) to building trust and confidence in the activities of the state and other regional nuclear energy stakeholders. In addition, they identified a need for further education among the professional community, public, operators, and regulators as a key factor in transparency effectiveness. Also, the education and cultivation of the next generation of nuclear energy experts was identified as crucial to the long-term success and acceptance of nuclear energy development. And finally, that the development, selection, and implementation of technology that is appropriate to the goals and participants of a transparency effort are unique to each situation and are key to the successful acceptance of cooperative transparency and regional confidence building. At the conclusion of the Workshop it was importantly

  20. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  1. Inter-organisational knowledge transfer: building and sustaining the sources of innovation in nuclear safety and security

    International Nuclear Information System (INIS)

    Staude, Fabio; Ramirez, Matias

    2013-01-01

    The current complexity of innovation processes has led to an understanding that the models of innovation have changed from linear model to a model characterised by multiple interactions and complex networks. Within this more multifaceted environment, has emerged a new set of actors, generally termed as intermediaries, performing a variety of tasks in the innovation process. The innovation literature has recognised various important supporting activities performed by intermediaries, by linking and facilitating the movement of information and knowledge between actors within an innovation system, in order to fill information gaps. Complementary, we make the assumption that the intermediary can assume a more central role in the innovation process, performing activities beyond to filling information gaps, since they intervene to create, prioritise, and articulate meaning to practices. Under this argument, this paper explores how intermediaries work in making innovation happen in the Brazilian nuclear safety and security area, demonstrating the influence of intermediary organisations in improving nuclear regulatory activities. We make sense of these processes by analyzing intermediary roles in the recent regulatory activities improvements, specifically those related to the practices involving radiation sources in medicine. Thus, through an empirical case study, this paper examines the issue of intermediation in a wide sense, including strategic activities preformed by intermediaries, associated with accessing, diffusing, coordinating and enabling knowledge activities. (author)

  2. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    Science.gov (United States)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  3. State Capitol Buildings

    Data.gov (United States)

    Department of Homeland Security — This shapefile will display the locations of the fifty state capitol buildings as well as the territorial capitol buildings for the US Virgin Islands, Guam, Northern...

  4. A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack

    OpenAIRE

    Masudur Rahman; Wah Man Cheung

    2014-01-01

    Cloud computing has been considered as one of the crucial and emerging networking technology, which has been changed the architecture of computing in last few years. Despite the security concerns of protecting data or providing continuous service over cloud, many organisations are considering different types cloud services as potential solution for their business. We are researching on cloud computing security issues and potential cost effective solution for cloud service providers. In our fi...

  5. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union

    Directory of Open Access Journals (Sweden)

    James C Bartholomew

    2015-11-01

    Full Text Available Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world scientific capacity has not kept pace with the need, and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to solve the issues. The Republics Georgia, formerly part of the Soviet Union provides a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world’s great epidemics began. The U.S. Cooperative Threat Reduction (CTR Program together with the Georgian government, have worked diligently to improve the capabilities in this region to guard against the potential future risk from especially dangerous pathogens. This effort culminated in the construction of a modern containment laboratory, the Richard G. Lugar Center for Public Health Research in Tbilisi to house both especially dangerous pathogens as well as the research to be conducted on these agents. The need now is to utilize and sustain the investment made by CTR by establishing strong public and animal health science programs tailored to the needs of the region and the goals for which this investment was made. Here we provide the analysis and recommendations of an international panel of expert scientists to provide advice to the stakeholders on the scientific path for the future. The emphasis is on an implementation strategy for decision makers and

  6. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.

    Science.gov (United States)

    Blanke, Sandra J; McGrady, Elizabeth

    2016-07-01

    Health care stakeholders are concerned about the growing risk of protecting sensitive patient health information from breaches. The Federal Emergency Management Agency (FEMA) has identified cyber attacks as an emerging concern, and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) have increased security requirements and are enforcing compliance through stiff financial penalties. The purpose of this study is to describe health care breaches of protected information, analyze the hazards and vulnerabilities of reported breach cases, and prescribe best practices of managing risk through security controls and countermeasures. Prescriptive findings were used to construct a checklist tool to assess and monitor common risks. This research uses a case methodology to describe specific examples of the 3 major types of cyber breach hazards: portable device, insider, and physical breaches. We utilize a risk management framework to prescribe preventative actions that organizations can take to assess, analyze, and mitigate these risks. The health care sector has the largest number of reported breaches, with 3 major types: portable device, insider, and physical breaches. Analysis of actual cases indicates security gaps requiring prescriptive fixes based on "best practices." Our research culminates in a 25-item checklist that organizations can use to assess existing practices and identify security gaps requiring improvement. © 2016 American Society for Healthcare Risk Management of the American Hospital Association.

  7. The risk of imported malaria in security forces personnel returning from overseas missions in the context of prevention of re-introduction of malaria to Sri Lanka.

    Science.gov (United States)

    Fernando, Sumadhya Deepika; Dharmawardana, Priyani; Semege, Saveen; Epasinghe, Geetha; Senanayake, Niroshana; Rodrigo, Chaturaka; Premaratne, Risintha

    2016-03-08

    Sri Lanka is a malaria-free country. However it remains surrounded by countries with endemic malaria transmission. Since the last indigenous case of malaria was reported in October 2012, only imported malaria cases have been diagnosed with 36 cases detected in 2015, which includes 17 cases each of Plasmodium vivax and Plasmodium falciparum and two cases of Plasmodium ovale. This study investigated the knowledge and practices regarding malaria chemoprophylaxis among all the Sri Lankan security forces personnel returning from peacekeeping missions in malaria endemic countries over a 7 month period. Adherence to other malaria prevention measures, occurrence of adverse events and incident cases of malaria were also recorded maintaining the anonymity of the respondents. Potential associations for non-compliance were studied. Interviews were carried out with 559 security forces personnel returning home from foreign deployments in malaria-endemic regions (males: 550, 98.4 %). The majority (553, 98.9 %) was well aware of the need for chemoprophylaxis during the overseas stay and its regular use as prescribed. The overall adherence to chemoprophylaxis was good with 78.7 % (440/559) reporting regular, as prescribed, use. Having better educational qualifications, being female, being prescribed mefloquine, having fever during deployment and belonging to a security force other than the army were significantly associated with poor compliance (p malaria chemoprophylaxis among Sri Lankan security forces personnel serving abroad was good, a fact that may have contributed to absence/extremely low incidence of malaria during deployment.

  8. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  9. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  10. Prevention

    Science.gov (United States)

    ... Contact Aging & Health A to Z Find a Geriatrics Healthcare Professional Medications & Older Adults Making Your Wishes ... Prevention Hearing Loss Heart Attack High Blood Pressure Nutrition Osteoporosis Shingles Skin Cancer Related News Quitting Smoking, ...

  11. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  12. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  13. Prevention

    DEFF Research Database (Denmark)

    Halken, S; Høst, A

    2001-01-01

    , breastfeeding should be encouraged for 4-6 months. In high-risk infants a documented extensively hydrolysed formula is recommended if exclusive breastfeeding is not possible for the first 4 months of life. There is no evidence for preventive dietary intervention neither during pregnancy nor lactation...... populations. These theories remain to be documented in proper, controlled and prospective studies. Breastfeeding and the late introduction of solid foods (>4 months) is associated with a reduced risk of food allergy, atopic dermatitis, and recurrent wheezing and asthma in early childhood. In all infants....... Preventive dietary restrictions after the age of 4-6 months are not scientifically documented....

  14. Remediating buildings damaged by dampness and mould for preventing or reducing respiratory tract symptoms, infections and asthma

    NARCIS (Netherlands)

    Sauni, Riitta; Uitti, Jukka; Jauhiainen, Merja; Kreiss, Kathleen; Sigsgaard, Torben; Verbeek, Jos H.

    2011-01-01

    Dampness and mould in buildings have been associated with adverse respiratory symptoms, asthma and respiratory infections of inhabitants. Moisture damage is a very common problem in private houses, workplaces and public buildings such as schools. To determine the effectiveness of remediating

  15. The Minimum Cost of a Nutritious Diet Study: Building an evidence-base for the prevention of undernutrition in Afghanistan

    International Nuclear Information System (INIS)

    Qarizada, Ahmad Nawid

    2014-01-01

    Full text: Background: In Afghanistan, mortality rates are amongst the highest in the world. Mean life expectancy is 62 years, U5MR is 97 deaths per 1,000 live births, and the MMR is 327 deaths per 100,000 live births while 33% of the population is food insecure. Undernutrition is alarmingly high in children under-five with global acute malnutrition rates of 8.7%, stunting 60.5% and underweight 37.7% , , and 72% are iodine and iron deficient. As part of their prevention efforts, WFP and the MOPH carried out a Cost of Diet study (CoD) in Afghanistan in late-2012. Cost of Diet Study The CoD assesses a household’s food and nutrition security based on economic constraints in accessing their nutrient requirements, especially for the most vulnerable, such as children U2 years. Objectives: 1. How important is access to nutritious food to overcome undernutrition in different areas of Afghanistan? 2. Is a nutritious diet available and affordable to the local populations? Methodology: The CoD tool used linear optimization to generate following output from market surveys and secondary household data: • A diet and the corresponding food baskets meet all nutritional requirements of a typical family, including a child U2 years, and its costs. Any other diet would be more expensive and/or would not meet their nutritional requirements. The tool calculated minimum cost of nutritious diet (MCNUT) in four livelihood zones (LHZ) of Afghanistan. Results: The MCNUT is the baseline nutritious diet. When compared to household income, it shows the number of households who cannot afford to meet their nutrient needs. The MCNUT calculates cheapest combination of food items and quantities to ensure all energy and nutrient requirements are met. It is theoretical and sometimes unrealistic. The Locally Adapted, Cost Optimised Diet (LACON), obtained using questionnaires and focus group discussions, provides a more realistic diet based on dietary preferences. Findings showed that approximately

  16. Regional scenario building as a tool to support vulnerability assessment of food & water security and livelihood conditions under varying natural resources managements

    Science.gov (United States)

    Reinhardt, Julia; Liersch, Stefan; Dickens, Chris; Kabaseke, Clovis; Mulugeta Lemenih, Kassaye; Sghaier, Mongi; Hattermann, Fred

    2013-04-01

    Participatory regional scenario building was carried out with stakeholders and local researchers in four meso-scale case studies (CS) in Africa. In all CS the improvement of food and / or water security and livelihood conditions was identified as the focal issue. A major concern was to analyze the impacts of different plausible future developments on these issues. The process of scenario development is of special importance as it helps to identify main drivers, critical uncertainties and patterns of change. Opportunities and constraints of actors and actions become clearer and reveal adaptation capacities. Effective strategies must be furthermore reasonable and accepted by local stakeholders to be implemented. Hence, developing scenarios and generating strategies need the integration of local knowledge. The testing of strategies shows how they play out in different scenarios and how robust they are. Reasons and patterns of social and natural vulnerability can so be shown. The scenario building exercise applied in this study is inspired by the approach from Peter Schwartz. It aims at determining critical uncertainties and to identify the most important driving forces for a specific focal issue which are likely to shape future developments of a region. The most important and uncertain drivers were analyzed and systematized with ranking exercises during meetings with local researchers and stakeholders. Cause-effect relationships were drawn in the form of concept maps either during the meetings or by researchers based on available information. Past observations and the scenario building outcomes were used to conduct a trend analysis. Cross-comparisons were made to find similarities and differences between CS in terms of main driving forces, patterns of change, opportunities and constraints. Driving forces and trends which aroused consistently over scenarios and CS were identified. First results indicate that livelihood conditions of people rely often directly on the

  17. Building the food secure city

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC

    Seen on a map, the four arterial roads that connect Dar es. Salaam's city centre to the urban fringe and the hinterland beyond resemble a giant spider's web. The vast majority of the city's inhabitants — seven out of every 10 — live in a warren of unplanned settlements that are scattered between the principal byways outside ...

  18. Strategic Prevention Framework State Incentive Grant Progress Report: Building a Sustainable Substance Abuse Prevention System, State of Hawai'i, 2006-2010

    Science.gov (United States)

    Yuan, S.; Lai, M.C.; Heusel, K.

    2011-01-01

    In 2006, the Hawai'i State Department of Health (DOH) received the Strategic Prevention Framework State Incentive Grant (SPF-SIG) from the Substance Abuse and Mental Health Services Administration (SAMHSA) to establish a comprehensive, coordinated, and sustainable substance abuse prevention infrastructure in Hawai'i. The SPF-SIG Project is funded…

  19. Risks and threats of tax state security and methods of their neutralization

    Directory of Open Access Journals (Sweden)

    Y.V. Lebedzevych

    2016-12-01

    Full Text Available The article substantiates the relevance of the study to ensure security of the state tax. Scientists studied different approaches to defining the essence of the concept of "security tax" on the key features that would satisfy the interests of all subjects of tax relations and the necessity of legal consolidation of this concept. Analyzed the economic, social and legal nature of the existence of the security tax, identified key indicators of fiscal security of Ukraine. To determine the effectiveness of the tax administration in the interests of the tax security highlights the main threats, tax security risks caused by external and internal factors, and propose measures for their elimination and prevent the possibility of their occurrence. The stages of tax risk management with effective building security tax, designed structurally-logic of the tax risk management security.

  20. What community-level strategies are needed to secure women's property rights in Western Kenya? Laying the groundwork for a future structural HIV prevention intervention.

    Science.gov (United States)

    Dworkin, Shari L; Lu, Tiffany; Grabe, Shelly; Kwena, Zachary; Mwaura-Muiru, Esther; Bukusi, Elizabeth

    2014-01-01

    Despite the recognized need for structural-level HIV prevention interventions that focus on economic empowerment to reduce women's HIV risks, few science-based programs have focused on securing women's land ownership as a primary or secondary HIV risk reduction strategy. The current study focused on a community-led land and property rights model that was implemented in two rural areas of western Kenya where HIV prevalence was high (24-30%) and property rights violations were common. The program was designed to reduce women's HIV risk at the community level by protecting and enhancing women's access to and ownership of land. Through in-depth interviews with 50 program leaders and implementers of this program we sought to identify the strategies that were used to prevent, mediate, and resolve property rights violations. Results included four strategies: (1) rights-based education of both women and men individually and at the community level, (2) funeral committees that intervene to prevent property grabbing and disinheritance, (3) paralegal training of traditional leaders and community members and local adjudication of cases of property rights violations, and (4) referring property rights violations to the formal justice system when these are not resolved at the community level. Study participants underscored that local mediation of cases resulted in a higher success rate than women experienced in the formal court system, underscoring the importance of community-level solutions to property rights violations. The current study assists researchers in understanding the steps needed to prevent and resolve women's property rights violations so as to bolster the literature on potential structural HIV prevention interventions. Future research should rigorously test property rights programs as a structural HIV prevention intervention.

  1. Research-to-policy translation for prevention of disordered weight and shape control behaviors: A case example targeting dietary supplements sold for weight loss and muscle building.

    Science.gov (United States)

    Austin, S Bryn; Yu, Kimberly; Tran, Alvin; Mayer, Beth

    2017-04-01

    New approaches to universal eating disorders prevention and interventions targeting macro-environmental change are greatly needed, and research-to-policy translation efforts hold promise for advancing both of these goals. This paper describes as a policy-translation case example an academic-community-government partnership of the Strategic Training Initiative for the Prevention of Eating Disorders, Multi-Service Eating Disorders Association, and the office of Massachusetts Representative Kay Khan, all based in Massachusetts, USA. The partnership's research-to-policy translation project focused on dietary supplements sold for weight loss and muscle building, which have been linked with serious injury and death in consumers. Youth and people of all ages with eating disorders and body dysmorphic disorder may be especially vulnerable to use these products due to deceptive promises of fast and safe weight loss and muscle gain. The research-to-policy translation project was informed by a triggers-to-action framework to establish the evidentiary base of harm to consumers, operationalize policy solutions to mitigate harm through legislation, and generate political will to support action through legislation introduced in the Massachusetts legislature to restrict sales of weight-loss and muscle-building dietary supplements. The paper concludes with lessons learned from this unique policy translation effort for the prevention of disordered weight and shape control behaviors and offers recommendations for next steps for the field to advance research and practice for universal, macro-environmentally targeted prevention. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  3. Using Social Network Theory to Influence the Development of State and Local Primary Prevention Capacity-Building Teams

    Science.gov (United States)

    Cook-Craig, Patricia G.

    2010-01-01

    This article examines the role that social network theory and social network analysis has played in assessing and developing effective primary prevention networks across a southeastern state. In 2004 the state began an effort to develop a strategic plan for the primary prevention of violence working with local communities across the state. The…

  4. Educational Programme in Nuclear Security

    International Nuclear Information System (INIS)

    2010-01-01

    The potential of a malicious act involving nuclear or other radioactive material is a continuing worldwide threat. Available data indicate circumstances in which nuclear and other radioactive material are vulnerable to theft, are uncontrolled, or are in unauthorized circulation. States must establish sustainable security measures to prevent such acts and to protect society from nuclear terrorism. Appropriate training and education at all levels and in all relevant organizations and facilities can play a major role in this process. There is increased interest in nuclear applications. Many States have expressed interest in expanding or introducing nuclear power in their country as a result of their own assessment of their energy supply needs, because of climate change, and development requirements. The projected increase in the demand for nuclear energy will increase the number of nuclear reactors worldwide and, consequently, the amount of nuclear material in use. Possible malicious acts involving nuclear or other radioactive material are a real threat. These developments are mirrored by an increase in the use of nuclear techniques in non-power applications. As a result, the need for experts in the area of nuclear security has become of great importance, and both universities and students have shown an increasing interest in nuclear security specialities. In September 2005, the Board of Governors approved a Nuclear Security Plan covering the period 2006-2009. This emphasized, inter alia, the importance of human resource development to assist States in building capacity to establish and maintain appropriate nuclear security to prevent, detect and respond to malicious acts involving nuclear and other radioactive material. The Nuclear Security Plan envisages the development of guidance for an educational programme in nuclear security that could be used by all States. In pursuit of this goal, this publication has been developed to provide advice and assistance to

  5. CWSP Certified Wireless Security Professional Official Study Guide, Exam PW0-204

    CERN Document Server

    Coleman, David D; Harkins, Bryan E

    2010-01-01

    Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.

  6. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  7. Analysis of five theses interpreting structural violence and the exercise of governance in the process of managing public security and violence prevention in the City of Santa Tecla

    Directory of Open Access Journals (Sweden)

    Juan Carlos Morales Peña

    2014-05-01

    Full Text Available The objective of this academic paper is to demonstrate an unconventional proposition for analytical interpretation of the way in which any effort to regenerate social fabric is followed by another process of social deconstruction. This study’s approach is based on the interdependent relationship between security and development, which exposes the collision of two forms of logic; that is, one regarding their interconnected nature, where there is a significant degree of social cohesion and regeneration that is indispensible to strengthen community organization, and is part of the content of the violence prevention strategies, and other citizen security and coexistence policies. Additionally, there is another destructuring logic, with the capacity to amass new social input at present to undertake future deconstruction. In this regard, the proposal is the existence of a phenomenon of legitimate summation that is unconscious of the future risk, and its empowerment of adverse effects on society, and its development in the matrix comprised of cooperation-cooptation-conflict.DOI: http://dx.doi.org/10.5377/rpsp.v1i1.1389

  8. Legionellosis prevention in building water and HVAC systems a practical guide for design, operation and maintenance to minimize the risk

    CERN Document Server

    Joppolo, Cesare Maria; Pitera, Luca Alberto; Angermann, Jean Pierre; Izard, Mark

    2013-01-01

    This Guidebook is a practical guide for design, operation and maintenance to minimize the risk of legionellosis in building water and HVAC systmes. It is devided into several themes such as: Air conditioning of the air (by water – humidification), Production of hot water for washing (fundamentally but not only hot water for washing) and Evaporative cooling tower.

  9. Quality investigation of building structure using ground penetrating radar (GPR) as an early study to prevent severe structural damage

    Science.gov (United States)

    Gumai, M. Fariz; Fernando, Stephen; Nugroho, Gatot; Natania, Kana; Widodo

    2017-07-01

    Many infrastructures in Indonesia suffered damage in a short period of time. It proves that there are still many buildings in Indonesia which have questionable quality so a method is needed for checking the quality of the building. Ground Penetrating Radar (GPR) is a method used to describe the structure of the building on the inside that cannot be seen from the outside in this case Parahyangan Reksa Raga (PASAGA) Bridge was examined with 19.7 m × 3.3 m × 1.5 m dimension. Thismethod uses propagation of electromagnetic wave, which will give Radargram response inside a building based on the characteristics of the medium such as magnetic permeability, electric permittivity and electrical conductivity. GPR method is one of geophysical method which is effective, efficient, and environmentally friendly. The measurements were carried out using MALA RAMAC X3M device with frequency 800 MHz. The results show thatindication of fractures was found at less than 1 m depth in the structure from the Radargram display of PASAGA Bridge and supported by the observation data on the surface.

  10. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  11. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  12. The Adoption of Ergonomic Innovations for Injury Prevention : Examples from the building construction and health care industries

    OpenAIRE

    Glimskär, Bo

    2014-01-01

    A good work environment is important for the individual, for industry and for society. The work environment research has, predominantly, targeted identification of problems and the measurement of the size of these problems. Innovations to reduce the incidence of musculoskeletal disorder, MSD, have been introduced in different branches of industry, but with limited success. Few of the ergonomic innovations developed for the building and construction industry have reached a sufficient level of ...

  13. Building laboratory infrastructure to support scale-up of HIV/AIDS treatment, care, and prevention: in-country experience.

    Science.gov (United States)

    Abimiku, Alash'le G

    2009-06-01

    An unprecedented influx of funds and support through large programs such as the Global Fund for AIDS, Malaria and Tuberculosis and the World Health Organization's and President's Emergency Plan for AIDS Relief (PEPFAR) has made it possible for more than 1 million persons in resource-limited settings to access AIDS treatment and several million more to be in care and prevention programs. Nevertheless, there remain major challenges that prevent AIDS drugs and care from reaching many more in need, especially in rural settings. The roll-out of a high-quality treatment, care, and prevention program depends on an effective and reliable laboratory infrastructure. This article presents a strategy used by the Institute of Human Virology (IHV)-University of Maryland and its affiliate IHV-Nigeria to establish a multifaceted, integrated tier laboratory program to support a PEPFAR-funded scale-up of its AIDS Care Treatment in Nigeria program, in collaboration with the Centers for Disease Control and Prevention and the Nigerian government, as a possible model for overcoming a key challenge that faces several resource-limited countries trying to roll out and scale-up their HIV/AIDS treatment, care, and prevention program.

  14. In What Ways Has US Security Cooperation Programs Been Effective in Helping Kenya to Build Partnership Capacity to Counter Transnational Terrorism?

    Science.gov (United States)

    2007-03-30

    Terrorism and Transnational Threats – Causes and Enablers” by David H. Shinn, as part of the Symposium Africa: Vital to US Security? Presented at the...125 Ibid., 11. 126 Beth Degrasse, David Dickson, and Michael Dziedzeck. “Global Peace Operations Initiative: Future Prospects Future...Activities.” Arlington, VA: Rand Arroyo Canter , 2006. Taylor, John E. “US Security Assistance to Jordan: Has the US achieved its Goals?” Master of

  15. BASIC CONCEPTS OF TAX SECURITY AS PART OF THE FINANCIAL SECURITY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Sergiy Golikov

    2016-11-01

    the population, the level of shadow economy and low tax culture. The threat of the state of public finances is sufficiently large threat, but not the most dangerous, but the increase in the budget deficit and debt can affect significantly negatively on the tax security of Ukraine. The institutional environment is another threat to the tax security. Its main danger are the low efficiency of the tax authorities and uncertainty and ambiguity of legislation. Practical implications. In order to prevent a drop in tax security it is necessary to conduct continuous monitoring aforementioned factors on the sources of threats. All mentioned sources of threats would help the state authorities to build an effective Concept of Tax Security of Ukraine.

  16. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  17. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  18. Developing clinical decision tools to implement chronic disease prevention and screening in primary care: the BETTER 2 program (building on existing tools to improve chronic disease prevention and screening in primary care).

    Science.gov (United States)

    Manca, Donna Patricia; Campbell-Scherer, Denise; Aubrey-Bassler, Kris; Kandola, Kami; Aguilar, Carolina; Baxter, Julia; Meaney, Christopher; Salvalaggio, Ginetta; Carroll, June C; Faria, Vee; Nykiforuk, Candace; Grunfeld, Eva

    2015-08-04

    The Building on Existing Tools to Improve Chronic Disease Prevention and Screening in Family Practice (BETTER) trial demonstrated the effectiveness of an approach to chronic disease prevention and screening (CDPS) through a new skilled role of a 'prevention practitioner'(PP). The PP has appointments with patients 40-65 years of age that focus on primary prevention activities and screening of cancer (breast, colorectal, cervical), diabetes and cardiovascular disease and associated lifestyle factors. There are numerous and occasionally conflicting evidence-based guidelines for CDPS, and the majority of these guidelines are focused on specific diseases or conditions; however, primary care providers often attend to patients with multiple conditions. To ensure that high-level evidence guidelines were used, existing clinical practice guidelines and tools were reviewed and integrated into blended BETTER tool kits. Building on the results of the BETTER trial, the BETTER tools were updated for implementation of the BETTER 2 program into participating urban, rural and remote communities across Canada. A clinical working group consisting of PPs, clinicians and researchers with support from the Centre for Effective Practice reviewed the literature to update, revise and adapt the integrated evidence algorithms and tool kits used in the BETTER trial. These resources are nuanced, based on individual patient risk, values and preferences and are designed to facilitate decision-making between providers across the target diseases and lifestyle factors included in the BETTER 2 program. Using the updated BETTER 2 toolkit, clinicians 1) determine which CDPS actions patients are eligible to receive and 2) develop individualized 'prevention prescriptions' with patients through shared decision-making and motivational interviewing. The tools identify the patients' risks and eligible primary CDPS activities: the patient survey captures the patient's health history; the prevention visit form

  19. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  20. A mixed-method evaluation of the New York State Eat Well Play Hard Community Projects: Building local capacity for sustainable childhood obesity prevention.

    Science.gov (United States)

    Reid, Kaydian S; Sekhobo, Jackson P; Gantner, Leigh A; Holbrook, MaryEllen K; Allsopp, Marie; Whalen, Linda B; Koren-Roth, Amy

    2018-04-01

    This study used a mixed-method, comparative case study approach to assess the level of capacity built for childhood obesity prevention among seven New York State Eat Well Play Hard-Community Projects (EWPH-CP). Data were collected through a self-reported survey in 2007, semi-structured interviews in 2009, and EWPH-CP program documentation throughout the 2006-2010 funding cycle. Quantitative and qualitative analyses were used along with an integrative framework for assessing local capacity building to characterize the capacity built by the study coalitions. Four coalitions rated membership characteristics as a challenge at the beginning of the funding cycle. Towards the end of the funding cycle, all seven coalitions reported activities that were initially focused on building their membership (i.e., member capacity) or positive working relationships (i.e. relational capacity), before eventually pursuing support and resources (i.e., organizational capacity) for implementing their chosen community-oriented programmatic goals (i.e., programmatic capacity). Five coalitions reported environmental changes aimed at increasing physical activity or fruit and vegetable intake. Technical assistance provided to coalitions was credited with contributing to the achievement of programmatic goals. These results suggest that the coalitions succeeded in building local capacity for increasing age-appropriate physical activity or fruit and vegetables intake in the target communities. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. How Youth Picture Gender Injustice: Building Skills for HIV Prevention through a Participatory, Arts-Based Approach

    Science.gov (United States)

    Wood, Lesley

    2012-01-01

    Based on the existing literature on the positive relationship that exists between high instances of HIV infections and a high degree of gender injustices in southern Africa, there is clearly a need for HIV-prevention interventions, to focus on the need for changing the existing gender norms. Social change begins with change at the individual…

  3. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  4. In What Ways Has US Security Cooperation Programs Been Effective in Helping Kenya to Build Partnership Capacity to Counter Transnational Terrorism?

    National Research Council Canada - National Science Library

    Henneke, Jason C

    2007-01-01

    .... In addition to host-nation capacity building, the cooperation of all agencies within the U.S. Government (USG) is required for a coordinated and effective approach to the Global War on Terrorism...

  5. Reactor building

    International Nuclear Information System (INIS)

    Ebata, Sakae.

    1990-01-01

    At least one valve rack is disposed in a reactor building, on which pipeways to a main closure valve, valves and bypasses of turbines are placed and contained. The valve rack is fixed to the main body of the building or to a base mat. Since the reactor building is designed as class A earthquake-proofness and for maintaining the S 1 function, the valve rack can be fixed to the building main body or to the base mat. With such a constitution, the portions for maintaining the S 1 function are concentrated to the reactor building. As a result, the dispersion of structures of earthquake-proof portion corresponding to the reference earthquake vibration S 1 can be prevented. Accordingly, the conditions for the earthquake-proof design of the turbine building and the turbine/electric generator supporting rack are defined as only the class B earthquake-proof design conditions. In view of the above, the amount of building materials can be saved and the time for construction can be shortened. (I.S.)

  6. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  7. The National Military Strategy of the United States of America 2015: The United States Military’s Contribution to National Security

    Science.gov (United States)

    2015-06-01

    fear in opponents and generate support for their causes. They use improvised explosive devices (IED), suicide vests, and tailored cyber tools to...our security relationship with India and build upon our partnerships with New Zealand, Singapore, Indonesia, Malaysia , Vietnam, and Bangladesh. Such...prevention and response, suicide prevention, and high-risk behavior avoidance. B. Processes: Capturing Innovation and Efficiencies Agile

  8. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  9. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  10. AFRICOM Engineers: Using Water in the Fight for Regional Security

    Science.gov (United States)

    2008-01-01

    Robert. "AFRICOM’s Dilemma : The "Global War on Terrorism" "Capacity Building," Humanitarianism, and the Future of U.S. Security Policy in Africa... dilemmas .40 The United States Department of Defense Directive 3000.05, dated 28 November 2005, provides clear guidance 011 how military support for...primary health care services • Low immunization coverage • Lack of emergency obstetric care/child & mother preventive care • Poor education system

  11. Beyond the cathedral: building trust to engage the African American community in health promotion and disease prevention.

    Science.gov (United States)

    Ford, Angela F; Reddick, Karen; Browne, Mario C; Robins, Anthony; Thomas, Stephen B; Crouse Quinn, Sandra

    2009-10-01

    Effective efforts to eliminate health disparities must be grounded in strong community partnerships and trusting relationships between academic institutions and minority communities. However, there are often barriers to such efforts, including the frequent need to rely on time-limited funding mechanisms that take categorical approaches. This article provides an overview of health promotion and disease prevention projects implemented through the Community Outreach and Information Dissemination Core (COID) of the Center for Minority Health, within the Graduate School of Public Health at the University of Pittsburgh. The COID is one of five Cores that comprised the University of Pittsburgh's NIH Excellence in Partnerships for Community Outreach, and Research on Disparities in Health and Training (EXPORT Health) funded from 2002 to 2007 by the National Center on Minority Health and Health Disparities. Based in large part on the success of the community engagement activities, in 2007, the National Center on Minority Health and Health Disparities, National Institutes of Health, designated the CMH as a Research Center of Excellence on Minority Health Disparities. COID major initiatives included the Community Research Advisory Board, Health Disparity Working Groups, Health Advocates in Reach, Healthy Class of 2010, and the Healthy Black Family Project. Lessons learned may provide guidance to other academic institutions, community-based organizations, and health departments who seek to engage minority communities in changing social norms to support health promotion and disease prevention.

  12. The Solaar HIV prevention program for gay and bisexual Latino men: using social marketing to build capacity for service provision and evaluation.

    Science.gov (United States)

    Conner, Ross F; Takahashi, Lois; Ortiz, Eloy; Archuleta, Eduardo; Muniz, Juan; Rodriguez, Julio

    2005-08-01

    Community-researcher partnerships can be powerful mechanisms to understand and effectively address health and social problems such as HIV/AIDS prevention. When the partnership is a positive, productive one, the combined expertise and energy of both parties result in a more effective program and a better evaluation of its effects. This article describes one such partnership and how a program challenge provided the opportunity for both partners to develop new capacities and strengthen others. The program is Proyecto SOLAAR, a community-based and culturally-sensitive HIV prevention program for gay and bisexual Latino men. The program is an experiential, daylong retreat focused on personal aspects of the men (e.g., self-concept), ideas about and aspects of their relationship behavior (e.g., cultural misunderstandings, dating behavior), and HIV prevention; there is a follow-up reunion a month later to share experiences with other participants about new dating and HIV prevention behaviors. The article focuses in particular on how the partners built new capacity in the area of social marketing to address the challenge of participant recruitment and describes the components of the new campaign. These components included distinctive images in ads in publications read by the target population, a toll-free telephone number and Web site for easy initial contact with the program, phone cards and postcards featuring the specially created program image to reinforce a connection to the program, and other aspects. The article describes the partnership between the HIV service providers and the researchers and how the collaborative effort was key to understanding and addressing the recruitment problem, identifying potential solutions, and implementing the new social marketing strategy. This process resulted in four kinds of capacities that were built or strengthened, including program recruitment, program content and implementation, program evaluation, and the partnership itself. The

  13. Building local research and development capacity for the prevention and cure of neglected diseases: the case of India.

    Science.gov (United States)

    Kettler, H E; Modi, R

    2001-01-01

    This paper examines the proposal to build research and development (R&D) capabilities for dealing with neglected infectious and tropical diseases in countries where they are endemic, as a potentially cost- and time-effective way to fill the gap between the supply of and need for new medicines. With reference to the situation in India, we consider the competencies and incentives needed by companies so that their strategy can be shifted from reverse engineering of existing products to investment in R&D for new products. This requires complex reforms, of which the intellectual property rights agreement is only one. We also consider whether Indian companies capable of conducting research and development are likely to target neglected diseases. Patterns of patenting and of R&D, together with evidence from interviews we have conducted, suggest that Indian companies, like multinational corporations, are likely to target global diseases because of the prospect of much greater returns. Further studies are required on how Indian companies would respond to push and pull incentives originally designed to persuade multinational corporations to do more R&D on neglected diseases.

  14. Building Resilience for Palliative Care Clinicians: An Approach to Burnout Prevention Based on Individual Skills and Workplace Factors.

    Science.gov (United States)

    Back, Anthony L; Steinhauser, Karen E; Kamal, Arif H; Jackson, Vicki A

    2016-08-01

    For palliative care (PC) clinicians, the work of caring for patients with serious illness can put their own well-being at risk. What they often do not learn in training, because of the relative paucity of evidence-based programs, are practical ways to mitigate this risk. Because a new study indicates that burnout in PC clinicians is increasing, we sought to design an acceptable, scalable, and testable intervention tailored to the needs of PC clinicians. In this article, we describe our paradigm for approaching clinician resilience, our conceptual model, and curriculum for a workplace resilience intervention for hospital-based PC teams. Our paradigm for approaching resilience is based on upstream, early intervention. Our conceptual model posits that clinician well-being is influenced by personal resources and work demands. Our curriculum for increasing clinician resilience is based on training in eight resilience skills that are useful for common challenges faced by clinicians. To address workplace issues, our intervention also includes material for the team leader and a clinician perception survey of work demands and workplace engagement factors. The intervention will focus on individual skill building and will be evaluated with measures of resilience, coping, and affect. For PC clinicians, resilience skills are likely as important as communication skills and symptom management as foundations of expertise. Future work to strengthen clinician resilience will likely need to address system issues more directly. Copyright © 2016 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  15. Knowing, Building and Living Together on Internet and Social Networks: The ConRed Cyberbullying Prevention Program

    Directory of Open Access Journals (Sweden)

    Rosario Ortega-Ruiz

    2012-12-01

    Full Text Available An evaluation of the success of the evidence-based ConRed program, which addresses cyberbullying and other emerging problems linked with the use of the internet and seeks to promote a positive use of this new environment. The main aims of the ConRed program are a to improve perceived control over information on the internet, b to reduce the time dedicated to digital device usage, and c to prevent and reduce cyberbullying. The impact of the program was evaluated with a quasi-experimental design with a sample of 893 students (595 experimental and 298 control. The results of the mixed repeated measures ANOVAs demonstrate that ConRed contributes to reducing cyberbullying and cyber-dependence, to adjusting the perception of information control, and to increasing the perception of safety at school.

  16. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  17. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  18. Getting More Out of FID and SFA: A Strategy for More Effective Foreign Internal Defense and Security Force Assistance As a Way to Build Partnership Capacity

    Science.gov (United States)

    2015-04-13

    coast and the interior, and fix segmentation of the labor market .13 However, these reforms cannot be realized if Tunisian security does not permit...the ruling party. Both countries are committed to combating terrorism, free- market capitalism, and democratic government, therefore this 12 The...ruling party. Both countries are committed to combating terrorism, free- market capitalism, and democratic government, therefore this criterion is

  19. Implementing Evidence-Based Teen Pregnancy-Prevention Interventions in a Community-Wide Initiative: Building Capacity and Reaching Youth.

    Science.gov (United States)

    House, L Duane; Tevendale, Heather D; Martinez-Garcia, Genevieve

    2017-03-01

    To describe efforts to implement evidence-based interventions (EBIs) within multicomponent, community-wide initiatives to reduce teen pregnancy. During 2011-2014, we collected information about the capacity (i.e., knowledge, confidence, training, and experience) of state and community-based organizations to support implementation of the following: EBIs, number and characteristics of youth served by EBIs, type of EBIs implemented, EBI settings, hours of training, and technical assistance provided. State and community-based organizations reported these data annually; however, training and technical assistance was reported monthly. We used aggregated data from these annual and monthly reports to describe the implementation of EBIs in the community-wide initiative project. From baseline in 2011-2014, state and community-based organizations increased their capacities to support program partners in delivering EBIs. They provided 5,015 hours of technical assistance and training on topics, including ensuring adequate capacity, process and outcome evaluation, program planning, and continuous quality improvement. Program partners increased the number of youth reached by an EBI in targeted communities by 349%, from 4,304 in the first year of implementation in 2012 to 19,344 in 2014. Most youth in 2014 received sexuality education programs (59%), whereas smaller percentages received abstinence-based, youth development, and clinic-based programs. Most youth were reached through schools (72%) and community-based organizations (16%), and smaller numbers were reached in other settings (e.g., faith-based organizations, health centers). Building and monitoring the capacity of program partners to deliver EBIs through technical assistance and training is important. In addition, partnering with schools leads to reaching more youth. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  20. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  1. Security and Political Stability in the Mediterranean

    Directory of Open Access Journals (Sweden)

    Antonio Marquina

    1997-09-01

    Full Text Available The author revises with a critical eye the treatment given the issue of security during the Euro-Mediterranean process from the Declaration of Barcelona to the Conference at Malta. According to Marquina, no idea of security exists which gives backbone to theEuro-Mediterranen process and the documents themselves contain incoherencies and significant imprecisions, especially regarding the concepts of cooperative security, preventative diplomacy and ‘good neighbor’ relations. These principles appear to be rather underexplained in both their conceptual and operative aspects. On one hand, the information about matters that affect security is exchanged on both a voluntary and official basis and can be, as such, thus opaque and not always reliable; on the other hand, the issues thataffect security are so wide-ranging that the operative approach - the communications network, mechanisms for early-warning, the conciliation and peaceful resolution of controversies - seems hardly realistic. With respect to confidence-building measures, the author considers that these should be linked to arms control agreements, which are more in accord with the stated objectives of defense sufficiency and the non-proliferation of weapons of mass destruction. Marquina also maintains that the role of civil society and the importance of cultural dialogue - both fundamental to conflict prevention - have not been reinforced even though the principal problems of security in the region are due to structural imbalances –military, economical, political– and, precisely the disparities amongcultures. In this sense, the EU states might consider putting forward unilateral policies that restrict such disparities, provided that a certain reciprocity of policy is put forth from the southern states in the Mediterranean.

  2. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  3. Environment and security in the South China Sea region : the role of experts, non-governmental actors and governments in regime building processes

    OpenAIRE

    Næss, Tom

    1999-01-01

    Background: The Spratly islands in the South China Sea are today the focal point of a territorial dispute that represents a serious threat to the regional security in Southeast Asia. Six governments - China, Vietnam, Taiwan, the Philippines, Malaysia and Brunei - have laid claims to all or some of the more than 230 islets, reefs and shoals in the Spratly area. The Peoples Republic of China (PRC) is a key player in the South China Sea conflict. However, the South China Sea is not jus...

  4. Prevention: Exercise

    Medline Plus

    Full Text Available ... Pregnancy and Back Pain Preventing Osteoporosis Back Pain Basics Book RESOURCES Patient ... popular forms of exercise focus on core strengthening, or building the muscles that provide support for your body. Pilates, yoga and martial arts ...

  5. RISK MANAGEMENT FROM THE INFORMATION SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Riza Ionuț

    2017-11-01

    Full Text Available Risk management has emerged ever since the appearance of human communities and it has developed at a slow rate. Over time, a significant improvement was made, from accepting hazards to the identification, evaluation and control of unwanted events, threat prevention and exploitation of opportunities through scientific risk management actions. The fundamental role of research in cyber security is to concentrate the efforts on those contexts and conditions which determine the way in which key players reach a common understanding of the way to conceive and eventually answer to certain challenges in cyber security. In order to build a clear perception of these effects, this work presents the main elements which define cyber space, to come to the aid of turning the management process into an efficient one, especially when talking about cyber space as a space for conflicts, both economic and political.

  6. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  7. Security basics for computer architects

    CERN Document Server

    Lee, Ruby B

    2013-01-01

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support fo

  8. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  9. Suggestions for the New Social Entrepreneurship Initiative: Focus on Building a Body of Research-Proven Programs, Shown to Produce Major Gains in Education, Poverty Reduction, Crime Prevention, and Other Areas

    Science.gov (United States)

    Coalition for Evidence-Based Policy, 2009

    2009-01-01

    This paper outlines a possible approach to implementing the Social Entrepreneurship initiative, focused on building a body of research-proven program models/strategies, and scaling them up, so as to produce major progress in education, poverty reduction, crime prevention, and other areas. The paper summarizes the rationale for this approach, then…

  10. Consideration of the energetic quality of buildings during specificaton of adequacy limits for the cost of housing and heating in line with the social security statute book; Die Beruecksichtigung der energetischen Gebaeudequalitaet bei der Festlegung von Angemessenheitsgrenzen fuer die Kosten der Unterkunft und Heizung nach dem Sozialgesetzbuch

    Energy Technology Data Exchange (ETDEWEB)

    Malottki, Christian von

    2012-07-27

    The author of the contribution reports on the consideration of the energy quality of buildings during the specification of adequacy limits for the cost of housing and heating in line with the social security statute book. Subsequently to the description of the legal and technical energy starting situation, the methods used to describe the energy quality of buildings, the methods of survey of pricing differences as well as the possibilities of application of an energetically differentiated suitability level are described.

  11. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  14. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  15. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  16. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on food and agriculture: Building better agriculture one atom at a time

    International Nuclear Information System (INIS)

    2012-01-01

    In a world facing the dilemmas posed by exponential population growth and changing climates, nuclear technology offers possible avenues to solve production problems, protect soil and water resources and conserve biodiversity, which, in turn, means increased hope for global food security. Application of nuclear technology has a proven record in increasing agricultural production. Higher and more reliable yields not only improve farmers' livelihoods, they mean better quality and safer food for consumers. The methods used vary: isotope measurements identify and trace the efficiency of crop inputs such as water and fertilizer and of animal feeds; gamma rays sterillize male insects so that when they are returned to the wild they are unable to produce progeny; irradiation stops the growth of pests and expands the shelf life of grains, spices and processed foods; radiation induced mutation speeds up natural genetic changes in crops to support plant breeders; and genetic markers expedite the identification of animal diseases thereby allowing treatment to begin sooner. All of these methods, plus a host of others that come under the heading of nuclear technology, are invaluable tools for agriculture and food production. For almost five decades, the IAEA, together with its partner the FAO, guided development of new nuclear based methodologies, requested by its Member States and facilitated their adaptation, adoption and application. A harbinger of the United Nation's Delivering as One, the Joint FAO/IAEA Division stands as the United Nations' system's only joint venture. It also operates its own agriculture and biotechnology laboratories in Seibersdorf where technical services, R and D and laboratory training activities are conducted in support of the development and transfer of new technologies and their adaptation to local needs and environments.

  17. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  18. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  19. Plataforma smart building

    OpenAIRE

    Cidrera Lopez, Alain

    2013-01-01

    The overall project is a system (hardware + software) that allows monitoring and control in a building / office different security systems, energy, communications, home automation, PKI's overall business that will increase all the efficiency of the building and the business and ensure the continuity of it. My participation in this Project will mainly focus on the development of hardware components, monitoring and control system (home automation, energy, safety control elements ...) and softwa...

  20. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  1. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  2. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  3. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  4. Modern "don-quixotism" or an emerging norm of international relations? Prevention of armed conflicts in the European Union and the organization for security and cooperation in Europe

    OpenAIRE

    Zupančič, Rok

    2015-01-01

    The prevention of armed conflicts is stated as the priority policy of various international organizations, among which the EU and the OSCE. Based on the semi-structured interviews with high bureaucrats and civilian experts, who areengaged in conflict prevention policies within the two international organizations, the article compares the development and implementation of EU and OSCE strategies to prevent armed conflicts. With the support of the secondmethod, the analysis of primary and second...

  5. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  6. Investigation of radiological consequences of a serious accident in Swiss nuclear power plants on the drinking water supply and preventive measures in waterworks for securing drinking water quality and supply

    International Nuclear Information System (INIS)

    Ustohalova, V.; Kueppers, C.; Claus, M.

    2016-01-01

    The radiological consequences of a serious accident in Swiss nuclear power plants on the drinking water supply was studied, preventive measures for securing the drinking water quality were elaborated. Based on the scaling of thermal power and burnup of the used nuclear fuel the fission product release in case of a severe accident was estimated for airborne and waterborne migration paths. In cities that use the rivers for their water drinking water supplies have to stop the water abstraction. The Swiss tolerance and limiting values for radionuclides in drinking water would be exceeded shortly after the accident and the hazardous situation would last for more than 90 days.

  7. Design of earth slide prevention structure and results of analyzing its behavior in excavation work for main building foundation for No.4 plant in Kashiwazaki-Kariwa Nuclear Power Station

    International Nuclear Information System (INIS)

    Kuroda, Teruo; Shimazu, Masaomi; Terada, Kenji

    1990-01-01

    In the construction works for No.4 plant in Kashiwazaki-Kariwa Nuclear Power Station, Tokyo Electric Power Co., Inc., the excavation work using ground anchor type earth slide prevention structure of about 30 m height intended for soft rocks was carried out. In this report, the outline of the design of the earth slide prevention structure is described, and based on the results of measurement of the earth slide prevention structure and surrounding ground during the period of the excavation work, the effect that the underground continuous wall normally intersecting with the back of the earth slide prevention wall and structurally separated from it exerted to the deformation behavior of the earth slide prevention wall was examined, and the results are reported. The geological features of the site are explained. The excavation work is to excavate the site of +5 m level down to -26 m for the turbine building and to -38.15 m for the reactor building, and the quantity of earth to be excavated is 1.39 million m 3 . These valuable experiences are utilized for the design and construction of the following plants. (K.I.)

  8. No nuclear safety without security

    International Nuclear Information System (INIS)

    Anon.

    2016-01-01

    ead of Health and Safety - Nuclear Safety and Corporate Security at ENGIE Benelux, Pierre Doumont has the delicate job of defining and implementing measures, including cybersecurity, to prevent the risk of malevolent acts against tangible and intangible assets. He gives some hints on the contribution of nuclear security to safety.

  9. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report; Transition et securite energetiques: quels codes volontaires? Efficacite energetique: dialogue AIE, CEI et ISO. Les mesures de securite, solidarite et efficacite de la commission europeenne. Securiser l'approvisionnement en gaz naturel et favoriser la cogeneration. Des batiments moins gourmands en energie: refonte de la directive sur la performance energetique. Efficacite energetique dans les batiments: GDF Suez au rapport (volontaire)

    Energy Technology Data Exchange (ETDEWEB)

    Tourneur, J.C

    2009-10-15

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  10. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  11. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  12. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  13. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    and the natives agreed. For instance, Rajputs considered themselves a warrior class that gained honor from killing their enemies. The British...India ensured a native warrior was unemployed. He suggested that these displaced soldiers would be a source of trouble in any future government.232...311Interview CF20110914DV0001_SESSION1A, 14 September 2011; Jeapes, 25; Paul Sibley, A Monk in the SAS (London: Spiderwize, 2011), 62. 312A small

  14. Final deactivation report on the Radioactive Gas Processing Facility, Building 3033, and the Actinide Fabrication Facility, Building 3033A, at Oak Ridge National Laboratory, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-09-01

    The purpose of this report is to document the condition of Buildings 3033 and 3033A, after completion of deactivation activities as outlined by the Department of Energy Office of Nuclear Materials and Facility Stabilization Program (EM-60) guidance documentation. This report outlines the activities conducted to place the facility in a safe and environmentally sound condition for transfer to the Department of Energy Office of Environmental Restoration Program (EM-40). This report provides a history and profile of Buildings 3033 and 3033A prior to commencing deactivation activities and a profile of the building after completion of deactivation activities. Turnover items, such as the Post-Deactivation Surveillance and Maintenance Plan, remaining hazardous materials, radiological controls, Safeguards and Security, quality assurance, facility operations, and supporting documentation provided in the Office of Nuclear Materials and Facility Stabilization Program (EM-60) Turnover package are discussed. Buildings 3033 and 3033A will require access to facilitate required S and M activities to maintain the building safety envelope. Buildings 3033 and 3033A were stabilized during deactivation so that when transferred to the EM-40 program, only a minimal S and M effort would be required to maintain the building safety envelope. Other than the minimal S and M activities the building will be unoccupied and the exterior doors locked to prevent unauthorized access. The building will be entered only to perform the required S and M. All materials have been removed from the building, and all utility systems, piping, and alarms have been deactivated.

  15. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  16. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  17. Securing Embedded Smart Cameras with Trusted Computing

    Directory of Open Access Journals (Sweden)

    Winkler Thomas

    2011-01-01

    Full Text Available Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analog towards digital systems, the capabilities of cameras are constantly increasing. Today's smart camera systems come with considerable computing power, large memory, and wired or wireless communication interfaces. With onboard image processing and analysis capabilities, cameras not only open new possibilities but also raise new challenges. Often overlooked are potential security issues of the camera system. The increasing amount of software running on the cameras turns them into attractive targets for attackers. Therefore, the protection of camera devices and delivered data is of critical importance. In this work we present an embedded camera prototype that uses Trusted Computing to provide security guarantees for streamed videos. With a hardware-based security solution, we ensure integrity, authenticity, and confidentiality of videos. Furthermore, we incorporate image timestamping, detection of platform reboots, and reporting of the system status. This work is not limited to theoretical considerations but also describes the implementation of a prototype system. Extensive evaluation results illustrate the practical feasibility of the approach.

  18. Electromagnetic terrorism – threats in buildings

    OpenAIRE

    Marek Kuchta; Jacek Paś

    2015-01-01

    The paper presents the impact of electromagnetic pulses (high power and high frequency pulses — weapon E) on technical infrastructure of buildings [1]. The use of modern technologies in intelligent building management i.e. human resources, control and automation systems, efficient buildings space management, requires using a large number of integrated electronic systems. From technical point of view, the intelligent building is a building in which all subsystems (e.g. technical security, air ...

  19. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  20. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  1. Building Security in the Persian Gulf

    Science.gov (United States)

    2010-01-01

    research_briefs/RB9326/ Gopal, Anand, “No Afghan-Taliban Peace Talks, for Now,” Christian Science Monitor, October 9, 2008. Gordon, Michael R., “War in the Gulf...Nader, Jeremy Ghez, Lydia Hansell , and Robert A. Guffey, Saudi-Iranian Relations Since the Fall of Saddam: Rivalry, Cooperation, and Implications

  2. Ground Truth in Building Human Security

    Science.gov (United States)

    2012-11-01

    DFID (Department for International Develop- ment, the U.K. aid agency) and SIDA (the Swedish aid agency) have spent hundreds of millions of dollars to...rush to 2 aid post-Taliban Afghanistan. These socio-political trends complicate peacebuilding and underscore why it is doomed to failure in the...ongoing collabo- ration with local and UN officials, civil society, and aid agencies assists the U.S. Embassy in Juba and the USG in Washington DC to

  3. Building Global Competitiveness through Information Security ...

    African Journals Online (AJOL)

    If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs. Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link ...

  4. Building Information Security Awareness at Wilmington University

    Science.gov (United States)

    Hufe, Mark J.

    2014-01-01

    This executive position paper proposes recommendations for reducing the risk of a data breach at Wilmington University. A data breach could result in identity theft of students, faculty and staff, which is costly to the individual affected and costly to the University. The University has a legal and ethical obligation to provide safeguards against…

  5. Researchers build a secure plasma prison

    International Nuclear Information System (INIS)

    Glanz, J.

    1995-01-01

    Research groups at Princeton University's Tokamak Fusion Test Reactor and at the DIII-D tokamak at General Atomics in San Diego have made a major breakthrough. By tailoring the magnetic fields with unprecedented finesse, they appear to have tamed the plasma instabilities that rattle and tear the fragile magnetic cage, allowing particles to leak out and limiting a tokamak's performance. In the process they increased the central density of the plasma by as much as threefold and reduced the particle leakage by a factor of 50

  6. 40 CFR 264.14 - Security.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...

  7. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  8. 40 CFR 265.14 - Security.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...

  9. The cyber security threat stops in the boardroom.

    Science.gov (United States)

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  10. Calibrating Fundamental British Values: How Head Teachers Are Approaching Appraisal in the Light of the Teachers' Standards 2012, Prevent and the Counter-Terrorism and Security Act, 2015

    Science.gov (United States)

    Revell, Lynn; Bryan, Hazel

    2016-01-01

    In requiring that teachers should "not undermine fundamental British values (FBV)," a phrase originally articulated in the Home Office counter-terrorism document, Prevent, the Teachers' Standards has brought into focus the nature of teacher professionalism. Teachers in England are now required to promote FBV within and outside school,…

  11. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  12. Building Global Epidemiology and Response Capacity with Field Epidemiology Training Programs.

    Science.gov (United States)

    Jones, Donna S; Dicker, Richard C; Fontaine, Robert E; Boore, Amy L; Omolo, Jared O; Ashgar, Rana J; Baggett, Henry C

    2017-12-01

    More than ever, competent field epidemiologists are needed worldwide. As known, new, and resurgent communicable diseases increase their global impact, the International Health Regulations and the Global Health Security Agenda call for sufficient field epidemiologic capacity in every country to rapidly detect, respond to, and contain public health emergencies, thereby ensuring global health security. To build this capacity, for >35 years the US Centers for Disease Control and Prevention has worked with countries around the globe to develop Field Epidemiology Training Programs (FETPs). FETP trainees conduct surveillance activities and outbreak investigations in service to ministry of health programs to prevent and control infectious diseases of global health importance such as polio, cholera, tuberculosis, HIV/AIDS, malaria, and emerging zoonotic infectious diseases. FETP graduates often rise to positions of leadership to direct such programs. By training competent epidemiologists to manage public health events locally and support public health systems nationally, health security is enhanced globally.

  13. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  14. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  15. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  16. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  17. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  18. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  19. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  20. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  1. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  2. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. The Evolution of RFID Security

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home

  4. Ten years in disarmament and security: a mixed legacy

    International Nuclear Information System (INIS)

    Nolan, J.E.

    1998-01-01

    A retrospective of the developments in arms control and international security over last decade is necessarily a dialectic, a chronicle of points and counterpoints. The transformations in the international system that have results from the demise of bipolarity and the rise of trans nationalism have opened new opportunities for positive global engagement through international finance, production, trade, communications and by implication, conflict prevention and non-proliferation. The vastly increased pace and commercialisation of technological innovation also portend growing economic interdependence and higher transparency in the international system. Trans nationalism also implies shared risks posed by cross-border conflicts, sudden migrations, organized crime, ecological destruction and more rapid diffusion of technologies to build weapons of mass destruction. How these developments will translate into more cooperative security policies remains hard to predict and widely disputed

  5. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  6. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Military capacity building has increasingly become an integral part of Danish defence. Military capacity is a new way of thinking Danish defence and poses a new set of challenges and opportunities for the Danish military and the Political leadership. On the 12th of december, PhD. Candidate Josefine...... Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from...

  7. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  8. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  9. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  10. Government/Industry Partnership on the Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Cefus, Greg; Colhoun, Stefan C.; Freier, Keith D.; Wright, Kyle A.; Herdes, Gregory A.

    2006-01-01

    In the past, industry radiation protection programs were built almost exclusively around radiation safety and the minimization of radiation dose exposure to employees. Over the last decade, and especially the last few years, the emphasis has shifted to include the physical security and enhanced control of radioactive materials. The threat of nuclear and radiological terrorism is a genuine international security concern. In May 2004, the U.S. Department of Energy/U.S. National Nuclear Security Administration unveiled the Global Threat Reduction Initiative (GTRI) to respond to a growing international concern for the proper control and security of radioactive and nuclear materials. An integral part of the GTRI, the International Radiological Threat Reduction (IRTR) Program, was established in February 2002, originally as a Task Force. The IRTR Program is foremost a government-to-government cooperative program with the mission to reduce the risk posed by vulnerable radioactive materials that could be used in a Radioactive Dispersal Device (RDD). However, governments alone cannot prevent the misuse and illicit trafficking of radioactive sources. By expanding the role of private industry as a partner, existing government regulatory infrastructures can be enhanced by formulating and adopting industry self-regulation and self-policing measures. There is international concern regarding the security and control of the vast number of well-logging sources used during oil exploration operations. The prevalence of these sources, coupled with their portability, is a legitimate security concern. The energy exploration industry has well established safety and security protocols and the IRTR Program seeks to build on this foundation. However, the IRTR Program does not have sufficient resources to address the issue without industry assistance, so it is looking to the oil and gas industry to help identify alternative means for accomplishing our mutual objectives. This paper describes

  11. Global nuclear security engagement

    International Nuclear Information System (INIS)

    Kulp, W.D. III

    2012-01-01

    Full text: The Nuclear Security Summits in Washington (2010) and Seoul (2012) were convened with the goal of reducing the threat of nuclear terrorism. These meetings have engaged States with established nuclear fuel cycle activities and encouraged their commitment to nuclear security. The participating States have reaffirmed that it is a fundamental responsibility of nations to maintain effective nuclear security in order to prevent unauthorized actors from acquiring nuclear materials. To that end, the participants have identified important areas for improvement and have committed to further progress. Yet, a broader message has emerged from the Summits: effective nuclear security requires both global and regional engagement. Universal commitment to domestic nuclear security is essential, if only because the peaceful use of nuclear energy remains a right of all States: Nations may someday adopt nuclear energy, even if they are not currently developing nuclear technology. However, the need for nuclear security extends beyond domestic power production. To harvest natural resources and to develop part of a nuclear fuel cycle, a State should embrace a nuclear security culture. Nuclear materials may be used to produce isotopes for medicine and industry. These materials are transported worldwide, potentially crossing a nation's borders or passing by its shores. Regrettably, measures to prevent the loss of control may not be sufficient against an adversary committed to using nuclear or other radioactive materials for malicious acts. Nuclear security extends beyond prevention measures, encompassing efforts to detect illicit activities and respond to nuclear emergencies. The Seoul Communique introduces the concept of a Global Nuclear Security Architecture, which includes multilateral instruments, national legislation, best practices, and review mechanisms to promote adoption of these components. Key multilateral instruments include the Convention on Physical Protection of

  12. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  13. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  14. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  15. Research Award: Agriculture and Food Security Program

    International Development Research Centre (IDRC) Digital Library (Canada)

    Office 2004 Test Drive User

    strategies for youth engagement in agri-food value chains for improved food security. The research will help to develop a practical framework for identifying and ... and food security, have a clear commitment to AFS' methodological building blocks. (e.g., multistakeholder participation, transdisciplinary approaches), and ...

  16. LANDSCAPING FOR PASSIVE SECURITY AND ADAPTATION TO ...

    African Journals Online (AJOL)

    Nigeria is faced with several risks ranging from problems of climate change to security challenges and this is not limited to a specific aspect of the built environment as all buildings and environment are affected. The places of worship are greatly affected in terms of security which affects the disposition of Christians during ...

  17. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  18. Non Security – Premise of Cybercrime

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2012-04-01

    Full Text Available It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for information security management.

  19. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff......In Niger, building more border offices has proven insufficient to tackle the spread of smuggling, drug trade and circulation of jihadists in the Sahel. Instead, everyday petty corruption makes border control ineffective and, while apparently benign, this has severe consequences in contexts...... meetings, reporting, law implementation and sanctions as well as new modalities to reward border guards and other state agents. Because corruption is, to a large extent, embedded in the social norms of the users of public service in Niger, sensitisation among transporters, passengers and traders is crucial....

  20. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  1. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  2. Using an Opinion Poll to Build an Obesity-Prevention Social Marketing Campaign for Low-Income Asian and Hispanic Immigrants: Report of Findings

    Science.gov (United States)

    Sugerman, Sharon; Backman, Desiree; Foerster, Susan B.; Ghirardelli, Alyssa; Linares, Amanda; Fong, Amy

    2011-01-01

    Objective: To gain opinions from low-income, limited-English-speaking Hispanic and Asian immigrants for formative research in a social marketing campaign. Design: Nineteen questions on obesity prevention-related topics were embedded into a larger random digit-dial survey investigating the effects of language and cultural barriers on health care…

  3. Introduction to network security

    CERN Document Server

    Jacobson, Douglas

    2008-01-01

    … Students can easily understand how things work thanks to the different figures/definitions … students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. … A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. … the book is really well written, and easily understandable without lackin

  4. Building America

    Energy Technology Data Exchange (ETDEWEB)

    Brad Oberg

    2010-12-31

    IBACOS researched the constructability and viability issues of using high performance windows as one component of a larger approach to building houses that achieve the Building America 70% energy savings target.

  5. Building calculations

    DEFF Research Database (Denmark)

    Jensen, Bjarne Christian; Hansen, Svend Ole

    Textbook on design of large panel building including rules on robustness and a method for producing the Statical documentattion......Textbook on design of large panel building including rules on robustness and a method for producing the Statical documentattion...

  6. Relevance of Global Health Security to the US Export Economy

    Science.gov (United States)

    Cassell, Cynthia H.; Bambery, Zoe; Roy, Kakoli; Meltzer, Martin I.; Ahmed, Zara; Payne, Rebecca L.

    2017-01-01

    To reduce the health security risk and impact of outbreaks around the world, the US Centers for Disease Control and Prevention and its partners are building capabilities to prevent, detect, and contain outbreaks in 49 global health security priority countries. We examine the extent of economic vulnerability to the US export economy posed by trade disruptions in these 49 countries. Using 2015 US Department of Commerce data, we assessed the value of US exports and the number of US jobs supported by those exports. US exports to the 49 countries exceeded $308 billion and supported more than 1.6 million jobs across all US states in agriculture, manufacturing, mining, oil and gas, services, and other sectors. These exports represented 13.7% of all US export revenue worldwide and 14.3% of all US jobs supported by all US exports. The economic linkages between the United States and these global health security priority countries illustrate the importance of ensuring that countries have the public health capacities needed to control outbreaks at their source before they become pandemics. PMID:29199867

  7. Relevance of Global Health Security to the US Export Economy.

    Science.gov (United States)

    Cassell, Cynthia H; Bambery, Zoe; Roy, Kakoli; Meltzer, Martin I; Ahmed, Zara; Payne, Rebecca L; Bunnell, Rebecca E

    To reduce the health security risk and impact of outbreaks around the world, the US Centers for Disease Control and Prevention and its partners are building capabilities to prevent, detect, and contain outbreaks in 49 global health security priority countries. We examine the extent of economic vulnerability to the US export economy posed by trade disruptions in these 49 countries. Using 2015 US Department of Commerce data, we assessed the value of US exports and the number of US jobs supported by those exports. US exports to the 49 countries exceeded $308 billion and supported more than 1.6 million jobs across all US states in agriculture, manufacturing, mining, oil and gas, services, and other sectors. These exports represented 13.7% of all US export revenue worldwide and 14.3% of all US jobs supported by all US exports. The economic linkages between the United States and these global health security priority countries illustrate the importance of ensuring that countries have the public health capacities needed to control outbreaks at their source before they become pandemics.

  8. Solar building

    OpenAIRE

    Zhang, Luxin

    2014-01-01

    In my thesis I describe the utilization of solar energy and solar energy with building integration. In introduction it is also mentioned how the solar building works, trying to make more people understand and accept the solar building. The thesis introduces different types of solar heat collectors. I compared the difference two operation modes of solar water heating system and created examples of solar water system selection. I also introduced other solar building applications. It is conv...

  9. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  10. Building 2000

    International Nuclear Information System (INIS)

    Den Ouden, C.; Steemers, T.C.

    1992-01-01

    This is the first volume of Building 2000, a pilot project of the Commission's R and D-programme 'Solar Energy Applications to Buildings' with the purpose of encouraging the adoption of solar architecture in large buildings. In this first rich illustrated volume the results of the design studies illustrating passive solar architecture in buildings in the European Community are presented in particular for the building categories as mentioned in the subtitle. In a second volume, a similar series of studies is presented for the building categories: office buildings, public buildings and hotels and holiday complexes. Several Design Support Workshops were organized during the Building 2000 programme during which Building 2000 design teams could directly exchange ideas with the various design advice experts represented at these workshops. In the second part of the Building 2000 final report a summary of a selection of many reports is presented (15 papers), as produced by Design Support experts. Most of the design support activities resulted in changes of the various designs, as have been reported by the design teams in the brochures presented in the first part of this book. It is to be expected that design aids and simulation tools for passive solar options, daylighting concepts, comfort criteria etc., will be utilized more frequently in the future. This will result in a better exchange of information between the actual design practitioners and the European R and D community. This technology transfer will result in buildings with a higher quality with respect to energy and environmental issues

  11. Auxiliary buildings

    International Nuclear Information System (INIS)

    Lakner, I.; Lestyan, E.

    1979-01-01

    The nuclear power station represents a complicated and a particular industrial project. Consequently, the design of the auxiliary buildings serving the power station (offices, kitchen, refreshment room, workshops, depots, water treatment plant building, boiler houses, etc.) requires more attention than usual. This chapter gives a short survey of the auxiliary buildings already completed and discusses the problems of their design, location and structure. (author)

  12. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  13. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  14. Insights in public health: Building support for an evidence-based teen pregnancy and sexually transmitted infection prevention program adapted for foster youth.

    Science.gov (United States)

    Smith, Tamara; Clark, Judith F; Nigg, Claudio R

    2015-01-01

    Hawai'i Youth Services Network (HYSN) was founded in 1980 and is incorporated as a 501(c) (3) organization. HYSN plays a key role in the planning, creation, and funding of local youth services. One of HYSN's focuses is teen pregnancy and sexually transmitted infections (STI) prevention among foster youth. Foster youth are at a greater risk for teen pregnancy and STI due to a variety of complex factors including instability, trauma, and emancipation from the foster care system. This article highlights how HYSN is leveraging both federal and local funding, as well as other resources, in order to implement an evidence-based teen pregnancy and STI prevention program adapted for foster youth.

  15. Security Policy Configuration Analysis for Web Services on Heterogeneous Platforms

    Science.gov (United States)

    Hongbin, Ji; Fengyu, Zhao; Tao, Xu

    With the rapid development of web services, message security of web services between heterogeneous platforms is increasingly prominent. As two popular web services platforms, Apache Axis2 and Microsoft .Net, have their own security module respectively (Rampart, WSE). Due to differences in platform security mechanisms, it is difficult to build a secure web services communications between different platforms. This paper firstly introduces the Apache Axis2 and. Net platforms, and then analyzes their differences of security mechanism on these two platforms. Finally, followed by a typical secure case, a series of steps are designed and tested in order to realize secure web service invocation on heterogeneous platforms.

  16. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  17. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  18. [Prevention of psychosocial issues and drug addiction in workers employed in building great infrastructures: first outcomes of an experience in the Florence area].

    Science.gov (United States)

    Carpentiero, L; Costa, G; De Luca, G; Piovanelli, S; Venè, D; Righini, S; Marini, M; Baldanzi, S; Selvi, A; Scalas, S; Cassitto, M G; Sartori, S; Lacangellera, D; Bosco, A

    2009-01-01

    The research on stress, mobbing, and substance dependence in workers employed in the building of the great infrastructures is part of the project Euridice-Ten. The 75% of the workers employed took part in the research through an anonymous and structured questionnaire. The Clinica del Lavoro of the University of Milan elaborated the data. They point out a high risk of stress, a low level of control, a marked risk of mobbing, a high chronic fatigue in the most exhausting jobs, sleep disorders, problems in the social life as well as at home, in nourishment and at work. Many workers drink too much alcohol and the 9% of the workers know workers who use cocaine.

  19. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  20. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  1. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  2. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    Science.gov (United States)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  3. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  4. Constructing Secure Mobile Agent Systems Using the Agent Operating System

    NARCIS (Netherlands)

    van t Noordende, G.J.; Overeinder, B.J.; Timmer, R.J.; Brazier, F.M.; Tanenbaum, A.S.

    2009-01-01

    Designing a secure and reliable mobile agent system is a difficult task. The agent operating system (AOS) is a building block that simplifies this task. AOS provides common primitives required by most mobile agent middleware systems, such as primitives for secure communication, secure and

  5. landscaping for passive security and adaptation to climate in church

    African Journals Online (AJOL)

    user

    scheme. Keywords: Adaptation, Building, Climate change, Security, Soft landscaping. 1. INTRODUCTION. Climate change manifestations are wide ranging and ...... Rank. Curvilinear concept in design of landscape improves security. 138. 2.338983. Adequate. 8th. Use of masquerade along fence improves security. 159.

  6. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  7. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  8. Maintenance Planning for Historic Buildings

    Directory of Open Access Journals (Sweden)

    Diana Plian

    2008-01-01

    Full Text Available The key to good maintenance of historic buildings is a long-range maintenance plan. Long-range planning recognizes a responsibility to the future to prolong the useful life of a building by preserving it in its present condition and preventing or slowing deterioration and damage from natural or other causes.

  9. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  10. Challenges of human resource capacity building assistance

    International Nuclear Information System (INIS)

    Noro, Naoko

    2013-01-01

    At the first Nuclear Security Summit in Washington DC in 2010, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency was established based on Japan's National Statement which expressed Japan's strong commitment to contribute to the strengthening of nuclear security in Asian region. ISCN began its activities from JFY 2011. One of the main activities of ISCN is human resource capacity building support. Since JFY 2011, ISCN has offered various nuclear security training courses, seminars and workshops and total number of the participants to the ISCN's event reached more than 700. For the past three years, ISCN has been facing variety of challenges of nuclear security human resource assistance. This paper will briefly illustrate ISCN's achievement in the past years and introduce challenges and measures of ISCN in nuclear security human resource capacity building assistance. (author)

  11. Asia-Pacific Center for Security Studies Annual Report 2010

    Science.gov (United States)

    2010-01-01

    Studies2 Annual Repor t 2010 3 Building capacities and communities of interest by educating, connecting, and empowering security practitioners to...strategic understanding of complex challenges • Connector of communities of interest, expertise and influence related to security issues in the Asia-Pacific...long-term capacity building. A couple specific examples follow: 1. Mr. Maubere Loro Horta (Comprehensive Security Responses to Terrorism Course

  12. Gender in International Conflict: Women Representation in Security Discourse

    OpenAIRE

    Fitriani, Fitriani

    2012-01-01

    Security discourse that was long cons idered as scientific, objective and gender neutral is one subject that had received numerous feminist critics. It is not only that feminist observed security discourse as minority – including women and victims – blind; it is also masculine and prostatus quo. This article reviews the building of security discourse from feminist perspective that detects, since the theoretical building to the practical level, women are given weak position to justified the st...

  13. Building leadership capacity to prevent and control noncommunicable diseases: evaluation of an international short-term training program for program managers from low- and middle-income countries.

    Science.gov (United States)

    Erzse, Agnes; Bovet, Pascal; Paccaud, Fred; Chestnov, Oleg; Banatvala, Nicholas

    2017-09-01

    To assess the impact of a 1-week training seminar jointly developed and conducted by the World Health Organization and the University Institute of Social and Preventive Medicine of Lausanne targeting senior policy-makers in low- and middle-income countries on public health aspects of noncommunicable diseases (NCDs). A short qualitative questionnaire was emailed to all participants to one of the nine seminars organized between 2010 and 2015. From the 195 participants from 96 different countries, 122 (63%) completed the questionnaire. Among them, 87% reported that the seminar made a positive contribution to their professional development and 48% said it helped strengthening their national NCD program. All respondents remained directly or indirectly involved in NCD work. A frequent suggestion was that similar seminars are developed in their region or country. The evaluation strongly suggests that this short-term seminar had positive impact on both participants' personal development and the organization they worked for. There is a demand for organizing similar seminars at regional/country levels to support NCD prevention and control programs.

  14. Information Security Operations Centers

    Directory of Open Access Journals (Sweden)

    Natalia Georgievna Miloslavskaya

    2016-12-01

    Full Text Available At present information security (IS incidents have become not only more numerous and diverse but also more damaging and disruptive. Preventive controls based on the IS risk assessment results decrease the majority but not all the IS incidents. Therefore, an IS incident management system is necessary for rapidly detecting IS incidents, minimizing loss and destruction, mitigating the vulnerabilities that were exploited and restoring organization’s IT infrastructure (ITI, including its IT services. These systems can be implemented on the basis of a Security Operations Center (SOC. Based on the related works a survey of the existing SOCs, their mission and main functions is given. The SOCs’ classification as well as the key indicators of IS incidents in II are proposed. Some serious first-generation SOCs’ limitations are defined. This analysis leads to the main area of further research launched by the author.

  15. Report on Security 82

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    The 1982 trade fair Security 82 presented a variety of equipment and systems for protection and security in general. Apart from physical protection devices to prevent theft, a great number of fire protection devices, transmitting apparatus, locator systems, metal detectors, protective devices against signal interception, and complete alarm systems were exhibited and explained. By means of specifications and brief descriptions, sometimes with figures, predominantly passive and active infrared sensors, light and microwave sensors, ultrasound and microwave Doppler effect devices for indoor and outdoor physical protection, as well as other alarm systems and fire alarm systems or entry control systems are presented in this report. Design and functioning mode of the equipment presented are illustrated by explaining the fields of employment. (orig.) [de

  16. Keeping electronic records secure.

    Science.gov (United States)

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  17. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  18. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  19. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  20. Secure DBMS.

    Science.gov (United States)

    1982-02-01

    F30602-80-C- 0235 9. PERFORMING ORGANIZATION NAME AND ADDRESS I0. PROGRAM ELEMENT. PROJECT. TASK HARRIS CORPORATION AREA & WORK UNIT NUMBERS Government...performed for the Rome Air Development Center under Contract F30602-80-C- 0235 . The study was performed by the staff of the Hprris Corporation...processors from making TM - HP 6-31 simultaneous incompatable changes to the data base. However, the simple security rule prohibits a lower level

  1. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  2. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Security Engineering

    Science.gov (United States)

    2012-01-31

    Clarkson, Chong, and Myers, 2008; Fujioka and Okamoto, 1992] across a diverse set of redundant components. For example, an automobile brake control...e.g., a radio frequency spectrum analyzer embedded in a subsystem’s hardware chassis , and listening for a wireless triggering command at the time of...S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, Experimental security analysis of a modern automobile , IEEE Symposium on

  4. International security and arms control

    International Nuclear Information System (INIS)

    Ekeus, R.

    2000-01-01

    The end of the cold war also ended the focus on the bilateral approach to arms control and disarmament. Key concepts of security needed to be revisited, along with their implications for the disarmament and arms control agenda. Though there is currently a unipolar global security environment, there remain important tasks on the multilateral arms control agenda. The major task is that of reducing and eliminating weapons of mass destruction, especially nuclear weapons. The author contends that maintaining reliance on the nuclear-weapons option makes little sense in a time when the major Powers are strengthening their partnerships in economics, trade, peacemaking and building. (author)

  5. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  6. Building envelope

    CSIR Research Space (South Africa)

    Gibberd, Jeremy T

    2009-01-01

    Full Text Available have controllable internal blinds and external solar shading which can be used to maximise internal daylight quality and avoid glare and solar gain. • Ecological: Green building envelopes aim to support the development of ecosystems and plant... problems such as large solar heat gains which can only be solved through mechanical plant. • Large sections: 1:10 sections of building envelopes are very useful in understanding the design of a building envelope and should be developed early...

  7. Laboratory Building

    Energy Technology Data Exchange (ETDEWEB)

    Herrera, Joshua M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-03-01

    This report is an analysis of the means of egress and life safety requirements for the laboratory building. The building is located at Sandia National Laboratories (SNL) in Albuquerque, NM. The report includes a prescriptive-based analysis as well as a performance-based analysis. Following the analysis are appendices which contain maps of the laboratory building used throughout the analysis. The top of all the maps is assumed to be north.

  8. Preventing painful age-related bone fractures: Anti-sclerostin therapy builds cortical bone and increases the proliferation of osteogenic cells in the periosteum of the geriatric mouse femur.

    Science.gov (United States)

    Thompson, Michelle L; Chartier, Stephane R; Mitchell, Stefanie A; Mantyh, Patrick W

    2016-01-01

    Age-related bone fractures are usually painful and have highly negative effects on a geriatric patient's functional status, quality of life, and survival. Currently, there are few analgesic therapies that fully control bone fracture pain in the elderly without significant unwanted side effects. However, another way of controlling age-related fracture pain would be to preemptively administer an osteo-anabolic agent to geriatric patients with high risk of fracture, so as to build new cortical bone and prevent the fracture from occurring. A major question, however, is whether an osteo-anabolic agent can stimulate the proliferation of osteogenic cells and build significant amounts of new cortical bone in light of the decreased number and responsiveness of osteogenic cells in aging bone. To explore this question, geriatric and young mice, 20 and 4 months old, respectively, received either vehicle or a monoclonal antibody that sequesters sclerostin (anti-sclerostin) for 28 days. From days 21 to 28, animals also received sustained administration of the thymidine analog, bromodeoxyuridine (BrdU), which labels the DNA of dividing cells. Animals were then euthanized at day 28 and the femurs were examined for cortical bone formation, bone mineral density, and newly borne BrdU+ cells in the periosteum which is a tissue that is pivotally involved in the formation of new cortical bone. In both the geriatric and young mice, anti-sclerostin induced a significant increase in the thickness of the cortical bone, bone mineral density, and the proliferation of newly borne BrdU+ cells in the periosteum. These results suggest that even in geriatric animals, anti-sclerostin therapy can build new cortical bone and increase the proliferation of osteogenic cells and thus reduce the likelihood of painful age-related bone fractures. © The Author(s) 2016.

  9. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  10. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  11. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... activities from frustrating these processes; to protect the identities and physical safety of confidential...; Department of Homeland Security Transportation Security Administration-023 Workplace Violence Prevention... Administration-023 Workplace Violence Prevention Program System of Records and this proposed rulemaking. In this...

  12. Network layer security and secret key authentication

    OpenAIRE

    Llovet Ureña, Marcel

    2015-01-01

    The goal of this project is to update Von Mann Young Rhee’s book, ‘Internet Security: Cryptographic Principles, Algorithms and Protocols’ which is about network layer security and secret key authentication. It is an extremely important aspect in modern life to have security in the network to protect our information and prevent eavesdroppers or maleficent programs, for example. This is the reason why this project aims to update these kinds of algorithms and hash functions. This project uses me...

  13. Building consensus: development of a Best Practice Guideline (BPG) for surgical site infection (SSI) prevention in high-risk pediatric spine surgery.

    Science.gov (United States)

    Vitale, Michael G; Riedel, Matthew D; Glotzbecker, Michael P; Matsumoto, Hiroko; Roye, David P; Akbarnia, Behrooz A; Anderson, Richard C E; Brockmeyer, Douglas L; Emans, John B; Erickson, Mark; Flynn, John M; Lenke, Lawrence G; Lewis, Stephen J; Luhmann, Scott J; McLeod, Lisa M; Newton, Peter O; Nyquist, Ann-Christine; Richards, B Stephens; Shah, Suken A; Skaggs, David L; Smith, John T; Sponseller, Paul D; Sucato, Daniel J; Zeller, Reinhard D; Saiman, Lisa

    2013-01-01

    Perioperative surgical site infection (SSI) after pediatric spine fusion is a recognized complication with rates between 0.5% and 1.6% in adolescent idiopathic scoliosis and up to 22% in "high risk" patients. Significant variation in the approach to infection prophylaxis has been well documented. The purpose of this initiative is to develop a consensus-based "Best Practice" Guideline (BPG), informed by both the available evidence in the literature and expert opinion, for high-risk pediatric patients undergoing spine fusion. For the purpose of this effort, high risk was defined as anything other than a primary fusion in a patient with idiopathic scoliosis without significant comorbidities. The ultimate goal of this initiative is to decrease the wide variability in SSI prevention strategies in this area, ultimately leading to improved patient outcomes and reduced health care costs. An expert panel composed of 20 pediatric spine surgeons and 3 infectious disease specialists from North America, selected for their extensive experience in the field of pediatric spine surgery, was developed. Using the Delphi process and iterative rounds using a nominal group technique, participants in this panel were as follows: (1) surveyed for current practices; (2) presented with a detailed systematic review of the relevant literature; (3) given the opportunity to voice opinion collectively; and (4) asked to vote regarding preferences privately. Round 1 was conducted using an electronic survey. Initial results were compiled and discussed face-to-face. Round 2 was conducted using the Audience Response System, allowing participants to vote for (strongly support or support) or against inclusion of each intervention. Agreement >80% was considered consensus. Interventions without consensus were discussed and revised, if feasible. Repeat voting for consensus was performed. Consensus was reached to support 14 SSI prevention strategies and all participants agreed to implement the BPG in their

  14. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  15. Broken Mirrors: Tracing Issues in Building Partner Capacity

    Science.gov (United States)

    2016-06-01

    DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Recent U.S. military engagements in fragile states have focused on building security...PAGE INTENTIONALLY LEFT BLANK v ABSTRACT Recent U.S. military engagements in fragile states have focused on building security institutions...10 D. METHODOLOGY ..................................................................................10 1. Environmental Factors

  16. Homeland Security: Air Passenger Prescreening and Counterterrorism

    National Research Council Canada - National Science Library

    Elias, Bart; Krouse, William; Rappaport, Ed

    2005-01-01

    ... of their persons or baggage, or to prevent them from boarding an aircraft in the event of a terrorist watch list hit, is likely to be a difficult proposition for the federal agencies tasked with aviation security...

  17. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  18. Using an opinion poll to build an obesity-prevention social marketing campaign for low-income Asian and Hispanic immigrants: report of findings.

    Science.gov (United States)

    Sugerman, Sharon; Backman, Desiree; Foerster, Susan B; Ghirardelli, Alyssa; Linares, Amanda; Fong, Amy

    2011-01-01

    To gain opinions from low-income, limited-English-speaking Hispanic and Asian immigrants for formative research in a social marketing campaign. Nineteen questions on obesity prevention-related topics were embedded into a larger random digit-dial survey investigating the effects of language and cultural barriers on health care access. Participants were selected by ethnic encoding from consumer databases. California's northern, southern, and Central Valley regions. Nine hundred and five adult Hispanic, Chinese, Vietnamese, Hmong, and Korean Californians from households Media usage, food stamp participation, health insurance, health problems, access and availability of fruits and vegetables (FVs) and physical activity, beliefs about overweight, and related regulation and policy change. Descriptive statistics and percentages for all questions. Latinos reported receiving most information from television; Hmong from radio. Hispanics, Koreans, and Vietnamese thought diabetes was the greatest health issue in California. Among Hmong, 83% thought FVs were too expensive, and 49% of Vietnamese thought good quality, affordable fresh FVs were too hard to find. Identifying characteristics and opinions that distinguish these ethnic immigrant populations better enables the Network for a Healthy California to develop culturally relevant social marketing campaigns and materials. Copyright © 2011 Society for Nutrition Education. Published by Elsevier Inc. All rights reserved.

  19. "Make Sure You're Not Getting Yourself in Trouble:" Building Sexual Relationships and Preventing Sexual Violence at the U.S. Military Academy at West Point.

    Science.gov (United States)

    Arbeit, Miriam R

    2017-10-01

    Sexual violence continues to present a problem on college campuses nationwide and among members of the U.S. military. This study attended to patterns of response in how students (cadets) at the U.S. Military Academy (West Point) discussed sexual and romantic relationships, both potential and actual, in order to examine how, if at all, they enact their sexuality-related values. Constructivist grounded theory was used to analyze semistructured interviews with three male and three female cadets from each of the 4 years of the undergraduate program, in which they are intended to become "leaders of character" who will serve as Army officers. Findings indicated limitations in cadets' access to developing and implementing sexuality-related skills within this context. Cadets' fear and distrust erected barriers to their pursuing their desires; the ways in which cadets avoided getting in trouble for sexual harassment or sexual assault shifted responsibility from a potential perpetrator onto a potential victim; and cadets were caught in dilemmas regarding romantic relationships as sources of both emotional support and social stigma. These findings have implications for promoting gender equity and for preventing sexual violence at this institution and at others like it, including both university campuses and other military settings.

  20. Security issues in a parking facility.

    Science.gov (United States)

    Gutman, Abraham; Lew, I Paul

    2009-01-01

    Active security supported by passive security measures which are part of the physical design of a parking facility are essential to preventing crimes from happening wherever and whenever possible, the authors maintain. In the article, they focus on design elements which can be most effective in discouraging potential perpetrators.

  1. Secure Communication using Identity Based Encryption

    NARCIS (Netherlands)

    Roschke, Sebastian; Ibraimi, L.; Cheng, Feng; Meinel, Christoph

    2010-01-01

    Secured communication has been widely deployed to guarantee confidentiality and integrity of connections over untrusted networks, e.g., the Internet. Although secure connections are designed to prevent attacks on the connection, they hide attacks inside the channel from being analyzed by Intrusion

  2. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  3. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  4. The Effect of a Controlled Perimeter Security System on Crime

    National Research Council Canada - National Science Library

    Rothrock, Martin

    2001-01-01

    The proliferation of gated residential communities in the United States has generated social criticism, but research to assess the expected crime prevention effect of the perimeter security systems...

  5. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  6. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  7. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  8. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology of one party, led to regarding the armed services as harmful to designs for developing civic society and a waste of resources generally...... disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology...

  9. Marital Biography, Social Security Receipt, and Poverty.

    Science.gov (United States)

    Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.

  10. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  11. Security Guarantees and Nuclear Non-Proliferation

    International Nuclear Information System (INIS)

    Bruno Tertrais

    2011-01-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  12. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  13. Assessing Security Cooperation as a Preventive Tool

    Science.gov (United States)

    2014-01-01

    rep. Lebanon South Korea Chad Lesotho Swaziland Chile Liberia Syria China Libya Tajikistan Colombia Macedonia Tanzania Comoros Madagascar Thailand...Because our sample includes only seven cases of full democracies— Chile , Costa Rica, Mauritius, Mongolia, Panama, Trinidad, Tobago, and Uruguay—we were... earthquake by holding the Seismic Vulnerabil- 11 President’s Malaria Initiative, “Funding,” web page, 2011; The U.S. President’s Emer- gency Fund for AIDS

  14. New computer security campaign

    CERN Multimedia

    Alizée Dauvergne

    2010-01-01

    A new campaign is taking shape to promote computer security. The slogan “SEC_RITY is not complete without U!” reminds users of the importance of their contribution. The campaign kicks off on 10 June with a public awareness day in the Council Chamber.   The new campaign, organised by CERN’s computer security team, will focus on prevention and involving the user. “This is an education and awareness-raising campaign for all users at CERN,” explains Stefan Lueders, in charge of computer security. “Every day, we register thousands of computer attacks against CERN: there are attempts to tamper with web pages, hack into user accounts, take over servers, and much more. A successful attack could mean confidential user information being divulged, services being interrupted or data being lost. It could even affect operations at CERN. Another factor is the damage that a successful attack could inflict on the Organization’s reputation. &...

  15. Building Procurement

    DEFF Research Database (Denmark)

    Andersson, Niclas

    2007-01-01

    ‘The procurement of construction work is complex, and a successful outcome frequently elusive’. With this opening phrase of the book, the authors take on the challenging job of explaining the complexity of building procurement. Even though building procurement systems are, and will remain, complex...... despite this excellent book, the knowledge, expertise, well-articulated argument and collection of recent research efforts that are provided by the three authors will help to make project success less elusive. The book constitutes a thorough and comprehensive investigation of building procurement, which......, which gives the book a challenging contribution to the existing body of knowledge....

  16. Museum security and the Thomas Crown Affair.

    Energy Technology Data Exchange (ETDEWEB)

    Michaud, E. C. (Nuclear Engineering Division)

    2010-01-01

    Over the years, I've daydreamed about stealing a Vermeer, a Picasso, or Rembrandt. It tickles me, as much as watching the reboot of The Thomas Crown Affair. Why is it, do you suppose, so much fun to think about stealing a world renowned piece off the wall of a major metropolitan museum? Is it the romantic thoughts of getting away with it, walking past infrared detectors, and pressure sensors ala Indiana Jones with the sack of sand to remove the idol without triggering the security system? Is it the idea of snatching items with such fantastic prices, where the romance of possessing an item of such value is less intoxicating than selling it to a private collector for it to never be seen again? I suspect others share my daydreams as they watch theater or hear of a brazen daylight heist at museums around the world, or from private collections. Though when reality sets in, the mind of the security professional kicks in. How could one do it, why would one do it, what should you do once it's done? The main issue a thief confronts when acquiring unique goods is how to process or fence them. They become very difficult to sell because they are one-of-a-kind, easy to identify, and could lead to the people involved with the theft. The whole issue of museum security takes up an ironic twist when one considers the secretive British street artist 'Banksy'. Banksy has made a name for himself by brazenly putting up interesting pieces of art in broad daylight (though many critics don't consider his work to be art) on building walls, rooftops, or even museums. I bring him up for a interesting take on what may become a trend in museum security. In March of 2005, Banksy snuck a piece of his called 'Vandalized Oil Painting' into the Brooklyn Museum's Great Historical Painting Wing, plus 3 other pieces into major museums in New York. Within several days, 2 paintings had been torn down, but 2 stayed up much longer. In his home country of the UK, a

  17. Smart Buildings: An Introduction to the Library of the Future.

    Science.gov (United States)

    Hoy, Matthew B

    2016-01-01

    Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.

  18. Building Data

    Data.gov (United States)

    Town of Cary, North Carolina — Explore real estate information about buildings in the Town of Cary.This file is created by the Town of Cary GIS Group. It contains data from both the Wake, Chatham...

  19. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  20. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    of Europe, in the early 1920s the prospects for peace looked promising. Under these circumstances, buttressed by pacifism as the logical reaction to the carnage of the Great War, many a Danish politician on the Left believed that the provisions of the Covenant calling for nations to disarm should...... of the Great War, many a Danish politician on the Left believed that the provisions of the Covenant calling for nations to disarm should be implemented, the sooner the better. In order to accelerate peaceful development, and because their armed forces were seen rather as harmful than conducive to security...... to the international milieu and to the European trend towards reconciliation. New issues assumed prominence as a consequence of the post-war quest for peace and prosperity. Reconstruction of society and increased emphasis on welfare measures brought economy into focus of political canvassing. The League of Nations...

  1. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  2. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  3. CLOUD COMPUTING SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Florin OGIGAU-NEAMTIU

    2012-01-01

    Full Text Available The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.

  4. Cyber-crime Science = Crime Science + Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality,

  5. Rethinking EU energy security considering past trends and future prospects

    NARCIS (Netherlands)

    Amineh, Mehdi P.; Crijns - Graus, Wina

    2014-01-01

    EU energy policy objectives are directed at three highly interdependent areas: energy supply security, competitiveness and decarbonization to prevent climate change. In this paper, we focus on the issue of energy supply security. Security of energy supply for the immediate and medium-term future is

  6. Information Security for Business: the Necessity of Reputational Risk Management

    Directory of Open Access Journals (Sweden)

    Vitaly Eduardovich Dorokhov

    2015-06-01

    Full Text Available The article presents the analysis of actual information security problems in commercial segment. The main directions in regulations of the Russian Federation connected with information security assurance are defined. The results indicate the insufficiency of legal regulation in prevention of reputational losses due to information security incidents

  7. Structural building screening and evaluation

    Science.gov (United States)

    Kurniawandy, Alex; Nakazawa, Shoji; Hendry, Andy; Ridwan, Firdaus, Rahmatul

    2017-10-01

    An earthquake is a disaster that can be harmful to the community, such as financial loss and also dead injuries. Pekanbaru is a city that located in the middle of Sumatera Island. Even though the city of Pekanbaru is a city that rarely occurs earthquake, but Pekanbaru has ever felt the impact of the big earthquake that occurred in West Sumatera on September 2009. As we know, Indonesia located between Eurasia plate, Pacific plate, and Indo-Australian plate. Particularly the Sumatera Island, It has the Semangko fault or the great Sumatra fault along the island from north to south due to the shift of Eurasia and Indo-Australian Plates. An earthquake is not killing people but the building around the people that could be killing them. The failure of the building can be early prevented by doing an evaluation. In this research, the methods of evaluation have used a guideline for the Federal Emergency Management Agency (FEMA) P-154 and Applied Technology Council (ATC) 40. FEMA P-154 is a rapid visual screening of buildings for potential seismic hazards and ATC-40 is seismic evaluation and retrofit of Concrete Buildings. ATC-40 is a more complex evaluation rather than FEMA P-154. The samples to be evaluated are taken in the surroundings of Universitas Riau facility in Pekanbaru. There are four buildings as case study such as the rent student building, the building of mathematics and natural science faculty, the building teacher training and education faculty and the buildings in the faculty of Social political sciences. Vulnerability for every building facing an earthquake is different, this is depending on structural and non-structural components of the building. Among all of the samples, only the building of mathematics and the natural science faculty is in critical condition according to the FEMA P-154 evaluation. Furthermore, the results of evaluation using ATC-40 for the teacher training building are in damage control conditions, despite the other three buildings are

  8. Building a capacity building manual

    CSIR Research Space (South Africa)

    Clinton, DD

    2010-02-01

    Full Text Available ? Capacity building in developed nations ? renewal stage HOW can capacity be developed and maintained? Through mentoring , training, education, physical projects, the infusion of financial and other resources and more importantly the motivation...

  9. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  10. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  11. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  12. Crisis management and crisis prevention

    International Nuclear Information System (INIS)

    Wallensteen, P.

    1988-01-01

    This paper reports that many proposals have come forth to ease the tension between East and West. Some focus on arms developments, others take up diplomatic issues. In addition, some have raised the question of crisis management and crisis prevention. Can crises be prevented even before they have taken place? The Palme Commission on Disarmament and Security suggested, in its 1982 report, ways of restraining superpower involvement in Third World conflicts. Such conflicts, it was argued, could escalate and ultimately result in nuclear confrontation between the United States and the Soviet Union. Certainly, the commission also paid attention to conflicts over issues in Europe and to problems in Eastern or in Western Europe. However, the commission raised a question that lately has received increasing attention: the dangers of superpower confrontation over Third World issues. In his statement to the United Nations on 24 October 1985, President Regan pointed to the need for settling regional conflicts as they play a large role in building suspicions and tensions. Regan's initiative explicitly concerned Afghanistan, Cambodia, Ethiopia, Angola and Nicaragua. It included negotiations with the Soviet Union over Afghanistan, and, at a later stage, also over other issues. The goal, he the, was not to force a settlement on the parties. The initiative concerned issues that have for the American public, justified armaments and reduced Soviet credibility

  13. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer; Serafino, Nina M

    2004-01-01

    .... In Iraq, private companies are currently providing security services such as the protection of individuals, nonmilitary transport convoys, buildings, and other economic infrastructure, as well...

  14. USMILGP Colombia: Transforming Security Cooperation in the Global War on Terrorism

    National Research Council Canada - National Science Library

    Muller, Christopher W

    2006-01-01

    .... As exemplified in Colombia, Security Assistance Organizations must build and increase the capabilities of our partner nations' militaries and be prepared to rapidly expand to support a partner...

  15. Competence Building

    DEFF Research Database (Denmark)

    Borrás, Susana; Edquist, Charles

    The main question that guides this paper is how governments are focusing (and must focus) on competence building (education and training) when designing and implementing innovation policies. With this approach, the paper aims at filling the gap between the existing literature on competences...... on the one hand, and the real world of innovation policy-making on the other, typically not speaking to each other. With this purpose in mind, this paper discusses the role of competences and competence-building in the innovation process from a perspective of innovation systems; it examines how governments...... and public agencies in different countries and different times have actually approached the issue of building, maintaining and using competences in their innovation systems; it examines what are the critical and most important issues at stake from the point of view of innovation policy, looking particularly...

  16. ECONOMY "SMART BUILDINGS" HOUSING

    Directory of Open Access Journals (Sweden)

    Stanka Djurić

    2017-01-01

    Full Text Available In terms of ensuring national security and the security of energy supply and energy sources, such as liquid fuels and gas, as well as energy independence from energy imports and energy, the focus of our strategy to shift towards renewable energy sources. In fact, whether a state of more or less energy-independent, to a large extent can be determined by the percentage participation renewable energy in meeting the total energy requirements. So, the consumption of renewable energy source (solar energy, wind energy, geothermal energy, hydropower and small watercourses, biomass and biogas is put in relation with the amount of power and energy which are imported from foreign countries (liquid fuels and gas. Based on data published by the European statistics agency, in developed European countries is the fact that renewable energy sources accounted for 10-12% of the total energy balance of individual countries. Here, the situation is very worrying, given that renewable energy resources still account for only 1% in the energy balance, which is negligible and intolerable little. On the other hand, environmental awareness that is constantly improving and developing required to behave and act in accordance with the capabilities and resources of nature and the natural environment. As the largest building and construction consume energy and also the biggest polluters of the environment, point to the request to change the method of construction and thus to change the way of life on the planet. Poor and inadequate access to the building and construction industry certainly is recognized as the most important factor in global warming. The progress of civilization, especially in terms of technical and technological innovation brings the design and construction of facilities that will be compatible with the environment. For designers and investors is to develop, design and build "green".

  17. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  18. Secure or Insure: An Economic Analysis of Security Interdependencies and Investment Types

    Science.gov (United States)

    Grossklags, Jens

    2009-01-01

    Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…

  19. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  20. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  1. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  2. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  3. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  4. Design Principles for Security

    National Research Council Canada - National Science Library

    Benzel, Terry V; Irvine, Cynthia E; Levin, Timothy E; Bhaskara, Ganesha; Nguyen, Thuy D; Clark, Paul C

    2005-01-01

    As a prelude to the clean-slate design for the SecureCore project, the fundamental security principles from more than four decades of research and development in information security technology were reviewed...

  5. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  6. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  7. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  8. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  9. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  10. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  11. Cyber-crime Science = Crime Science + Information Security

    OpenAIRE

    Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empi...

  12. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  13. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  14. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  15. Perspectives on the International and Internal Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2015-01-01

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime

  16. Crime prevention by urban planning and building

    DEFF Research Database (Denmark)

    Grønlund, Bo; Soomeren, Paul van

    2001-01-01

    Forslag til europæisk normtekst færdiggjort i marts/april 2002. Om kriminalpræventiv by- og bebyggelsesplanlægning. Indfaldsvikler, procesforløb, og gode råd for en række forskellige områdetyper, bl.a. bycentre, boligområder, parker....

  17. Proposal of secure camera-based radiation warning system for nuclear detection

    International Nuclear Information System (INIS)

    Tsuchiya, Ken'ichi; Kurosawa, Kenji; Akiba, Norimitsu; Kakuda, Hidetoshi; Imoto, Daisuke; Hirabayashi, Manato; Kuroki, Kenro

    2016-01-01

    Counter-terrorisms against radiological and nuclear threat are significant issues toward Tokyo 2020 Olympic and Paralympic Games. In terms of cost benefit, it is not easy to build a warning system for nuclear detection to prevent a Dirty Bomb attack (dispersion of radioactive materials using a conventional explosive) or a Silent Source attack (hidden radioactive materials) from occurring. We propose a nuclear detection system using the installed secure cameras. We describe a method to estimate radiation dose from noise pattern in CCD images caused by radiation. Some dosimeters under neutron and gamma-ray irradiations (0.1mSv-100mSv) were taken in CCD video camera. We confirmed amount of noise in CCD images increased in radiation exposure. The radiation detection using CMOS in secure cameras or cell phones has been implemented. However, in this presentation, we propose a warning system including neutron detection to search shielded nuclear materials or radiation exposure devices using criticality. (author)

  18. International cooperation and security in the field of nuclear energy in Armenia

    International Nuclear Information System (INIS)

    Khachatryan, D.A.; Avagyan, A.A.; Stepanyan, V.E.

    2010-01-01

    In the report presented/discussed are the ecological-humanitarian disasters and the related policy of the international organizations, especially IAEA, NATO and others on ensuring security of vital activity of people in the sphere of energy and particularly nuclear energy. Possessing the only nuclear power station in Trans Caucasus and the store of toxic wastes of reactive fuel the Government of Armenia and the Ministry of Emergency Situations of the Republic of Armenia always take into consideration the many-sided aspects of prevention, warning about accident in energy buildings including nuclear accidents and modern response in case of occurring the latter ensuring security for ANPP personnel and the inhabitants of the settlements of the possible contingency zone. In their daily activity the workers of the Emergency Situations of the Republic of Armenia, especially those of the Armenian Rescue Service base on the experience and logistic support of international community some aspects of which are presented below

  19. Cyber security best practices for the nuclear industry

    International Nuclear Information System (INIS)

    Badr, I.

    2012-01-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  20. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  1. Building Bridges

    DEFF Research Database (Denmark)

    The report Building Bridges adresses the questions why, how and for whom academic audience research has public value, from the different points of view of the four working groups in the COST Action IS0906 Transforming Audiences, Transforming Societies – “New Media Genres, Media Literacy and Trust...

  2. Competence Building

    DEFF Research Database (Denmark)

    Borrás, Susana; Edquist, Charles

    on the one hand, and the real world of innovation policy-making on the other, typically not speaking to each other. With this purpose in mind, this paper discusses the role of competences and competence-building in the innovation process from a perspective of innovation systems; it examines how governments...

  3. Building Sandcastles

    DEFF Research Database (Denmark)

    Jensen, Steffen Moltrup Ernø; Korsgaard, Steffen; Shumar, Wes

    of entrepreneurship education. Our theoretical and methodological approach builds on Actor-Network Theory. The empirical settings of our study consist of two entrepreneurship courses which differ in terms of temporal extension and physical setting. Data is collected using observation and interview techniques. Our...

  4. Sustainable Buildings

    DEFF Research Database (Denmark)

    Tommerup, Henrik M.; Elle, Morten

    The scientific community agrees that: all countries must drastically and rapidly reduce their CO2 emissions and that energy efficient houses play a decisive role in this. The general attitude at the workshop on Sustainable Buildings was that we face large and serious climate change problems...

  5. Existing buildings

    DEFF Research Database (Denmark)

    Gram-Hanssen, Kirsten

    2014-01-01

    their homes. These policy measures include building regulations, energy tax and different types of incentives and information dissemination. The conclusion calls for new and innovative policy measures to cope with the realities of renovations of owner-occupied houses and how energy efficiency improvement...

  6. 21 CFR 1301.71 - Security requirements generally.

    Science.gov (United States)

    2010-04-01

    ... buildings; (6) The type of vault, safe, and secure enclosures or other storage system (e.g., automatic...) The adequacy of key control systems and/or combination lock control systems; (9) The adequacy of...

  7. Improving the United States National Security Strategy: An Informed Public

    National Research Council Canada - National Science Library

    Malackowski, Patrick C

    2005-01-01

    .... This paper discusses the need to have the President build an information and communications strategy that keeps the American public informed and cognizant of the threat to our national security...

  8. Making Liberia Safe: Transformation of the National Security Sector

    National Research Council Canada - National Science Library

    Gompert, David C; Oliker, Olga; Stearns, Brooke; Crane, Keith; Riley, K. J

    2007-01-01

    .... The government of President Ellen Johnson Sirleaf has made security sector transformation a high priority, and the United Nations, the United States, and others are helping Liberia build new forces...

  9. Intelligent Monitoring System on Prediction of Building Damage Index using Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Reni Suryanita

    2012-03-01

    Full Text Available An earthquake potentially destroys a tall building. The building damage can be indexed by FEMA into three categories namely Immediate Occupancy (IO, Life Safety (LS, and Collapse Prevention (CP. To determine the damage index, the building model has been simulated into structure analysis software. Acceleration data has been analyzed using non linear method in structure analysis program. The earthquake load is time history at surface, PGA=0105g. This work proposes an intelligent monitoring system utilizing Artificial Neural Network to predict the building damage index. The system also provides an alert system and notification to inform the status of the damage. Data learning is trained on ANN utilizing feed forward and back propagation algorithm. The alert system is designed to be able to activate the alarm sound, view the alert bar or text, and send notification via email to the security or management. The system is tested using sample data represented in three conditions involving IO, LS, and CP. The results show that the proposed intelligent monitoring system could provide prediction of up to 92% rate of accuracy and activate the alert. Implementation of the system in building monitoring would allow for rapid, intelligent and accurate prediction of the building damage index due to earthquake.

  10. Secure Multiparty Quantum Computation for Summation and Multiplication.

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-21

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  11. American Nation Building in Afghanistan

    Science.gov (United States)

    2009-04-18

    bribes , narcotics money, and several the West has 16 never conceived. Corruption cannot be eliminated; it cannot in the US and it will not in Afghanistan...maintain separate and individual agendas that impede coordinated nation building efforts. Corruption is wide spread and threatens national security and...the government legitimacy. Little or no oversight of government activities provides minimal opportunity to mitigate corruption . Implementation of

  12. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  13. Security Alarm for Motorcycle

    Directory of Open Access Journals (Sweden)

    Ismail Ismail

    2015-11-01

    Full Text Available A security alarm for motorcycle has been developed. This equipment consists of two parts. Part one is as a remote control, where it produces a radio signal with frequency of 37.5 MHz to turn on (activate or to turn off alarm. Part two consists of sensor, receiver to receive signal from part one, and alarm. This part two will be attached to motorcycle while part one will be kept as a key by the owner of motorcycle. This equipment has been tested in the laboratory and it worked well. When part two is activated by pushing the “set button” in part one, then any movement of part two (as a movement of motor cycle by about 20 cm from initial position will cause the alarm sounds continuously. The alarm will be off whenever the “reset button” in part one is pushed. Part one (a remote control can activate part two with a maximum of twelve meter separation apart. This shows that the equipment can be used as a security alarm to prevent the motorcycle to be stolen in the future.

  14. SMART SECURITY SYSTEM FOR CARS

    OpenAIRE

    Akshay V. Balki*, Ankit A. Ramteke, Akshay Dhankar, Prof. Nilesh S. Panchbudhe

    2017-01-01

    This propose work is an attempt to model design an smart advance vehicle security system that uses biometric scanner and RFID card reader to give ignition pulse using two main module and to prevent theft. The system contains biometric scanner, RFID card reader, alcohol sensor, vibration sensor, GSM module, microcontroller (8051), relay switch, high voltage mesh..The safety of car is exceptionally essential. It provides pulse to ignition system by synchronizing driver’s data from license and t...

  15. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  16. Radon-safe building in Finland

    International Nuclear Information System (INIS)

    Ravea, T.; Arvela, H.

    1997-05-01

    The study concentrates on radon-safe building in Finnish low-rise residential buildings. The data regarding the preventive measures taken in 300 dwellings was obtained from a questionnaire study. The study also aims at finding the main defects in design and implementation and how the guidance given on radon-safe building has been followed. A reference value was estimated for each of the houses on the basis of former local indoor radon measurements in houses with no preventive measures. Geological and building aspects were considered when estimating the reference values. (12 refs.)

  17. QUAIL: A Quantitative Security Analyzer for Imperative Code

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Wasowski, Andrzej; Traonouez, Louis-Marie

    2013-01-01

    Quantitative security analysis evaluates and compares how effectively a system protects its secret data. We introduce QUAIL, the first tool able to perform an arbitrary-precision quantitative analysis of the security of a system depending on private information. QUAIL builds a Markov Chain model ...... the safety of randomized protocols depending on secret data, allowing to verify a security protocol’s effectiveness. We experiment with a few examples and show that QUAIL’s security analysis is more accurate and revealing than results of other tools......Quantitative security analysis evaluates and compares how effectively a system protects its secret data. We introduce QUAIL, the first tool able to perform an arbitrary-precision quantitative analysis of the security of a system depending on private information. QUAIL builds a Markov Chain model...

  18. On security arguments of the second round SHA-3 candidates

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2012-01-01

    of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments...... for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions for the second round candidates...... and review arguments and bounds against classes of differential attacks.We discuss all the SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential attacks. Additionally, we generalize the well-known proof of collision resistance...

  19. Research Award: Agriculture and Food Security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    2013-08-07

    Aug 7, 2013 ... Knowledge of any South Asian language an asset. Your research proposal should demonstrate the intenon to explore linkages between gender, agriculture, nutrion, and food security, have a clear commitment to AFS' methodological building blocks (e.g., mulstakeholder parcipa‐ on, transdisciplinarity) ...

  20. Political and security issues in the Asia-Pacific region: Assessment of trends

    International Nuclear Information System (INIS)

    Lehmann, R.F. II

    1992-01-01

    It should be emphasized that the fundamental shift has taken place in international relations, away from a world dominated by the bipolar super-Power confrontation. There is a today to be more concerned about regional instabilities, which are made more threatening by the potential proliferation of weapons of mass destruction. Just as every nation was affected by the cold war, regional instabilities and proliferation concern each member of the world community. In the Asia-Pacific region, the goal is clear: safer, more stable military postures; transparency and confidence-building; and stronger non-proliferation norms. In working together towards that goal, there is a need to foster greater security through bilateral and multilateral dialogue. In that way, one could promote the change within and among societies; that is the best hope for defusing regional tensions, preventing the spread of weapons of mass destruction, and building a lasting peace

  1. Climate change, nuclear risks and nuclear disarmament. From security threats to sustainable peace

    International Nuclear Information System (INIS)

    Scheffran, Juergen

    2009-01-01

    In the future, nuclear and climate risks may interfere with each other in a mutually enforcing way. Con-flicts induced by climate change could contribute to global insecurity and create more incentives for states to rely on military force, including nuclear weapons. Rather than being a direct cause of war, cli-mate change significantly affects the delicate balance between social and environmental systems in a way that could undermine human security and societal stability with potentially grave consequences for international security. Increased reliance on nuclear energy to reduce carbon emissions will contribute to the risks of nuclear proliferation. A renewed nuclear arms race would consume considerable resources and undermine the conditions for tackling the problem of climate change in a cooperative manner. Nuclear war itself would severely destabilize human societies and the environment, not to speak of the possibility of a nuclear winter that would disrupt the atmosphere. On the other hand, finding solutions to one problem area could help to find solutions in the other. Pre-venting the dangers of climate change and nuclear war requires an integrated set of strategies that ad-dress the causes as well as the impacts on the natural and social environment. Institutions are needed to strengthen common, ecological and human security, build and reinforce conflict-resolution mechanisms and low-carbon energy alternatives, and create sustainable lifecycles that respect the capabilities of the living world. This article examines the linkages between nuclear and climate risks, identifies areas where both threats converge, and offers an approach to move from living under these security threats to building sustain-able peace. By bringing to light the multidimensional interplay between climate change, nuclear risks and nuclear disarmament, this study aims to help the reader grasp their interconnectedness and recognize its critical implications for the strategic security

  2. The economics of energy security

    International Nuclear Information System (INIS)

    Bohi, D.R.; Toman, M.A.; Walls, M.A.

    1996-01-01

    The results of research on energy security that has been conducted over the past 20 years are brought together and expanded. Chapter 2 lays out basic conceptual arguments regarding the economic externalities and the military premium, as well as the general problem of identifying a market failure. Chapter 3 provides a brief history of the oil price shocks of the 1970s and reviews the empirical evidence on the energy security externalities laid out in Chapter 2. Chapter 4 builds on the material in Chapter 3 to critique published estimates of the overall premium associated with oil imports or oil consumption. Chapter 5 examines how the oil market has changed in the twenty years since the first oil shock of the 1970s and assesses the effect of these changes on price behavior and market efficiency. Chapters 6 and 7 focus on two sectors in which the energy security debate is being carried out through concrete policy measures: the choice of electricity generation technology and the market for transportation fuels. In Chapter 8, we summarize our assessments of potential energy security externalities and examine their implications for a variety of policy measures at the national and subnational levels. 7 figs., 11 tabs., 200 refs

  3. Guidelines for Building Science Education

    Energy Technology Data Exchange (ETDEWEB)

    Metzger, Cheryn E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rashkin, Samuel [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huelman, Pat [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-11-01

    The U.S. Department of Energy’s (DOE) residential research and demonstration program, Building America, has triumphed through 20 years of innovation. Partnering with researchers, builders, remodelers, and manufacturers to develop innovative processes like advanced framing and ventilation standards, Building America has proven an energy efficient design can be more cost effective, healthy, and durable than a standard house. As Building America partners continue to achieve their stretch goals, they have found that the barrier to true market transformation for high performance homes is the limited knowledge-base of the professionals working in the building industry. With dozens of professionals taking part in the design and execution of building and selling homes, each person should have basic building science knowledge relevant to their role, and an understanding of how various home components interface with each other. Instead, our industry typically experiences a fragmented approach to home building and design. After obtaining important input from stakeholders at the Building Science Education Kick-Off Meeting, DOE created a building science education strategy addressing education issues preventing the widespread adoption of high performance homes. This strategy targets the next generation and provides valuable guidance for the current workforce. The initiative includes: • Race to Zero Student Design Competition: Engages universities and provides students who will be the next generation of architects, engineers, construction managers and entrepreneurs with the necessary skills and experience they need to begin careers in clean energy and generate creative solutions to real world problems. • Building Science to Sales Translator: Simplifies building science into compelling sales language and tools to sell high performance homes to their customers. • Building Science Education Guidance: Brings together industry and academia to solve problems related to

  4. Building economics

    DEFF Research Database (Denmark)

    Pedersen, D.O.(red.)

    Publikationen er på engelsk. Den omfatter alle indlæg på det fjerde internationale symposium om byggeøkonomi, der blev arrangeret af SBI for det internationale byggeforskningsråd CIB. De fem bind omhandler: Methods of Economic Evaluation, Design Optimization, Ressource Utilization, The Building...... Market og Economics and Technological Forecasting in Construction. Et indledende bind bringer statusrapporter for de fem forskningsområder, og det sidste bind sammenfatter debatten på symposiet....

  5. Security and Peace Mechanisms for Good Governance in Nigeria ...

    African Journals Online (AJOL)

    In Nigeria, governments at all levels have intensified efforts to address issues bordering on insecurity with a view to building security and peace for good governance. It is however, disheartening that despite various security measures put in place to tackle the problem, Nigeria is yet to be free from recurrent cases of armed ...

  6. Toward a Regional Security Architecture for the Horn of Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Moreover, conflict in one country tends to affect its neighbours, mainly through the flow of refugees and weapons. Building on work carried out during Phase I ... Extrants. Rapports. Towards Developing a Regional Security Architecture for the Horn of Africa: Developing Responses to Human (In) Security-Phase Two ...

  7. Quantum cryptography to satellites for global secure key distribution

    Science.gov (United States)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  8. Privatisation, human rights and security: Reflections on the Draft ...

    African Journals Online (AJOL)

    User

    525, 526. 34 Montreux Document, para 9. Military and security services are further defined to include “armed guarding and protection of persons and objects, such as convoys, buildings and other places; maintenance and operation of weapons systems; prisoner detention; and advice to or training of local forces and security ...

  9. Solutions for a food-secure future | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-05

    Oct 5, 2016 ... Agriculture and food security: Investing in solutions that work. woman cutting wheat in Ethiopia. Improving food security and nutrition through research. Through partnerships, IDRC is helping build more effective agricultural systems, produce more nutritious food, and create economic opportunities for ...

  10. Design and development of a password- based door lock security ...

    African Journals Online (AJOL)

    This work is a design and development of a micro-controller based, password enabled door lock for home security. The work involved building a working model of a security door lock that is password protected with an AT89C52 microcontroller which operates by sending control signals to a H-bridge that controls the ...

  11. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  12. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  13. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  14. A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach

    OpenAIRE

    Irvine, Cynthia E.; Levin, Timothy E.

    2003-01-01

    A doctoral program in computer science with a specialization in information security is described. The focus of the program is constructive security. Key elements of the program are the strong computer science core upon which it builds, coursework on the theory and principles of information assurance, and a unifying research project. The doctoral candidate is a member of the project team, whose research contributes to the goals of the project and to fundamental advancements in high assurance ...

  15. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  16. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  17. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  18. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  19. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  20. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...