WorldWideScience

Sample records for providing water security

  1. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  2. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  3. Risk to Water Security on Small Islands

    Science.gov (United States)

    Holding, S. T.; Allen, D. M.

    2013-12-01

    The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map

  4. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  5. Measuring global water security towards sustainable development goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  6. Domestic water and sanitation as water security: monitoring, concepts and strategy

    Science.gov (United States)

    Bradley, David J.; Bartram, Jamie K.

    2013-01-01

    Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628

  7. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  8. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  9. Child rights, right to water and sanitation, and human security.

    Science.gov (United States)

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.

  10. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  11. Economic sustainability, water security and multi-level governance of local water schemes in Nepal

    Directory of Open Access Journals (Sweden)

    Emma Hakala

    2017-07-01

    Full Text Available This article explores the role of multi-level governance and power structures in local water security through a case study of the Nawalparasi district in Nepal. It focuses on economic sustainability as a measure to address water security, placing this thematic in the context of a complicated power structure consisting of local, district and national administration as well as external development cooperation actors. The study aims to find out whether efforts to improve the economic sustainability of water schemes have contributed to water security at the local level. In addition, it will consider the interactions between water security, power structures and local equality and justice. The research builds upon survey data from the Nepalese districts of Nawalparasi and Palpa, and a case study based on interviews and observation in Nawalparasi. The survey was performed in water schemes built within a Finnish development cooperation programme spanning from 1990 to 2004, allowing a consideration of the long-term sustainability of water management projects. This adds a crucial external influence into the intra-state power structures shaping water management in Nepal. The article thus provides an alternative perspective to cross-regional water security through a discussion combining transnational involvement with national and local points of view.

  12. Economic performance of water storage capacity expansion for food security

    Science.gov (United States)

    Gohar, Abdelaziz A.; Ward, Frank A.; Amer, Saud A.

    2013-03-01

    SummaryContinued climate variability, population growth, and rising food prices present ongoing challenges for achieving food and water security in poor countries that lack adequate water infrastructure. Undeveloped storage infrastructure presents a special challenge in northern Afghanistan, where food security is undermined by highly variable water supplies, inefficient water allocation rules, and a damaged irrigation system due three decades of war and conflict. Little peer-reviewed research to date has analyzed the economic benefits of water storage capacity expansions as a mechanism to sustain food security over long periods of variable climate and growing food demands needed to feed growing populations. This paper develops and applies an integrated water resources management framework that analyzes impacts of storage capacity expansions for sustaining farm income and food security in the face of highly fluctuating water supplies. Findings illustrate that in Afghanistan's Balkh Basin, total farm income and food security from crop irrigation increase, but at a declining rate as water storage capacity increases from zero to an amount equal to six times the basin's long term water supply. Total farm income increases by 21%, 41%, and 42% for small, medium, and large reservoir capacity, respectively, compared to the existing irrigation system unassisted by reservoir storage capacity. Results provide a framework to target water infrastructure investments that improve food security for river basins in the world's dry regions with low existing storage capacity that face ongoing climate variability and increased demands for food security for growing populations.

  13. The Connotation and Extension of Agricultural Water Resources Security

    Institute of Scientific and Technical Information of China (English)

    LIU Bu-chun; MEI Xu-rong; LI Yu-zhong; YANG You-lu

    2007-01-01

    The objective of this study is to define agricultural water resources security and its connotation and extension. The definitions of water security, water resources security, and water environment security were summarized, and their relationship was differentiated and analyzed. Based on these, the elements of the conception of agricultural water resources security were hashed and the conception was defined. Agricultural water resources security is the provision of water resource that ensures protection of agriculture against threat, hazards, destruction, and loss. Moreover, the connotation and extension of agricultural water resources security were ascertained. In detail, the connotation of the definition has natural attributes, socioeconomic attributes, and cultural attributes. The extensions of agricultural water resources security include both broad and narrow ones, as well as, food security, agroenvironmental security, agroeconomic security, rural society security, etc. The definition will serve as the frame of reference for developing the researches, limiting the frame of the theory, and founding a appraising system for agricultural water resources security.

  14. Ideas towards sustainable water security

    Science.gov (United States)

    Dalin, Carole

    2016-04-01

    With growing global demands and a changing climate, ensuring water security - the access to sufficient, quality water resources for health and livelihoods and an acceptable level of water related risk - is increasingly challenging. While a billion people still lack access to water, over-exploitation of this resource increases in many developed and developing parts of the world. While some solutions to water stress have been known for a long time, financial, cultural and political barriers often prevent their implementations. This talk will highlight three crucial areas that need to be addressed to progress towards sustainable water security. The first point is on scale, the second on the agricultural sector and irrigation, and the third on food trade and policy.

  15. Water availability and management for food security

    Science.gov (United States)

    Food security is directly linked to water security for food production. Water availability for crop production will be dependent upon precipitation or irrigation, soil water holding capacity, and crop water demand. The linkages among these components in rainfed agricultural systems shows the impact ...

  16. A blue/green water-based accounting framework for assessment of water security

    Science.gov (United States)

    Rodrigues, Dulce B. B.; Gupta, Hoshin V.; Mendiondo, Eduardo M.

    2014-09-01

    A comprehensive assessment of water security can incorporate several water-related concepts, while accounting for Blue and Green Water (BW and GW) types defined in accordance with the hydrological processes involved. Here we demonstrate how a quantitative analysis of provision probability and use of BW and GW can be conducted, so as to provide indicators of water scarcity and vulnerability at the basin level. To illustrate the approach, we use the Soil and Water Assessment Tool (SWAT) to model the hydrology of an agricultural basin (291 km2) within the Cantareira Water Supply System in Brazil. To provide a more comprehensive basis for decision making, we analyze the BW and GW-Footprint components against probabilistic levels (50th and 30th percentile) of freshwater availability for human activities, during a 23 year period. Several contrasting situations of BW provision are distinguished, using different hydrological-based methodologies for specifying monthly Environmental Flow Requirements (EFRs), and the risk of natural EFR violation is evaluated by use of a freshwater provision index. Our results reveal clear spatial and temporal patterns of water scarcity and vulnerability levels within the basin. Taking into account conservation targets for the basin, it appears that the more restrictive EFR methods are more appropriate than the method currently employed at the study basin. The blue/green water-based accounting framework developed here provides a useful integration of hydrologic, ecosystem and human needs information on a monthly basis, thereby improving our understanding of how and where water-related threats to human and aquatic ecosystem security can arise.

  17. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  18. Security of water treatment facilities

    Energy Technology Data Exchange (ETDEWEB)

    Forsha, C.A. [Univ. of Pittsburgh at Johnstown, Johnstowne, PA (United States)

    2002-06-15

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  19. Security of water treatment facilities

    International Nuclear Information System (INIS)

    Forsha, C.A.

    2002-01-01

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  20. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  1. Dual-Level Material and Psychological Assessment of Urban Water Security in a Water-Stressed Coastal City

    Directory of Open Access Journals (Sweden)

    Yajing Huang

    2015-04-01

    Full Text Available The acceleration of urbanization and industrialization has been gradually aggravating water security issues, such as water shortages, water pollution, and flooding or drought disasters and so on. Water security issues have become a great challenge to urban sustainable development. In this context, we proposed a dual-level material and psychological assessment method to assess urban water security. Psychological security coefficients were introduced in this method to combine material security and residents’ security feelings. A typical water-stressed coastal city in China (Dalian was chosen as a case study. The water security status of Dalian from 2010 to 2012 was analysed dynamically. The results indicated that the Dalian water security statuses from 2010 to 2012 were basically secure, but solutions to improve water security status and solve water resource problems are still required. This dual-level material and psychological assessment for urban water security has improved conventional material assessment through the introduction of psychological security coefficients, which can benefit decision-making for urban water planning, management and protection.

  2. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  3. Desalination and Water Security: The Promise and Perils of a Technological Fix to the Water Crisis in Baja California Sur, Mexico

    Directory of Open Access Journals (Sweden)

    Jamie McEvoy

    2014-10-01

    Full Text Available Across the globe, desalination is increasingly being considered as a new water supply source. This article examines how the introduction of desalinated water into the municipal water supply portfolio has affected water security in the coastal tourist city of Cabo San Lucas in Baja California Sur (BCS, Mexico. It also analyses the competing discourses surrounding desalination in the region and discusses alternative water management options for achieving water security. This article challenges the notion that desalination is an appropriate and sufficient technological solution for arid regions. The findings provide evidence of increased yet delimited water security at a neighbourhood scale while identifying new vulnerabilities related to desalination, particularly in the context of the global South. This article concludes that implementing a technological fix on top of a water management system that is plagued with more systemic and structural problems does little to improve long-term water management and is likely to foreclose or forestall other water management options. This multi-scalar analysis contributes to the emerging literature on water security by considering both a narrow and broad framing of water security and identifying a range of factors that influence water security.

  4. The EU as an international security provider

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen; Wolff, Stefan; Whitman, Richard

    2015-01-01

    This contribution develops a framework of analysis that covers the actors involved in the policy making process of international security provision, the dynamics of this process itself, its outcomes (concrete strategies and policies) and their impact. Our efforts to establish such a framework...... of analysis, which could serve as the foundation for a mid-range theory of the EU as an international security provider, will examine the relevance of, and apply, existing theories of international relations/international security and foreign policy analysis to the specific case of the EU. The framework...... that will emerge from this analysis will then be tested and applied empirically in the following contributions that focus on how particular policies are formulated and implemented, and that analyse, in single and comparative case studies, the impact and effectiveness of the EU as an international security provider....

  5. Conceptual framework to ensure water security in Ukraine

    Science.gov (United States)

    Gadzalo, Yaroslav; Romashchenko, Mykhailo; Yatsiuk, Mykhailo

    2018-02-01

    As a result of global climate change against the background of natural water supply deterioration and river water content reductions, nowadays Ukraine is facing the problem of environmental degradation of river basins. In light of this, we suggest that achieving an acceptable level of water security in Ukraine should be defined as the strategic objective of national water policy. The state of national water security should be evaluated by its progress in certain sectors. The basic principles of the new water policy of Ukraine are supposed to be represented in Water Strategy of Ukraine. Integrated water management by the basin principle should serve as the main tool for achieving the objectives of water security.

  6. Water Security and Services in the Caribbean

    Directory of Open Access Journals (Sweden)

    Adrian Cashman

    2014-05-01

    Full Text Available The efficient management of water resources and services continues to be a concern in many of the small island states of the Caribbean. There are growing concerns over the ability of governments in the region to ensure the good management and provision of water without jeopardizing economic growth and the maintenance of social well-being. This paper provides an overview of the major factors influencing the water security facing the Caribbean Region and how the emerging concerns are being addressed. The key challenges and vulnerabilities may be summarized as lack of data and barriers to making available what information there is. Forward planning has been largely neglected and is symptomatic of a lack of appreciation of the need for having national water policies. In this respect Jamaica’s development of a national master water plan serves as a good example of what is needed. Water service providers have to be efficient, well managed and allowed to do their job. This means that they have to be on a sound financial footing. The challenge is to find the balance between appropriate political and regulatory oversight and the autonomy of water managers and service providers.

  7. Optimal Allocation of Water Resources Based on Water Supply Security

    Directory of Open Access Journals (Sweden)

    Jianhua Wang

    2016-06-01

    Full Text Available Under the combined impacts of climate change and human activities, a series of water issues, such as water shortages, have arisen all over the world. According to current studies in Science and Nature, water security has become a frontier critical topic. Water supply security (WSS, which is the state of water resources and their capacity and their capacity to meet the demand of water users by water supply systems, is an important part of water security. Currently, WSS is affected by the amount of water resources, water supply projects, water quality and water management. Water shortages have also led to water supply insecurity. WSS is now evaluated based on the balance of the supply and demand under a single water resources condition without considering the dynamics of the varying conditions of water resources each year. This paper developed an optimal allocation model for water resources that can realize the optimal allocation of regional water resources and comprehensively evaluate WSS. The objective of this model is to minimize the duration of water shortages in the long term, as characterized by the Water Supply Security Index (WSSI, which is the assessment value of WSS, a larger WSSI value indicates better results. In addition, the simulation results of the model can determine the change process and dynamic evolution of the WSS. Quanzhou, a city in China with serious water shortage problems, was selected as a case study. The allocation results of the current year and target year of planning demonstrated that the level of regional comprehensive WSS was significantly influenced by the capacity of water supply projects and the conditions of the natural water resources. The varying conditions of the water resources allocation results in the same year demonstrated that the allocation results and WSSI were significantly affected by reductions in precipitation, decreases in the water yield coefficient, and changes in the underlying surface.

  8. Diagnosing water security in the rural North with an environmental security framework.

    Science.gov (United States)

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Exploring Robust and Resilient Pathways to Water Security (Invited)

    Science.gov (United States)

    Brown, C. M.

    2013-12-01

    Lack of water security and the resultant cumulative effects of water-related hazards are understood to hinder economic growth throughout the world. Traditional methods for achieving water security as exemplified in the industrialized world have exerted negative externalities such as degradation of aquatic ecosystems. There is also growing concern that such methods may not be robust to climate variability change. It has been proposed that alternative pathways to water security must be followed in the developing world. However, it is not clear such pathways currently exist and there is an inherent moral hazard in such recommendations. This presentation will present a multidimensional definition of water security, explore the conflict in norms between engineering and ecologically oriented communities, and present a framework synthesizing those norms for assessing and innovating robust and resilient pathways to water security.

  10. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  11. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  12. A novel water poverty index model for evaluation of Chinese regional water security

    Science.gov (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  13. Water, agriculture, energy: a growing interweaving. Towards an extended water security

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2009-01-01

    In this paper, the author first notices that the definition of water security according to the United Nations Development Program (UNDP) is a rather restrictive one. Thus, the search for a global security takes all forms of insufficiencies and (military or not) instabilities into account, and is then related to strategic stakes of State stability such as agriculture production, water or energy. He discusses the determining factors and vulnerabilities of a renewed water security and its implications. He highlights how internal political and social constraints are sources of local and regional tensions. In this respect, agriculture is at the heart of use conflicts (difficult and necessary reform of the sector, rivalries between rural and urban users), and water stress directly affects daily domestic uses. The author then outlines the necessary integration stakes related to water, food and energy by discussing the use of water in energy production, the use of energy to produce drinkable water, the relationship between agriculture and energy, and, of course between agriculture and water as agriculture is the main water consumer

  14. Evaluation of Water Resource Security Based on an MIV-BP Model in a Karst Area

    Directory of Open Access Journals (Sweden)

    Liying Liu

    2018-06-01

    Full Text Available Evaluation of water resource security deserves particular attention in water resource planning and management. A typical karst area in Guizhou Province, China, was used as the research area in this paper. First, based on data from Guizhou Province for the past 10 years, the mean impact value–back propagation (MIV-BP model was used to analyze the factors influencing water resource security in the karst area. Second, 18 indices involving five aspects, water environment subsystem, social subsystem, economic subsystem, ecological subsystem, and human subsystem, were selected to establish an evaluation index of water resource security. Finally, a BP artificial neural network model was constructed to evaluate the water resource security of Guizhou Province from 2005 to 2014. The results show that water resource security in Guizhou, which was at a moderate warning level from 2005 to 2009 and a critical safety level from 2010 to 2014, has generally improved. Groundwater supply ratio, industrial water utilization rate, water use efficiency, per capita grain production, and water yield modulus were the obstacles to water resource security. Driving factors were comprehensive utilization rate of industrial solid waste, qualifying rate of industrial wastewater, above moderate rocky desertification area ratio, water requirement per unit gross domestic product (GDP, and degree of development and utilization of groundwater. Our results provide useful suggestions on the management of water resource security in Guizhou Province and a valuable reference for water resource research.

  15. Water dependency and water exploitation at global scale as indicators of water security

    Science.gov (United States)

    De Roo, A. P. J.; Beck, H.; Burek, P.; Bernard, B.

    2015-12-01

    A water dependency index has been developed indicating the dependency of water consumption from upstream sources of water, sometimes across (multiple) national border. This index is calculated at global scale using the 0.1 global LISFLOOD hydrological modelling system forced by WFDEI meteorological data for the timeframe 1979-2012. The global LISFLOOD model simulates the most important hydrological processes, as well as water abstraction and consumption from various sectors, and flood routing, at daily scale, with sub-timesteps for routing and subgrid parameterization related to elevation and landuse. The model contains also options for water allocation, to allow preferences of water use for particular sectors in water scarce periods. LISFLOOD is also used for the Global Flood Awareness System (GloFAS), the European Flood Awareness System (EFAS), continental scale climate change impact studies on floods and droughts. The water dependency indicator is calculated on a monthly basis, and various annual and multiannual indicators are derived from it. In this study, the indicator will be compared against water security areas known from other studies. Other indicators calculated are the Water Exploitation Index (WEI+), which is a commonly use water security indicator in Europe, and freshwater resources per capita indicators at regional, national and river basin scale. Several climate scnearios are run to indicate future trends in water security.

  16. On the Water-Food Nexus: an Optimization Approach for Water and Food Security

    Science.gov (United States)

    Mortada, Sarah; Abou Najm, Majdi; Yassine, Ali; Alameddine, Ibrahim; El-Fadel, Mutasem

    2016-04-01

    Water and food security is facing increased challenges with population increase, climate and land use change, as well as resource depletion coupled with pollution and unsustainable practices. Coordinated and effective management of limited natural resources have become an imperative to meet these challenges by optimizing the usage of resources under various constraints. In this study, an optimization model is developed for optimal resource allocation towards sustainable water and food security under nutritional, socio-economic, agricultural, environmental, and natural resources constraints. The core objective of this model is to maximize the composite water-food security status by recommending an optimal water and agricultural strategy. The model balances between the healthy nutritional demand side and the constrained supply side while considering the supply chain in between. It equally ensures that the population achieves recommended nutritional guidelines and population food-preferences by quantifying an optimum agricultural and water policy through transforming optimum food demands into optimum cropping policy given the water and land footprints of each crop or agricultural product. Through this process, water and food security are optimized considering factors that include crop-food transformation (food processing), water footprints, crop yields, climate, blue and green water resources, irrigation efficiency, arable land resources, soil texture, and economic policies. The model performance regarding agricultural practices and sustainable food and water security was successfully tested and verified both at a hypothetical and pilot scale levels.

  17. Engaging Non-State Security Providers: Whither the Rule of Law?

    Directory of Open Access Journals (Sweden)

    Timothy Donais

    2017-07-01

    Full Text Available The primacy of the rule of law has long been seen as one of the essential principles of security sector reform (SSR programming, and part of the larger gospel of SSR is that the accountability of security providers is best guaranteed by embedding security governance within a rule of law framework. Acknowledging the reality of non-state security provision, however, presents a challenge to thinking about SSR as merely the extension of the rule of law into the security realm, in large part because whatever legitimacy non-state security providers possess tends to be grounded in 'extralegal' foundations. This paper – more conceptual than empirical in its approach – considers the implications of hybrid forms of security governance for thinking about the relationship between SSR and rule of law promotion, and argues that the rule of law still provides a useful source of strategic direction for SSR programming.

  18. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  19. Water security in Southern Africa: Discourses securitising water and the implications for water governance and politics

    CSIR Research Space (South Africa)

    Meissner, Richard

    2016-01-01

    Full Text Available In the South African water discourse, the water security concept is a complex notion that not only covers the quantitative aspects of water demand and supply but is also linked to national security and political stability, as well as human well...

  20. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  1. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  2. Conceptualizations of water security in the agricultural sector: Perceptions, practices, and paradigms

    Science.gov (United States)

    Malekian, Atefe; Hayati, Dariush; Aarts, Noelle

    2017-01-01

    Conceptions of agricultural water security are conditioned by larger understandings of being and reality. It is still unclear what such understandings mean for perspectives on water security in general and on causes and solutions related to perceived water security risks and problems in agricultural sector in particular. Based on a systematic literature review, three conceptualizations of water security, related to different paradigms, are presented. Also the consequences of such conceptualizations for determining research objectives, research activities, and research outcomes on agricultural water security are discussed. The results showed that agricultural water security from a positivist paradigm referred to tangible and measurable water-related hazards and threats, such as floods and droughts, pollution, and so forth. A constructivist approach to agricultural water security, constituted by a process of interaction and negotiation, pointed at perceptions of water security of farmers and other stakeholders involved in agricultural sector. A critical approach to agricultural water security focused on the processes of securing vulnerable farmers and others from wider political, social, and natural impediments to sufficient water supplies. The conclusions of the study suggest that paradigms, underlying approaches should be expressed, clarified, and related to one another in order to find optimal and complementary ways to study water security issues in agricultural sector.

  3. Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Water Security

    Science.gov (United States)

    Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.

    2018-01-01

    River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.

  4. Exploring water and food security: the water footprint of domestic food production in the Gaza Strip

    Science.gov (United States)

    Recanati, Francesca; Castelletti, Andrea; Dotelli, Giovanni; Melià, Paco

    2016-04-01

    Water scarcity and food security are major issues in the Gaza Strip. This area is characterized by one of the highest densities in the world and it is affected by both severe scarcity of water resources and limited trading possibilities.Given this context, the enhancement of domestic food production is considered a fundamental strategy in achieving food security in the area. For this reason, rural people play a crucial role in implementing sustainable strategies for enhancing the domestic food production while preserving water resources. In order to investigate the effectiveness of existing agricultural scenarios in achieving food security in a sustainable manner, we propose a framework to assess food production systems in terms of their contribution to the nutritional and economic conditions of rural households and their impact on water resources. In particular, the latter has been carried out through the water footprint indicator proposed by the Water Footprint Network. The case study analyzed is a sample farm located in the Gaza Strip, whose food production is based on horticulture, animal husbandry and aquaculture. The study is articulated into two main parts: first, we compare alternative scenarios of vegetal and animal food production in terms of food supply, water consumption and economic income at the household scale; then, we extend the analysis to evaluate the potential contribution of domestic food production to the food security in the whole Gaza Strip, focusing on the nutritional dimension, and providing a preliminary assessment of the environmental and economic sustainability. In particular, we evaluate water appropriation for domestic food production and compare it with the availability of water resources in the region. The outcomes highlight that the domestic food production can potentially satisfy both a basic diet and economic income for rural household, but the related appropriation of freshwater results unsustainable with respect to the fresh

  5. Water security for productive economies: Applying an assessment framework in southern Africa

    Science.gov (United States)

    Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian

    2017-08-01

    Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook (AWDO) to assess levels of water security for productive economies in countries of the Southern African Development Community (SADC). Economic aspects of water security cover four areas: economic activities in the broad sense, agriculture, electricity, and industry. Water security in each area is measured through application of a set of indicators; results of indicator application are then aggregated to determine economic water security at a country-level. Results show that economic water security in SADC is greatest in the Seychelles and South Africa, and lowest in Madagascar and Malawi. Opportunities for strengthening economic water security in the majority of SADC countries exist through improving agricultural water productivity, strengthening resilience, and expanding sustainable electricity generation. More profoundly, this paper suggests that there is clear potential and utility in applying approaches used elsewhere to assess economic water security in southern Africa.

  6. Applications for remotely sensed evapotranspiration data in monitoring water quality, water use, and water security

    Science.gov (United States)

    Anderson, Martha; Hain, Christopher; Feng, Gao; Yang, Yun; Sun, Liang; Yang, Yang; Dulaney, Wayne; Sharifi, Amir; Kustas, William; Holmes, Thomas

    2017-04-01

    Across the globe there are ever-increasing and competing demands for freshwater resources in support of food production, ecosystems services and human/industrial consumption. Recent studies using the GRACE satellite have identified severely stressed aquifers that are being unsustainably depleted due to over-extraction, primarily in support of irrigated agriculture. In addition, historic droughts and ongoing political conflicts threaten food and water security in many parts of the world. To facilitate wise water management, and to develop sustainable agricultural systems that will feed the Earth's growing population into the future, there is a critical need for robust assessments of daily water use, or evapotranspiration (ET), over a wide range in spatial scales - from field to globe. While Earth Observing (EO) satellites can play a significant role in this endeavor, no single satellite provides the combined spatial, spectral and temporal characteristics required for actionable ET monitoring world-wide. In this presentation we discuss new methods for combining information from the current suite of EO satellites to address issues of water quality, water use and water security, particularly as they pertain to agricultural production. These methods fuse multi-scale diagnostic ET retrievals generated using shortwave, thermal infrared and microwave datasets from multiple EO platforms to generate ET datacubes with both high spatial and temporal resolution. We highlight several case studies where such ET datacubes are being mined to investigate changes in water use patterns over agricultural landscapes in response to changing land use, land management, and climate forcings.

  7. Impact of water scarcity on food security at micro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  8. Impact of water scarcity on food security at macro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  9. Impact of water scarcity on food security at meso level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  10. A Quantitative Socio-hydrological Characterization of Water Security in Large-Scale Irrigation Systems

    Science.gov (United States)

    Siddiqi, A.; Muhammad, A.; Wescoat, J. L., Jr.

    2017-12-01

    Large-scale, legacy canal systems, such as the irrigation infrastructure in the Indus Basin in Punjab, Pakistan, have been primarily conceived, constructed, and operated with a techno-centric approach. The emerging socio-hydrological approaches provide a new lens for studying such systems to potentially identify fresh insights for addressing contemporary challenges of water security. In this work, using the partial definition of water security as "the reliable availability of an acceptable quantity and quality of water", supply reliability is construed as a partial measure of water security in irrigation systems. A set of metrics are used to quantitatively study reliability of surface supply in the canal systems of Punjab, Pakistan using an extensive dataset of 10-daily surface water deliveries over a decade (2007-2016) and of high frequency (10-minute) flow measurements over one year. The reliability quantification is based on comparison of actual deliveries and entitlements, which are a combination of hydrological and social constructs. The socio-hydrological lens highlights critical issues of how flows are measured, monitored, perceived, and experienced from the perspective of operators (government officials) and users (famers). The analysis reveals varying levels of reliability (and by extension security) of supply when data is examined across multiple temporal and spatial scales. The results shed new light on evolution of water security (as partially measured by supply reliability) for surface irrigation in the Punjab province of Pakistan and demonstrate that "information security" (defined as reliable availability of sufficiently detailed data) is vital for enabling water security. It is found that forecasting and management (that are social processes) lead to differences between entitlements and actual deliveries, and there is significant potential to positively affect supply reliability through interventions in the social realm.

  11. Linking smallholder agriculture and water to household food security ...

    African Journals Online (AJOL)

    Linking smallholder agriculture and water to household food security and nutrition. ... Promoting household food security and reducing malnutrition rates of a growing population with the same amount of water is ... AJOL African Journals Online.

  12. Why water security is crucial to you

    CSIR Research Space (South Africa)

    Meissner, Richard

    2015-07-01

    Full Text Available Water security and the appropriate management of water resources are vitally important to South Africa, its population and the economy. According to the Department of Water and Sanitation’s 2013 Strategic Overview of the Water Sector in South Africa...

  13. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  14. Security management of water supply

    Directory of Open Access Journals (Sweden)

    Tchórzewska-Cieślak Barbara

    2017-03-01

    Full Text Available The main aim of this work is to present operational problems concerning the safety of the water supply and the procedures for risk management systems functioning public water supply (CWSS and including methods of hazard identification and risk assessment. Developed a problem analysis and risk assessment, including procedures called. WSP, which is recommended by the World Health Organization (WHO as a tool for comprehensive security management of water supply from source to consumer. Water safety plan is a key element of the strategy for prevention of adverse events in CWSS.

  15. Perspectives on water security in the South African context

    CSIR Research Space (South Africa)

    Funke, Nicola S

    2017-12-01

    Full Text Available This presentation focuses on different perspectives of water security in the South Africa context. The authors link a number of key international perspectives on the topic of water security to official South African government and academic discourse...

  16. Human and Citizen Rights Guarantees While Providing Information Security

    Directory of Open Access Journals (Sweden)

    Serhii Yesimov

    2018-05-01

    Full Text Available With the development of information and communication technologies, issues of providing information security are becoming more and more aggravated. These are crimes related to the use of electronic computers, systems and computer networks and telecommunication networks, the propaganda of separatism and extremism, etc. While providing information security in the digital environment, the role of technical and legal human rights guarantees, due to technical means of protection, is increasing. Relying on the developers of technical means of protection determines the difference between the aforesaid concepts and the traditional approach to ensuring the protection of human and citizen rights, in which responsibilities are put on information intermediaries, owners of confidential information. Technical guarantees of human rights are a necessary component of ensuring information security, but the effectiveness of the application is provided in conjunction with the legal guarantees of human rights, as evidenced by the tendency to recognize the principles of inviolability of privacy on the basis of design decisions in the law of the European Union as legal acts. Providing information security is a legitimate goal of establishing constraints of human rights, since it can be correlated with the norms of international law. The establishment of constraints of human rights is permissible in order to attain other objectives–ensuring state security, public order, health, rights and freedoms of the person in the information sphere. The legitimacy of this goal is determined by its compliance with the objectives envisaged by international agreements ratified in an established order. The article examines the impact of the use of technical means in the field of providing information security in the aspect of following the fundamental human and civil rights in Ukraine, taking into account the legislation of the European Union and the decision of the European Court

  17. Agricultural Applications for Remotely Sensed Evapotranspiration Data in Monitoring Water Use, Water Quality, and Water Security

    Science.gov (United States)

    Anderson, M. C.; Hain, C.; Gao, F.; Yang, Y.; Sun, L.; Dulaney, W.; Sharifi, A.; Holmes, T. R.; Kustas, W. P.

    2016-12-01

    Across the U.S. and globally there are ever increasing and competing demands for freshwater resources in support of food production, ecosystems services and human/industrial consumption. Recent studies using the GRACE satellite have identified severely stressed aquifers globally, which are being unsustainably depleted due to over-extraction primarily in support of irrigated agriculture. In addition, historic droughts and ongoing political conflicts threaten food and water security in many parts of the world. To facilitate wise water management, and to develop sustainable agricultural systems that will feed the Earth's growing population into the future, there is a critical need for robust assessments of daily water use, or evapotranspiration (ET), over a wide range in spatial scales - from field to globe. While Earth Observing (EO) satellites can play a significant role in this endeavor, no single satellite provides the combined spatial, spectral and temporal characteristics required for actionable ET monitoring world-wide. In this presentation we discuss new methods for combining information from the current suite of EO satellites to address issues of water use, water quality and water security, particularly as they pertain to agricultural production. These methods fuse multi-scale diagnostic ET retrievals generated using shortwave, thermal infrared and microwave datasets from multiple EO platforms to generate ET datacubes with both high spatial and temporal resolution. We highlight several case studies where such ET datacubes are being mined to investigate changes in water use patterns over agricultural landscapes in response to changing land use, land management, and climate forcings.

  18. Enhancing water security in a rapidly developing shale gas region

    Directory of Open Access Journals (Sweden)

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  19. Water security begins and ends with the individual

    CSIR Research Space (South Africa)

    Meissner, Richard

    2015-08-01

    Full Text Available Water security and the appropriate management of water resources are vitally important to South Africa, its population and the economy. According to the Department of Water and Sanitation’s 2013 Strategic Overview of the Water Sector in South Africa...

  20. The Innovative Activity of Enterprises in the Context of Providing Information Security

    Directory of Open Access Journals (Sweden)

    Sazonets Olga M.

    2015-03-01

    Full Text Available The aim of the article is to study the peculiarities of the innovative activity in the context of providing the enterprise information security. By analyzing, systematizing and summarizing the scientific works of many scientists the essence of the concept of «information security» has been considered and components of the innovation development process from the standpoint of providing information security have been identified. The article discusses issues of providing information security on the basis of introducing innovations, which will allow achieving a state in which there would be realized a sustainable, protected from threats, development of the enterprise. It has been proved that the formation of the innovative enterprise policy should include measures to ensure information security. As a result of the study the types of threats to the enterprise information security have been identified. It has been determined that the innovation process in the field of information security is provided by means of research, administrative, industrial, technological and commercial activities leading to the emergence and commercialization of innovations. The prospect for further research in this area is determining a system of indicators for forecasting the integral innovation indicator of economic information security. The system of indicators for diagnostics of the enterprise information security level enables monitoring the indicators of the state of the enterprise innovation and information activity in order to prevent the emergence of threats.

  1. Water Security and Climate Change: The Need for Adaptive Governance

    Directory of Open Access Journals (Sweden)

    Tuula Honkonen

    2017-01-01

    Full Text Available Climate change will bring about unprecedented economic, social and environmental effects, which require both the mitigation of greenhouse gas emissions and adaptation to its adverse effects. Water is the main element through which the impacts of climate change will be felt. Climate change results in increased uncertainties, complexities, stress and potential for conflicts within water management, both among and within states. New forms of governance are needed if the world is to respond to the need to adapt to changes in freshwater supply and to manage water security risks. This paper suggests that adaptive governance should to be main-streamed into all water regulation to ensure the availability of and access to safe water resources and to prevent water-related conflicts. The paper discusses the concept of water security in the context of climate change, the threats that climate change poses to water security, and the concept and implications of adaptive governance as a possible solution. The application of adaptive governance requires a certain degree of institutional and normative flexibility, instruments and institutions that can respond and adapt to changes and manage the level of uncertainty associated with the impacts of climate change. The governance institutions, methods and instruments should be responsive to new information and different kinds of uncertainties, while reflecting the vulnerabilities, capacities, needs and priorities of both societies and ecosystems in the face of climate change. Water security risks could be reduced by increased hydrosolidarity among states, which would present the challenges posed by climate change on water governance and security as primarily an opportunity for new forms of cooperation.

  2. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    Science.gov (United States)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  3. Full Scale Drinking Water System Decontamination at the Water Security Test Bed

    Data.gov (United States)

    U.S. Environmental Protection Agency — The EPA’s Water Security Test Bed (WSTB) facility is a full-scale representation of a drinking water distribution system. In collaboration with the Idaho National...

  4. Food and water security issues in Russia II: water security in general population of Russian Arctic, Siberia and Far East, 2000-2011.

    Science.gov (United States)

    Dudarev, Alexey A; Dushkina, Eugenia V; Sladkova, Yuliya N; Alloyarov, Pavel R; Chupakhin, Valery S; Dorofeyev, Vitaliy M; Kolesnikova, Tatjana A; Fridman, Kirill B; Evengard, Birgitta; Nilsson, Lena M

    2013-01-01

    Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Uniform water security indicators collected from Russian official statistical sources for the period 2000-2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized--underground and surface, and non-centralized) and of drinking water. Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40-80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32-90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5-12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages--0.2-2.7%, Clostridia spores, Giardia cysts, pathogenic bacteria, Rotavirus

  5. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  6. Measuring global water security towards sustainable development goals

    NARCIS (Netherlands)

    Wada, Y.|info:eu-repo/dai/nl/341387819; Gain, A.K.; Giupponi, C.

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals(SDGs). Many international river basins are likely to experience ‘low water

  7. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  8. Critical water requirements for food, methodology and policy consequences for food security

    NARCIS (Netherlands)

    Gerbens-Leenes, P.W.; Nonhebel, S.

    2004-01-01

    Food security and increasing water scarcity have a dominant place on the food policy agenda. Food security requires sufficient water of adequate quality because water is a prerequisite for plant growth. Nowadays, agriculture accounts for 70% of the worldwide human fresh water use. The expected

  9. Integrated assessment and scenarios simulation of urban water security system in the southwest of China with system dynamics analysis.

    Science.gov (United States)

    Yin, Su; Dongjie, Guan; Weici, Su; Weijun, Gao

    2017-11-01

    The demand for global freshwater is growing, while global freshwater available for human use is limited within a certain time and space. Its security has significant impacts on both the socio-economic system and ecological system. Recently, studies have focused on the urban water security system (UWSS) in terms of either water quantity or water quality. In this study, water resources, water environment, and water disaster issues in the UWSS were combined to establish an evaluation index system with system dynamics (SD) and geographic information systems (GIS). The GIS method performs qualitative analysis from the perspective of the spatial dimension; meanwhile, the SD method performs quantitative calculation about related water security problems from the perspective of the temporal dimension. We established a UWSS model for Guizhou province, China to analyze influencing factors, main driving factors, and system variation law, by using the SD method. We simulated the water security system from 2005 to 2025 under four scenarios (Guiyang scenario, Zunyi scenario, Bijie scenario and combined scenario). The results demonstrate that: (1) the severity of water security in cities is ranked as follows: three cities are secure in Guizhou province, four cities are in basic security and two cities are in a situation of insecurity from the spatial dimension of GIS through water security synthesis; and (2) the major driving factors of UWSS in Guizhou province include agricultural irrigation water demand, soil and water losses area, a ratio increase to the standard of water quality, and investment in environmental protection. A combined scenario is the best solution for UWSS by 2025 in Guizhou province under the four scenarios from the temporal dimension of SD. The results of this study provide a useful suggestion for the management of freshwater for the cities of Guizhou province in southwest China.

  10. Security measures effect over performance in service provider network

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract—network security is defined as a set of policies and actions taken by a ... These threats are linked with the following factors that are ... typically smaller than those in the service provider space. ... Service providers cannot manage to provide ... e the DB performance effect ... r the business needs [10].

  11. AFRICOM’s Role in Water Security

    Science.gov (United States)

    2012-06-01

    Niger River Basin,” USAID, December 2011, 16. 12. Roselle Henn et al., “The impact of Water as a United States Government Security Consideration for...Tensions,” A report to the German Advisory Council on Global Change, July 10, 2006, 3. 17. Ibid., 6. 18. Roselle Henn, et al., “The impact of Water as

  12. Water security for productive economies : Applying an assessment framework in southern Africa

    NARCIS (Netherlands)

    Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian

    2017-01-01

    Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook

  13. Food and water security issues in Russia II: Water security in general population of Russian Arctic, Siberia and Far East, 2000–2011

    Directory of Open Access Journals (Sweden)

    Alexey A. Dudarev

    2013-12-01

    Full Text Available Background . Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Study design and methods . Uniform water security indicators collected from Russian official statistical sources for the period 2000–2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized – underground and surface, and non-centralized and of drinking water. Results . Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources are highly contaminated by chemicals (up to 40–80% and biological agents (up to 55% in some regions, mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically in 32–90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51% were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5–12% everywhere except Evenki AO (27%, and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly. The presence of other agents was much lower: Coliphages

  14. Food and water security issues in Russia II: Water security in general population of Russian Arctic, Siberia and Far East, 2000–2011

    Science.gov (United States)

    Dudarev, Alexey A.; Dushkina, Eugenia V.; Sladkova, Yuliya N.; Alloyarov, Pavel R.; Chupakhin, Valery S.; Dorofeyev, Vitaliy M.; Kolesnikova, Tatjana A.; Fridman, Kirill B.; Evengard, Birgitta; Nilsson, Lena M.

    2013-01-01

    Background Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Study design and methods Uniform water security indicators collected from Russian official statistical sources for the period 2000–2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized – underground and surface, and non-centralized) and of drinking water. Results Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40–80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32–90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5–12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages – 0.2–2

  15. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  16. Amazon rainforest modulation of water security in the Pantanal wetland.

    Science.gov (United States)

    Bergier, Ivan; Assine, Mario L; McGlue, Michael M; Alho, Cleber J R; Silva, Aguinaldo; Guerreiro, Renato L; Carvalho, João C

    2018-04-01

    The Pantanal is a large wetland mainly located in Brazil, whose natural resources are important for local, regional and global economies. Many human activities in the region rely on Pantanal's ecosystem services including cattle breeding for beef production, professional and touristic fishing, and contemplative tourism. The conservation of natural resources and ecosystems services provided by the Pantanal wetland must consider strategies for water security. We explored precipitation data from 1926 to 2016 provided by a regional network of rain gauge stations managed by the Brazilian Government. A timeseries obtained by dividing the monthly accumulated-rainfall by the number of rainy days indicated a positive trend of the mean rate of rainy days (mm/day) for the studied period in all seasons. We assessed the linkage of Pantanal's rainfall patterns with large-scale climate data in South America provided by NOAA/ESRL from 1949 to 2016. Analysis of spatiotemporal correlation maps indicated that, in agreement with previous studies, the Amazon biome plays a significant role in controlling summer rainfall in the Pantanal. Based on these spatiotemporal maps, a multi-linear regression model was built to predict the mean rate of summer rainy days in Pantanal by 2100, relative to the 1961-1990 mean reference. We found that the deforestation of the Amazon rainforest has profound implications for water security and the conservation of Pantanal's ecosystem services. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  18. Water Security Toolkit User Manual: Version 1.3 | Science ...

    Science.gov (United States)

    User manual: Data Product/Software The Water Security Toolkit (WST) is a suite of tools that help provide the information necessary to make good decisions resulting in the minimization of further human exposure to contaminants, and the maximization of the effectiveness of intervention strategies. WST assists in the evaluation of multiple response actions in order to select the most beneficial consequence management strategy. It includes hydraulic and water quality modeling software and optimization methodologies to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove or destroy contaminants, (5) locations in the network to take grab sample to confirm contamination or cleanup and (6) valves to close in order to isolate contaminated areas of the network.

  19. Water security in South Africa: perceptions on public expectations ...

    African Journals Online (AJOL)

    Water security in South Africa: perceptions on public expectations and municipal ... will in government, a need to restore citizen trust in government intention and capability ... services, and a failure to up-scale existing water re-use technology.

  20. Climate Change Adaptation, Water, and Food Security in Pakistan ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Climate Change Adaptation, Water, and Food Security in Pakistan ... those living in the Indus floodplains or on the edges of its deserts - received little attention. ... farmers' decision-making in water stressed regions, and the wider political and ...

  1. 77 FR 75017 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2012-12-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2012-1038] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION... to read as follows: Sec. 165.T14-215 Security Zone; On the Waters in Kailua Bay, Oahu, HI. (a...

  2. Water security at local government level in South Africa: a qualitative interview-based analysis

    Directory of Open Access Journals (Sweden)

    Richard Meissner, DPhil

    2018-05-01

    Full Text Available Background: As one of the 40 driest countries in the world with an annual average rainfall of 497 mm, South Africa is a water-scarce country. Additionally, South Africa's rate of economic development is closely linked to its water security. Thus, increasing water stress, supply variability, flooding, and water pollution levels and inadequate access to safe drinking water and sanitation are slowing economic growth. Despite the high premium placed on South Africa's water resources, no commonly shared understanding of water security exists. The aim of this study was to research, using qualitative social scientific methods, how people in two South African localities understand water security. Methods: We used interviews and qualitative analyses to establish and compare how people from different lifestyles perceive water security in the Greater Sekhukhune District and the eThekwini Metropolitan Municipalities of South Africa. The inland Sekhukhune has a drier climate and more rural socioeconomic profile than the coastal, urbanised eThekwini with its complex economy and diverse socioeconomic structure. We did face-to-face structured interviews with a diverse stakeholder group consisting of community members, traditional leaders, municipal officials, researchers, business people, and farmers in each municipality and focus groups in two communities of each municipality: Leeuwfontein and Motetema (Sekhukhune and Inanda and Ntshongweni (eThekwini. Each interview lasted 40–60 min, and focus group discussions lasted 90–120 min. We asked the respondents about their understanding of the concept of water security and whether they believe that, at the local and national level, the authorities had achieved water security for all. Findings: Following a qualitative analysis, we found that water security is a state of mind based on context-specific (ie, localised and individualised perceptions held by an individual of water-related threats and how it influences

  3. Water resources for urban water and food security: the case of megacity Hong Kong

    Science.gov (United States)

    Vanham, Davy; Gawlik, Bernd; Bidoglio, Giovanni

    2017-04-01

    The extent to which urban dwellers consume resources is key on the path to reaching global SDGs. One of these resources is water, which is consumed in a direct and indirect way by city inhabitants, to achieve water and food security within city borders. In this study, we quantify the water resources required to provide these two essential securities for megacity Hong Kong. During the last years, this city has made large investments to make its urban water supply system more water efficient and sustainable. As such, its municipal water abstraction - often defined as direct water use - has decreased from 355 litres per capita per day (l/cap/d) in 2005 to 326 l/cap/d in 2013. Due to its political history, Hong Kong is unique in the world in data availability on urban food consumption. It is therefore the ideal case study to show typical urban food consumption behaviour and its related indirect water use. The current average diet in Hong Kong is very different to the average Chinese diet. It is characterised by a high intake of water intensive products like animal products and sugar, leading to a food related indirect water use or water footprint (WFcons) of 4727 l/cap/d. According to recommendations from the Chinese Nutrition Society for a healthy diet, the intake of some product groups should be increased (vegetables and fruit) and of other product groups reduced (sugar, crop oils, meat and animal fats). This would result in a reduction of the WFcons of 40% to 2852 l/cap/d. Especially the reduced intake of meat (including offals) from currently 126 kg per capita per year (kg/cap/yr) to the recommended value 27 kg/cap/yr would result in a substantial WFcons reduction. Meat consumption in Hong Kong is extremely high. A pesco-vegetarian diet would result in a reduction of 49% (to 2398 l/cap/d) and a vegetarian diet in a 53% (to 2224 l/cap/d) reduction. Hong Kong citizens can thus save a lot of water by looking at their indirect water use, through a change in their diet

  4. Water security at local government level. What do people think it means in eThekwini?

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-12-01

    Full Text Available aspects Negative aspects Helping municipalities to help themselves Working together we can secure our water future Diverse - from national government to local community and NGO People should get involved in securing their own water, for example... secure future Scientists from government, NGO's academia Good water quality will ensure healthy people, environments and livelihoods for now and in the future Surely mines can't use good quality water More for some (forever?) A water supply...

  5. Integrating Infrastructure and Institutions for Water Security in Large Urban Areas

    Science.gov (United States)

    Padowski, J.; Jawitz, J. W.; Carrera, L.

    2015-12-01

    Urban growth has forced cities to procure more freshwater to meet demands; however the relationship between urban water security, water availability and water management is not well understood. This work quantifies the urban water security of 108 large cities in the United States (n=50) and Africa (n=58) based on their hydrologic, hydraulic and institutional settings. Using publicly available data, urban water availability was estimated as the volume of water available from local water resources and those captured via hydraulic infrastructure (e.g. reservoirs, wellfields, aqueducts) while urban water institutions were assessed according to their ability to deliver, supply and regulate water resources to cities. When assessing availability, cities relying on local water resources comprised a minority (37%) of those assessed. The majority of cities (55%) instead rely on captured water to meet urban demands, with African cities reaching farther and accessing a greater number and variety of sources for water supply than US cities. Cities using captured water generally had poorer access to local water resources and maintained significantly more complex strategies for water delivery, supply and regulatory management. Eight cities, all African, are identified in this work as having water insecurity issues. These cities lack sufficient infrastructure and institutional complexity to capture and deliver adequate amounts of water for urban use. Together, these findings highlight the important interconnection between infrastructure investments and management techniques for urban areas with a limited or dwindling natural abundance of water. Addressing water security challenges in the future will require that more attention be placed not only on increasing water availability, but on developing the institutional support to manage captured water supplies.

  6. The German electricity market. Does the present market design provide security of supply?

    International Nuclear Information System (INIS)

    Janssen, Matthias; Peichert, Patrick; Perner, Jens; Riechmann, Christoph; Niedrig, Thomas

    2014-01-01

    A heated discussion is being waged in Germany and large parts of Europe over the introduction of what are referred to as capacity mechanisms, whose purpose is to provide security of supply in the electricity sector. In this context two consulting firms have undertaken a both qualitative and quantitative study of the fitness of the present market design, which is based on the ''Energy-Only Market'' (EOM), to provide security of supply in the German electricity market. The authors come to the conclusion that, if suitably framed, the EOM can continue to provide a secure electricity supply in accordance with consumer preferences and at the lowest possible cost.

  7. Stormwater harvesting: Improving water security in South Africa's urban areas

    Directory of Open Access Journals (Sweden)

    Lloyd Fisher-Jeffes

    2017-01-01

    Full Text Available The drought experienced in South Africa in 2016 one of the worst in decades has left many urbanised parts of the country with limited access to water, and food production has been affected. If a future water crisis is to be averted, the country needs to conserve current water supplies, reduce its reliance on conventional surface water schemes, and seek alternative sources of water supply. Within urban areas, municipalities must find ways to adapt to, and mitigate the threats from, water insecurity resulting from, inter alia, droughts, climate change and increasing water demand driven by population growth and rising standards of living. Stormwater harvesting (SWH is one possible alternative water resource that could supplement traditional urban water supplies, as well as simultaneously offer a range of social and environmental benefits. We set out three position statements relating to how SWH can: improve water security and increase resilience to climate change in urban areas; prevent frequent flooding; and provide additional benefits to society. We also identify priority research areas for the future in order to target and support the appropriate uptake of SWH in South Africa, including testing the viability of SWH through the use of real-time control and managed aquifer recharge.

  8. Water security at local government level in South Africa: a qualitative interview-based analysis

    CSIR Research Space (South Africa)

    Meissner, Richard

    2018-05-01

    Full Text Available understanding of water security exists. The aim of this study was to research, using qualitative social scientific methods, how people in two South African localities understand water security....

  9. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  10. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters..., California. 165.1192 Section 165.1192 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport...

  11. 75 FR 37971 - Providing Stability and Security for Medicare Reimbursements

    Science.gov (United States)

    2010-06-30

    ... Part IV The President Memorandum of June 25, 2010--Providing Stability and Security for Medicare Reimbursements #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 75, No. 125 / Wednesday...

  12. Human security and access to water, sanitation, and hygiene: exploring the drivers and nexus

    NARCIS (Netherlands)

    Obani, P.; Gupta, J.; Pahl-Wostl, C.; Badhuri, A.; Gupta, J.

    2016-01-01

    Water security challenges are mostly covered in the literature on the food and energy nexus. This chapter however adopts a broader conception of water security in relation to lack of access to water, sanitation, and hygiene (WASH), and argues that the human rights approach could be instrumental in

  13. Securitising Sustainability? Questioning the 'Water, Energy and Food-Security Nexus'

    Directory of Open Access Journals (Sweden)

    Matthias Leese

    2015-02-01

    Full Text Available The water, energy and food-security nexus approach put forward by the Bonn2011 Conference highlights the need for an integrative approach towards issues of water, energy and food, and puts them under a general framework of security. While acknowledging the need for urgent solutions in terms of sustainability, the nexus approach, at the same time, makes a normative claim to tackle the needs of the poorest parts of the world population. A closer look at the underlying rationales and proposed policy instruments, however, suggests that the primary scope of the conference proceedings is not a normative one, but one that reframes the conflict between distributional justice and the needs of the world economy under the paradigm of security. Reading this slightly shifted perspective through a Foucauldian lens, we propose that security is now put forward as the key mechanism to foster a new 'green' economy, and that the needs of the poorest are, if anything at all, a secondary effect of the proposed nexus approach.

  14. Ground water security and drought in Africa: linking availability, access, and demand.

    Science.gov (United States)

    Calow, Roger C; Macdonald, Alan M; Nicol, Alan L; Robins, Nick S

    2010-01-01

    Drought in Africa has been extensively researched, particularly from meteorological, agricultural, and food security perspectives. However, the impact of drought on water security, particularly ground water dependent rural water supplies, has received much less attention. Policy responses have concentrated on food needs, and it has often been difficult to mobilize resources for water interventions, despite evidence that access to safe water is a serious and interrelated concern. Studies carried out in Ghana, Malawi, South Africa, and Ethiopia highlight how rural livelihoods are affected by seasonal stress and longer-term drought. Declining access to food and water is a common and interrelated problem. Although ground water plays a vital role in buffering the effects of rainfall variability, water shortages and difficulties in accessing water that is available can affect domestic and productive water uses, with knock-on effects on food consumption and production. Total depletion of available ground water resources is rarely the main concern. A more common scenario is a spiral of water insecurity as shallow water sources fail, additional demands are put on remaining sources, and mechanical failures increase. These problems can be planned for within normal development programs. Water security mapping can help identify vulnerable areas, and changes to monitoring systems can ensure early detection of problems. Above all, increasing the coverage of ground water-based rural water supplies, and ensuring that the design and siting of water points is informed by an understanding of hydrogeological conditions and user demand, can significantly increase the resilience of rural communities to climate variability.

  15. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  16. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  17. Operation of remote mobile sensors for security of drinking water distribution systems.

    Science.gov (United States)

    Perelman, By Lina; Ostfeld, Avi

    2013-09-01

    The deployment of fixed online water quality sensors in water distribution systems has been recognized as one of the key components of contamination warning systems for securing public health. This study proposes to explore how the inclusion of mobile sensors for inline monitoring of various water quality parameters (e.g., residual chlorine, pH) can enhance water distribution system security. Mobile sensors equipped with sampling, sensing, data acquisition, wireless transmission and power generation systems are being designed, fabricated, and tested, and prototypes are expected to be released in the very near future. This study initiates the development of a theoretical framework for modeling mobile sensor movement in water distribution systems and integrating the sensory data collected from stationary and non-stationary sensor nodes to increase system security. The methodology is applied and demonstrated on two benchmark networks. Performance of different sensor network designs are compared for fixed and combined fixed and mobile sensor networks. Results indicate that complementing online sensor networks with inline monitoring can increase detection likelihood and decrease mean time to detection. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Food and water security in a changing arctic climate

    International Nuclear Information System (INIS)

    White, Daniel M; Gerlach, S Craig; Loring, Philip; Tidwell, Amy C; Chambers, Molly C

    2007-01-01

    In the Arctic, permafrost extends up to 500 m below the ground surface, and it is generally just the top metre that thaws in summer. Lakes, rivers, and wetlands on the arctic landscape are normally not connected with groundwater in the same way that they are in temperate regions. When the surface is frozen in winter, only lakes deeper than 2 m and rivers with significant flow retain liquid water. Surface water is largely abundant in summer, when it serves as a breeding ground for fish, birds, and mammals. In winter, many mammals and birds are forced to migrate out of the Arctic. Fish must seek out lakes or rivers deep enough to provide good overwintering habitat. Humans in the Arctic rely on surface water in many ways. Surface water meets domestic needs such as drinking, cooking, and cleaning as well as subsistence and industrial demands. Indigenous communities depend on sea ice and waterways for transportation across the landscape and access to traditional country foods. The minerals, mining, and oil and gas industries also use large quantities of surface water during winter to build ice roads and maintain infrastructure. As demand for this limited, but heavily-relied-upon resource continues to increase, it is now more critical than ever to understand the impacts of climate change on food and water security in the Arctic

  19. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    Science.gov (United States)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  20. 78 FR 38949 - Computer Security Incident Coordination (CSIC): Providing Timely Cyber Incident Response

    Science.gov (United States)

    2013-06-28

    ... exposed to various forms of cyber attack. In some cases, attacks can be thwarted through the use of...-3383-01] Computer Security Incident Coordination (CSIC): Providing Timely Cyber Incident Response... systems will be successfully attacked. When a successful attack occurs, the job of a Computer Security...

  1. Growing water scarcity in agriculture: future challenge to global water security.

    Science.gov (United States)

    Falkenmark, Malin

    2013-11-13

    As water is an essential component of the planetary life support system, water deficiency constitutes an insecurity that has to be overcome in the process of socio-economic development. The paper analyses the origin and appearance of blue as well as green water scarcity on different scales and with particular focus on risks to food production and water supply for municipalities and industry. It analyses water scarcity originating from both climatic phenomena and water partitioning disturbances on different scales: crop field, country level and the global circulation system. The implications by 2050 of water scarcity in terms of potential country-level water deficits for food self-reliance are analysed, and the compensating dependence on trade in virtual water for almost half the world population is noted. Planetary-scale conditions for sustainability of the global water circulation system are discussed in terms of a recently proposed Planetary Freshwater Boundary, and the consumptive water use reserve left to be shared between water requirements for global food production, fuelwood production and carbon sequestration is discussed. Finally, the importance of a paradigm shift in the further conceptual development of water security is stressed, so that adequate attention is paid to water's fundamental role in both natural and socio-economic systems.

  2. Managed groundwater development for water-supply security in Sub ...

    African Journals Online (AJOL)

    security in Sub-Saharan Africa: Investment priorities ... 2010, together with a review of some developments in western Africa and insights from parts of Asia and Latin America. ...... and the Global Water Partnership (Ania Grobicki and Aurelie.

  3. Security of water, energy, and food nexus in the Asia-Pacific region

    Science.gov (United States)

    Taniguchi, M.; Endo, A.; Fujii, M.; Shoji, J.; Baba, K.; Gurdak, J. J.; Allen, D. M.; Siringan, F. P.; Delinom, R.

    2014-12-01

    Water, energy, and food are the most important and fundamental resources for human beings and society. Demands for these resources are escalating rapidly because of increases in populations and changes in lifestyles. Therefore intensive demand for those resources makes conflicts between resources. Securities of water, energy, and food are treated separately, however they should be considered as one integrated matter, because water-energy-food are connected and it makes nexus and tradeoff. Security in terms of self-production, diversity of alternatives, and variability are evaluated for water, energy and food for thirty two countries in the Asia-Pacific region. The water and energy nexus includes water consumption for the cooling of power plant systems, water use for hydro power generation, and energy consumption for water allocation and pumping. The water and food nexus consists of water consumption for agriculture and aquaculture. The energy and food nexus includes energy consumption for food production and biomass for energy. Analyses of 11 countries within the Asia- Pacific region show that energy consumption for fish is the largest among foods in Japan, Philippines, and Peru, while energy consumption for cereals is the largest among foods in Canada, US, Indonesia, and others. Water consumption for different types of food and energy are also analyzed, including nexus ratio to total water consumption. The water-energy-food nexus at a local level in the Asia Pacific region are examined by the Research Institute for Humanity and Nature project "Human environmental security in Asia Pacific Ring of Fire". Themes including geothermal power plants for energy development and hot springs as water, shale gas for energy development and water consumption/contamination, aquaculture for food and water contamination are used to evaluate the water-energy-food nexus in the Asia-Pacific region.

  4. FOOD SECURITY IN TUNISIA WITHIN WATER SCARCITY THE RELATIVE IMPORTANCE OF THE MEAT SECTOR

    Directory of Open Access Journals (Sweden)

    Emna Ouertani

    2016-01-01

    Full Text Available This paper analyzes the evolution of food and nutrition security in Tunisia, judges its sustainability within water scarcity conditions and free trade areas, with a specific focus on the meat sector. For such purpose, the FAO indicators and Food Balance Sheets, as well as the Global Food Security Index are all analyzed. Virtual water, owed to meat and cereals for animal feed production and trade, was estimated to expect food security sustainability. Results indicated that Tunisian food and nutrition security (FNS has been improved over the years, but its stability remains vulnerable because of the political and economic risks and the dependence of Tunisia on imported cereals for animal feed due to water scarcity. Tunisian agricultural policy, especially in both sectors of cereals and meat, should be readjusted to guarantee food and nutrition sustainability.

  5. Virtual Water and Food Security in Tunisia | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... on the world grain market has social implications for Tunisia's small farmers and ... Thus, when a country exports an agricultural product, in effect it also exports ... Tunisia that incorporates the virtual water concept in a food security strategy.

  6. Achieving sustainable irrigation water withdrawals: global impacts on food security and land use

    Science.gov (United States)

    Liu, Jing; Hertel, Thomas W.; Lammers, Richard B.; Prusevich, Alexander; Baldos, Uris Lantz C.; Grogan, Danielle S.; Frolking, Steve

    2017-10-01

    Unsustainable water use challenges the capacity of water resources to ensure food security and continued growth of the economy. Adaptation policies targeting future water security can easily overlook its interaction with other sustainability metrics and unanticipated local responses to the larger-scale policy interventions. Using a global partial equilibrium grid-resolving model SIMPLE-G, and coupling it with the global Water Balance Model, we simulate the consequences of reducing unsustainable irrigation for food security, land use change, and terrestrial carbon. A variety of future (2050) scenarios are considered that interact irrigation productivity with two policy interventions— inter-basin water transfers and international commodity market integration. We find that pursuing sustainable irrigation may erode other development and environmental goals due to higher food prices and cropland expansion. This results in over 800 000 more undernourished people and 0.87 GtC additional emissions. Faster total factor productivity growth in irrigated sectors will encourage more aggressive irrigation water use in the basins where irrigation vulnerability is expected to be reduced by inter-basin water transfer. By allowing for a systematic comparison of these alternative adaptations to future irrigation vulnerability, the global gridded modeling approach offers unique insights into the multiscale nature of the water scarcity challenge.

  7. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    Science.gov (United States)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  8. Assessing Security Needs of the multifaceted relationships of Energy and Water Providers

    Energy Technology Data Exchange (ETDEWEB)

    Goldstein, N; Newmark, R; Burton, L; May, D; McMahon, J; Whitehead, C D; Ghatikar, G

    2007-08-22

    In the near future, the United States will be facing constraints on energy availability due to the heightened demand for both energy and water, especially during droughts and summers. Increasing stress on the inextricably linked resource availability of both water and energy can be mitigated with integrated planning. Exchanging data is an important component to current and future mitigation approaches within the Energy-Water Nexus. We describe the types of relationships that are formed in the United States EWN, and address the data sharing obstacles within. Approaches to removing the obstacles of data sharing are presented, based on case studies.

  9. Water security and societal impacts of tropical cyclones in northwestern Mexico, 1970-2010

    Science.gov (United States)

    Scott, C. A.; Farfan, L.

    2012-12-01

    Hydroclimatic variability is one of several potential threats to water security, defined as sustainable quantities and qualities of water for resilient societies and ecosystems in the face of uncertain global environmental change. Other threats can stem from human dimensions of global change, e.g., long-distance trade of water-intensive agricultural commodities or pollution resulting from industrial production and mining in response to rising global market demand. Drought and water scarcity are considered the principal, chronic, hydroclimatic drivers of water insecurity in arid and semi-arid regions. In these conditions, however, rainfall is both the water-supply lifeline and, in extreme events, the cause of flood hazard. In this study, we consider the monsoon-dominated Pacific coast of Mexico and assess the human impacts from tropical cyclone landfall over the past four decades (1970-2010). Storm data from the U.S. National Hurricane Center, rainfall reports from Mexico's National Meteorological Service, and indicators from an international disaster database at Belgium's Université Catholique de Louvain are used to assess the impacts of more than 30 landfall events. For the ten events with the greatest population impact, between 20,000 to 800,000 people were affected by each landfalling cyclone. Strong winds and heavy rainfall, particularly when sustained over periods of 1-3 days, result in significant property damage and loss of life. Results indicate that, in densely populated areas, excessive rainfall accumulations and high daily rates are important causes of cyclone disasters. Strengthening water security associated with extreme events requires planning via structured exchanges between scientists and decision-makers. Adaptive management that accounts for uncertainties, initiates responses, and iteratively assesses outcomes is the thrust of an emerging water-security initiative for the arid Americas that seeks to strengthen water security in northwestern

  10. Food and Livelihood Security in Punjab through Water, Energy and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Food and Livelihood Security in Punjab through Water, Energy and Agricultural Management ... management and facilitating access to resources by low-income farmers. ... Sharing opportunities for innovation in climate change adaptation.

  11. Forced Engagements: Water Security and Local Rights Formalization in Yanque, Colca Valley, Peru

    NARCIS (Netherlands)

    Boelens, R.A.; Seemann, M.

    2014-01-01

    For vulnerable groups in society, water insecurity and deficient water availability for food production commonly reflect unequal distribution of water volumes, quality, and services within unequal power structures. Water security is necessarily a political dilemma. Policy debates, however, tend to

  12. Water Security at Local Government Level: What do People Think?

    CSIR Research Space (South Africa)

    Meissner, Richard

    2016-06-01

    Full Text Available stream_source_info Meissner_2016.pdf.txt stream_content_type text/plain stream_size 2853 Content-Encoding UTF-8 stream_name Meissner_2016.pdf.txt Content-Type text/plain; charset=UTF-8 Water Security at Local... Government Level: What do People Think? By Dr. Richard Meissner Integrated Water Assessment Group Natural Resources and the Environment Council for Scientific and Industrial Research Presented at the Sustainable Water Seminar 2016, CSIR ICC, 2...

  13. Real-time water quality monitoring and providing water quality ...

    Science.gov (United States)

    EPA and the U.S. Geological Survey (USGS) have initiated the “Village Blue” research project to provide real-time water quality monitoring data to the Baltimore community and increase public awareness about local water quality in Baltimore Harbor and the Chesapeake Bay. The Village Blue demonstration project complements work that a number of state and local organizations are doing to make Baltimore Harbor “swimmable and fishable” 2 by 2020. Village Blue is designed to build upon EPA’s “Village Green” project which provides real-time air quality information to communities in six locations across the country. The presentation, “Real-time water quality monitoring and providing water quality information to the Baltimore Community”, summarizes the Village Blue real-time water quality monitoring project being developed for the Baltimore Harbor.

  14. Water security and the science agenda

    Science.gov (United States)

    Wheater, Howard S.; Gober, Patricia

    2015-07-01

    The freshwater environment is facing unprecedented global pressures. Unsustainable use of surface and groundwater is ubiquitous. Gross pollution is seen in developing economies, nutrient pollution is a global threat to aquatic ecosystems, and flood damage is increasing. Droughts have severe local consequences, but effects on food can be global. These current pressures are set in the context of rapid environmental change and socio-economic development, population growth, and weak and fragmented governance. We ask what should be the role of the water science community in addressing water security challenges. Deeper understanding of aquatic and terrestrial environments and their interactions with the climate system is needed, along with trans-disciplinary analysis of vulnerabilities to environmental and societal change. The human dimension must be fully integrated into water science research and viewed as an endogenous component of water system dynamics. Land and water management are inextricably linked, and thus more cross-sector coordination of research and policy is imperative. To solve real-world problems, the products of science must emerge from an iterative, collaborative, two-way exchange with management and policy communities. Science must produce knowledge that is deemed to be credible, legitimate, and salient by relevant stakeholders, and the social process of linking science to policy is thus vital to efforts to solve water problems. The paper shows how a large-scale catchment-based observatory can be used to practice trans-disciplinary science integration and address the Anthropocene's water problems.

  15. Water security at local government level: what do people think it means in eThekwini? Ntshongweni Community feedback

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-12-01

    Full Text Available defined by international organisations or scientists, like UN Water. • Water security is NOT about quantity, quality, availability, reliable supply, water borne diseases… • Water security is about individuals, and their environment—lived experience...

  16. Water security, risk, and economic growth: Insights from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim W.; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2017-08-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been noteworthy in the development of most civilizations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple economic sectors, especially those that are water intensive such as agriculture and energy and (ii) by reducing acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate risks and promote economic growth is widely acknowledged, but prior conceptual work on the relationship between water-related investments and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical systems model of water-related investment, risk, and growth. In cases where initial water security is low, initial investment in water-related assets enables growth. Without such investment, losses due to water-related hazards exert a drag on economic growth and may create a poverty trap. The presence and location of the poverty trap is context-specific and depends on the exposure of productive water-related assets to water-related risk. Exogenous changes in water-related risk can potentially push an economy away from a growth path toward a poverty trap. Our investigation shows that an inverted-U-shaped investment relation between the level of investment in water security and the current level of water security leads to faster rates of growth than the alternatives that we consider here, and that this relation is responsible for the "S"-curve that is posited in the literature. These results illustrate the importance of accounting for environmental and health risks in economic models and offer insights for the design of robust policies for investment in water-related productive assets to manage risk, in the face

  17. Will Pre-Funding Provide Security for Social Security? A Review of the Literature

    OpenAIRE

    Robert L. Brown

    2000-01-01

    President Clinton has proposed creating larger social security funds and investing a portion of them in the private sector. Others have suggested more radical reforms such as moving social security from a defined-benefit scheme to a defined contribution plan based on the Chilean model. These proposals are based on the goal of creating higher investment returns, which would make social security benefits easier to finance in the long run. After an extensive review of the literature, this paper ...

  18. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  19. Impact of Inter‐Basin Water Transfer Projects on Regional Ecological Security from a Telecoupling Perspective

    Directory of Open Access Journals (Sweden)

    Yuan Quan

    2016-02-01

    Full Text Available Inter‐basin water transfer projects (IBWTPs offer one of the most important means to solve the mismatch between supply and demand of regional water resources. IBWTPs have impacts on the complex ecosystems of the areas from which water is diverted and to which water is received. These impacts increase damage or risk to regional ecological security and human wellbeing. However, current methods make it difficult to achieve comprehensive analysis of the impacts of whole ecosystems, because of the long distance between ecosystems and the inconsistency of impact events. In this study, a model was proposed for the analysis of the impacts of IBWTPs on regional ecological security. It is based on the telecoupling framework, and the Driver‐Pressure‐State‐ Impact‐Response (DPSIR model was used to improve the analysis procedure within the telecoupling framework. The Middle Line of the South‐to‐North Water Diversion Project was selected as a case study to illustrate the specific analysis procedure. We realized that information sharing is a key issue in the management of regional security, and that the ecological water requirement, in the form of a single index, could be used to quantitatively assess the impacts on ecological security from IBWTPs.

  20. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  1. Water Security in Times of Climate Change and Intractability: Reconciling Conflict by Transforming Security Concerns into Equity Concerns

    Directory of Open Access Journals (Sweden)

    Neil Powell

    2017-12-01

    Full Text Available This paper considers how to achieve equitable water governance and the flow-on effects it has in terms of supporting sustainable development, drawing on case studies from the international climate change adaptation and governance project (CADWAGO. Water governance, like many other global issues, is becoming increasingly intractable (wicked with climate change and is, by the international community, being linked to instances of threats to human security, the war in the Sudanese Darfur and more recently the acts of terrorism perpetuated by ISIS. In this paper, we ask the question: how can situations characterized by water controversy (exacerbated by the uncertainties posed by climate change be reconciled? The main argument is based on a critique of the way the water security discourse appropriates expert (normal claims about human-biophysical relationships. When water challenges become increasingly securitized by the climate change discourse it becomes permissible to enact processes that legitimately transgress normative positions through post-normal actions. In contrast, the water equity discourse offers an alternative reading of wicked and post-normal water governance situations. We contend that by infusing norm critical considerations into the process of securitization, new sub-national constellations of agents will be empowered to enact changes; thereby bypassing vicious cycles of power brokering that characterize contemporary processes intended to address controversies.

  2. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  3. Water Security in Periurban South Asia : Adapting to Climate ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Chargé(e) de projet. Prof. Ashutosh Kumar Shukla. Institution. Nepal Engineering College. Pays d' institution. Nepal. Site internet. http://www.nec.edu.np. Extrants. Études. Communication strategy in action research on water security in four South Asian peri-urban locations : CCW Asia Regional Partners Meeting, June ...

  4. Water Security in Periurban South Asia : Adapting to Climate ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Adapting to climate change and water security in Asia : proceedings from the Regional Meeting for IDRC-funded partners in Asia working on climate change ... L'honorable Chrystia Freeland, ministre du Commerce international, a annoncé le lancement d'un nouveau projet financé par le Centre de recherches pour le ...

  5. 33 CFR 165.1313 - Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1313 Security zone regulations, tank ship protection, Puget... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington 165.1313 Section 165.1313 Navigation and...

  6. Evaluation of Water Security in Kathmandu Valley before and after Water Transfer from another Basin

    Directory of Open Access Journals (Sweden)

    Bhesh Raj Thapa

    2018-02-01

    Full Text Available Kathmandu Upatyaka Khanepani Limited (KUKL has planned to harness water from outside the valley from Melamchi as an inter-basin project to supply water inside the ring road (core valley area of the Kathmandu Valley (KV. The project, called the “Melamchi Water Supply Project (MWSP”, is expected to have its first phase completed by the end of September 2018 and its second phase completed by the end of 2023 to supply 170 MLD (million liters a day through the first phase and an additional 340 MLD through the second phase. The area has recently faced a severe water deficit and KUKL’s existing infrastructure has had a limited capability, supplying only 19% of the water that is demanded in its service areas during the dry season and 31% during the wet season. In this context, this study aims to assess the temporal trends and spatial distribution of household water security index (WSI, defined as a ratio of supply to demand for domestic water use for basic human water requirements (50 L per capita per day (lpcd and economic growth (135 lpcd as demand in pre- and post-MWSP scenarios. For this purpose, data on water demand and supply with infrastructure were used to map the spatial distribution of WSI and per capita water supply using ArcMap. Results show a severe water insecurity condition in the year 2017 in all KUKL service areas (SAs, which is likely to improve after completion of the MWSP. It is likely that recent distribution network and strategies may lead to inequality in water distribution within the SAs. This can possibly be addressed by expanding existing distribution networks and redistributing potable water, which can serve an additional 1.21 million people in the area. Service providers may have to develop strategies to strengthen a set of measures including improving water supply infrastructures, optimizing water loss, harnessing additional water from hills, and managing water within and outside the KUKL SAs in the long run to cover

  7. Providing a secure base: parenting children in long-term foster family care.

    Science.gov (United States)

    Schofield, Gillian; Beek, Mary

    2005-03-01

    This paper reports on a longitudinal study of children growing up in long-term foster family care. It focuses attention on the challenges for foster carers in providing a secure base for foster children in middle childhood and early adolescence, who have come predominantly from backgrounds of abuse, neglect, and psychosocial adversity. Separation and loss in the children's lives, often through multiple placements, increase the likelihood of difficulties across a range of development. These children tend to be wary, distrustful, and controlling when they enter foster placements, but need from their carers many of the caregiving qualities most commonly described as providing a secure base in infancy. This study describes a model of parenting which uses four caregiving dimensions that are consistent with attachment theory and research: promoting trust in availability, promoting reflective function, promoting self-esteem, and promoting autonomy. A fifth dimension, promoting family membership, is added, as it reflects the need for children in long-term foster family care to experience the security that comes from a sense of identity and belonging. Qualitative data from the study demonstrates the usefulness of this model as a framework for analysis, but also suggests the potential use of such a framework for working with and supporting foster carers.

  8. 78 FR 79312 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2013-12-30

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2013-0934] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION..., Oahu, HI. (a) Location. The following area, within the COTP Honolulu Zone (see 33 CFR 3.70-10), from...

  9. Evaluation of water security in Jordan using a multi-agent, hydroeconomic model: Initial model results from the Jordan Water Project

    Science.gov (United States)

    Yoon, J.; Klassert, C. J. A.; Lachaut, T.; Selby, P. D.; Knox, S.; Gorelick, S.; Rajsekhar, D.; Tilmant, A.; Avisse, N.; Harou, J. J.; Medellin-Azuara, J.; Gawel, E.; Klauer, B.; Mustafa, D.; Talozi, S.; Sigel, K.; Zhang, H.

    2016-12-01

    revealing the hydrologic and human aspects of the system that most strongly influence water security outcomes, providing insight into coupled human-water system dynamics as well as priority areas of focus for continued model improvement.

  10. 76 FR 12 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-01-03

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-1111] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., Oahu, HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3...

  11. 76 FR 80251 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-12-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1142] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3.70...

  12. Indicators of food and water security in an Arctic Health context--results from an international workshop discussion.

    Science.gov (United States)

    Nilsson, Lena Maria; Berner, James; Dudarev, Alexey A; Mulvad, Gert; Odland, Jon Øyvind; Parkinson, Alan; Rautio, Arja; Tikhonov, Constantine; Evengård, Birgitta

    2013-01-01

    In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council) Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs.

  13. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  14. Safeguards and security requirements for weapons plutonium disposition in light water reactors

    International Nuclear Information System (INIS)

    Thomas, L.L.; Strait, R.S.

    1994-10-01

    This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient

  15. Do low-cost ceramic water filters improve water security in rural South Africa?

    Science.gov (United States)

    Lange, Jens; Materne, Tineke; Grüner, Jörg

    2016-10-01

    This study examined the performance of a low-cost ceramic candle filter system (CCFS) for point of use (POU) drinking water treatment in the village of Hobeni, Eastern Cape Province, South Africa. CCFSs were distributed in Hobeni and a survey was carried out among their users. The performance of 51 CCFSs was evaluated by dip slides and related to human factors. Already after two-thirds of their specified lifetime, none of the distributed CCFSs produced water without distinct contamination, and more than one-third even deteriorated in hygienic water quality. Besides the water source (springs were preferable compared to river or rain water), a high water throughput was the dominant reason for poor CCFS performance. A stepwise laboratory test documented the negative effects of repeated loading and ambient field temperatures. These findings suggest that not every CCFS type per se guarantees improved drinking water security and that the efficiency of low-cost systems should continuously be monitored. For this purpose, dip slides were found to be a cost-efficient alternative to standard laboratory tests. They consistently underestimated microbial counts but can be used by laypersons and hence by the users themselves to assess critical contamination of their filter systems.

  16. Water sovereignty and security, high politics and hard power: the dangers of borrowing discourses!

    NARCIS (Netherlands)

    Gupta, J.; Dellapenna, J.W.; van den Heuvel, M.; Pahl-Wostl, C.; Bhaduri, A.; Gupta, J.

    2016-01-01

    This chapter argues that water security has many meanings. It addresses the question: will framing water in terms of ‘water security’ be likely to do a disservice to the water governance challenge of the 21st century? Isn’t there a real risk that the term will become hostage to a much more sinister

  17. Water security and its challenges for Malaysia

    Science.gov (United States)

    Malek, M. A.; Nor, M. A. M.; P, Leong Y.

    2013-06-01

    Water Security in Malaysia is a national issue. The Malaysian water services industry faces issues which need to be tackled immediately for it to be viable and sustainable. Among them are the decentralized water services sector, ineffective governance structure, unsustainable tariffs, huge investments required to develop the water supply and sewerage infrastructure, inefficient operation by the operators and high non-revenue water (NRW) losses. In Malaysia, the "Sectorial" approach embedded in the present water management system and its transformation towards "Integrated Water Resources Management" (IWRM), is still in a state of inertia. This paper presents the need to transform, from a "Supply" Management mode (a characteristic of a developing country) to a "Water Demand" Management mode (a characteristic of a developed country). Issues on "Water Demand" Management for the Environment which can be a threat to the need for sustainable development for biodiversity are highlighted here. Reliable water accounting systems are found still lacking in this country, especially in the Agriculture and Environmental Sectors, where figures are still highly based on "traditional" assumptions. Water Quality deterioration remains an issue especially for the Water Supply and Environment Sectors. Available surface water resource is depleting in many regions and states in the Peninsular. Apart from the Reduce, Reuse and Recycle (3R) option for surface water, another option would be to begin a concerted effort for groundwater exploitation. However there are still grey areas of knowledge in the groundwater resources in this country for affirmative decisions and development of appropriate policies. It is also found that, there are no concerted plans to prepare the public for the change from "Supply" Management to "Demand" Management. In a developed nation, this change is through stakeholder platforms and supported by appropriate policies, rules and regulations that are based on

  18. Water security and its challenges for Malaysia

    International Nuclear Information System (INIS)

    Malek, M A; Leong Y P; Nor, M A M

    2013-01-01

    Water Security in Malaysia is a national issue. The Malaysian water services industry faces issues which need to be tackled immediately for it to be viable and sustainable. Among them are the decentralized water services sector, ineffective governance structure, unsustainable tariffs, huge investments required to develop the water supply and sewerage infrastructure, inefficient operation by the operators and high non-revenue water (NRW) losses. In Malaysia, the 'Sectorial' approach embedded in the present water management system and its transformation towards 'Integrated Water Resources Management' (IWRM), is still in a state of inertia. This paper presents the need to transform, from a 'Supply' Management mode (a characteristic of a developing country) to a 'Water Demand' Management mode (a characteristic of a developed country). Issues on 'Water Demand' Management for the Environment which can be a threat to the need for sustainable development for biodiversity are highlighted here. Reliable water accounting systems are found still lacking in this country, especially in the Agriculture and Environmental Sectors, where figures are still highly based on 'traditional' assumptions. Water Quality deterioration remains an issue especially for the Water Supply and Environment Sectors. Available surface water resource is depleting in many regions and states in the Peninsular. Apart from the Reduce, Reuse and Recycle (3R) option for surface water, another option would be to begin a concerted effort for groundwater exploitation. However there are still grey areas of knowledge in the groundwater resources in this country for affirmative decisions and development of appropriate policies. It is also found that, there are no concerted plans to prepare the public for the change from 'Supply' Management to 'Demand' Management. In a developed nation, this change is through stakeholder platforms and supported by appropriate policies, rules and regulations that are based on

  19. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    Science.gov (United States)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially

  20. Securing water for the cities.

    Science.gov (United States)

    Satterthwaite, D

    1993-01-01

    Many cities in developing countries have grown so much that they can no longer provide adequate, sustainable water. Over pumping in Dakar and Mexico City has forced those cities to obtain water from ever more distant sources. In Dakar, the result has been saltwater intrusion. Overpumping has caused Mexico City to sink, in some areas by as much as 9 m, resulting in serious damage to buildings and sewage and drainage pipes. Other cities facing similar water problems are coastal cities in Peru (e.g., Lima), La Rioja and Catamarca in Argentina, cities in Northern Mexico, and cities in dry areas of Africa. For some cities, the problem is not so much ever more distant water supplies but insufficient funds to expand supplies. Bangkok and Jakarta both face saltwater intrusion into their overdrawn aquifers. Even through agriculture is the dominant user of water in most countries, demand concentrated in a small area exhausts local and regional sources and pollutes rivers, lakes, and coasts with untreated human and industrial waste. Most cities in Africa and Asia do not have a sewerage system. Further, most cities do not have the drains to deal with storm water and external floodwater, causing frequent, seasonal flooding. The resulting stagnant water provides breeding grounds for insect vectors of diseases (e.g., malaria). The problems in most cities are a result of poor management, not lack of water. Reducing leaks in existing piped distribution systems from the usual 60% loss of water to leaks to 12% would increase the available water 2-fold. Another way to address water shortages would be commercial, industrial, and recreational use of minimally treated waste water, such as is the case in Madras and Mexico City. Political solutions are needed to resolve inadequate water supply and waste management.

  1. Indicators of food and water security in an Arctic Health context – results from an international workshop discussion

    Directory of Open Access Journals (Sweden)

    Lena Maria Nilsson

    2013-08-01

    Full Text Available In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs.

  2. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.

  3. National Water Model: Providing the Nation with Actionable Water Intelligence

    Science.gov (United States)

    Aggett, G. R.; Bates, B.

    2017-12-01

    The National Water Model (NWM) provides national, street-level detail of water movement through time and space. Operating hourly, this flood of information offers enormous benefits in the form of water resource management, natural disaster preparedness, and the protection of life and property. The Geo-Intelligence Division at the NOAA National Water Center supplies forecasters and decision-makers with timely, actionable water intelligence through the processing of billions of NWM data points every hour. These datasets include current streamflow estimates, short and medium range streamflow forecasts, and many other ancillary datasets. The sheer amount of NWM data produced yields a dataset too large to allow for direct human comprehension. As such, it is necessary to undergo model data post-processing, filtering, and data ingestion by visualization web apps that make use of cartographic techniques to bring attention to the areas of highest urgency. This poster illustrates NWM output post-processing and cartographic visualization techniques being developed and employed by the Geo-Intelligence Division at the NOAA National Water Center to provide national actionable water intelligence.

  4. ROLE OF GRASSROOTS ENVIRONMENTAL LITERACY: The case of water security at Bwaila Secondary School in Malawi

    Science.gov (United States)

    Chasukwa Mwalwenje, Yvonne; Chasukwa, Steria

    2015-04-01

    Malawi is popularly known as the Warm Heart of Africa. Malawi has a total land area of 45,747 sq. miles. Of the total area, 80 % is covered by fresh water from Lake Malawi and other rivers. The country boasts that it holds large amounts of fresh water and has the third largest lake in Africa. Ironically, the number of households with reliable water access is low (Water Aid, 2014, UNDP, Human Development Report 2008). Regardless of signs of economic development, water security still remains a challenge in the Warm Heart of Africa. The problem with access to water prompted the Government of Malawi to introduce a National Water Policy in 1994 with the vision of 'Water and Sanitation for All'. Since then, other water access interventions have impacted on the ability to manage water sustainably. Over the past few years, more inclusive and diversified interventions have been put in place to reverse the situation. For instance, the government of Malawi has taken action to increase the number of water tanks in schools (UNICEF 2005). Several stakeholders' support the government in their role provides policy direction and coordinate management of the water sector. The outlined National Water and Sanitation Policy strategies includes promoting water conservation and catchment protection; incorporating local governments and communities in planning, development and management of water supplies and sanitation services; rehabilitating the existing infrastructure; creating an enabling environment for public-private partnerships in water supply and sanitation activities; undertaking rehabilitation and reduction of unaccounted-for-water of existing urban, peri-urban, as a priority; promoting economic incentives and opportunities to encourage the participation of small-scale water and sanitation service providers; and promoting water recycling and re-use. Despite of all these interventions, Malawi still continues to face significant challenges with issues of access and quality of

  5. Global Water Cycle Diagrams Minimize Human Influence and Over-represent Water Security

    Science.gov (United States)

    Abbott, B. W.; Bishop, K.; Zarnetske, J. P.; Minaudo, C.; Chapin, F. S., III; Plont, S.; Marçais, J.; Ellison, D.; Roy Chowdhury, S.; Kolbe, T.; Ursache, O.; Hampton, T. B.; GU, S.; Chapin, M.; Krause, S.; Henderson, K. D.; Hannah, D. M.; Pinay, G.

    2017-12-01

    The diagram of the global water cycle is the central icon of hydrology, and for many people, the point of entry to thinking about key scientific concepts such as conservation of mass, teleconnections, and human dependence on ecological systems. Because humans now dominate critical components of the hydrosphere, improving our understanding of the global water cycle has graduated from an academic exercise to an urgent priority. To assess how the water cycle is conceptualized by researchers and the general public, we analyzed 455 water cycle diagrams from textbooks, scientific articles, and online image searches performed in different languages. Only 15% of diagrams integrated human activity into the water cycle and 77% showed no sign of humans whatsoever, although representation of humans varied substantially by region (lowest in China, N. America, and Australia; highest in Western Europe). The abundance and accessibility of freshwater resources were overrepresented, with 98% of diagrams omitting water pollution and climate change, and over 90% of diagrams making no distinction for saline groundwater and lakes. Oceanic aspects of the water cycle (i.e. ocean size, circulation, and precipitation) and related teleconnections were nearly always underrepresented. These patterns held across disciplinary boundaries and through time. We explore the historical and contemporary reasons for some of these biases and present a revised version of the global water cycle based on research from natural and social sciences. We conclude that current depictions of the global water cycle convey a false sense of water security and that reintegrating humans into water cycle diagrams is an important first step towards understanding and sustaining the hydrosocial cycle.

  6. Water Security Toolkit User Manual Version 1.2.

    Energy Technology Data Exchange (ETDEWEB)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William Eugene; Phillips, Cynthia Ann; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License Py

  7. Energy and water tradeoffs in enhancing food security: A selective international assessment

    International Nuclear Information System (INIS)

    Mushtaq, Shahbaz; Maraseni, Tek Narayan; Maroulis, Jerry; Hafeez, Mohsin

    2009-01-01

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security.

  8. Deficit irrigation and sustainable water-resource strategies in agriculture for China’s food security

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J.

    2015-01-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant’s growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. PMID:25873664

  9. Deficit irrigation and sustainable water-resource strategies in agriculture for China's food security.

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J

    2015-04-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant's growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  10. The Socio-hydrology of Bangalore's Lake System and implications for Urban Water Security

    Science.gov (United States)

    Srinivasan, V.; Roy, S.

    2017-12-01

    Bengaluru city has experienced unprecedented growth in recent decades. If the city is to sustain growth and claim its position as a "global" high-tech city, it must be able to secure sufficient water supply and also create a healthy livable environment. With the city's many lakes vanishing due to rapid urbanisation, depletion of groundwater as a result of overuse in the peri-urban areas, and lack of proper underground drainage system and sewage treatment plants, Bangalore is now grappling with issues of imminent water crisis, inequitable access to water supply, and public health hazards. In this context, the restoration of Bangalore's lakes has been promoted as a panacea for its flooding, water stress, and wastewater problems. It has been argued that lakes can store storm water and recycled wastewater and avoid the need for potentially destructive, expensive schemes that may destroy biodiversity rich aquatic ecosystems and forests. Bangalore's lakes are linked by the drainage channels to form a cascade; overflow from each lake flows to the next lake downstream. Yet, most efforts have tended to view the lakes in isolation. This study of the hydrology of Bangalore's lake system in its entirety simulates the lake system as a whole. The study explores approaches to management and theor impact on urban water security.

  11. A Systematic Review of Research Studies Examining Telehealth Privacy and Security Practices Used By Healthcare Providers

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2017-11-01

    Full Text Available The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P. PubMed, CINAHL and INSPEC from 2003 – 2016 were searched and returned 25,404 papers (after duplications were removed. Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth.  Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen’s kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions. Keywords: Computer security, Health personnel, Privacy, Systematic review, Telehealth

  12. Editors' Preface to Special Issue on Drinking Water Safety, Security, and Sustainability

    Science.gov (United States)

    Recognizing these needs, researchers from Zhejiang University (China), the US EPA and the University of Alberta (Canada) organized the “International Conference on Drinking Water Safety, Security and Sustainability” in October 2011 in Hangzhou, China. The conference was attended...

  13. Financial Statements in Providing Financial Security of Agricultural Enterprises

    OpenAIRE

    Olha Vdovenko

    2014-01-01

    In conditions of severe market competition and economic turmoil financial security of agricultural businesses largely depends on the effectiveness of management decisions, reporting being the information support to ensure such decision making. Thus, the practice of preparing accounting figures and their adjustment has a direct effect on agricultural businesses financial security. Having been generalized at the industry level, statistical and financial statements are used for the development o...

  14. Taking the road less taken: reorienting the state for periurban water security

    NARCIS (Netherlands)

    Narain, Vishal; Ranjan, Pranay; Vij, S.; Dewan, Aman

    2017-01-01

    This paper describes the intervention strategy to improve water security in Sultanpur, a village in periurban Gurgaon, India. Most approaches to improving natural resource management in periurban contexts focus on mobilising the community; little attention is paid to reorienting the state or

  15. Megacity precipitationsheds reveal tele-connected water security challenges

    Science.gov (United States)

    Wang-Erlandsson, Lan; Gordon, Line J.

    2018-01-01

    Urbanization is a global process that has taken billions of people from the rural countryside to concentrated urban centers, adding pressure to existing water resources. Many cities are specifically reliant on renewable freshwater regularly refilled by precipitation, rather than fossil groundwater or desalination. A precipitationshed can be considered the “watershed of the sky” and identifies the origin of precipitation falling in a given region. In this paper, we use this concept to determine the sources of precipitation that supply renewable water in the watersheds of the largest cities of the world. We quantify the sources of precipitation for 29 megacities and analyze their differences between dry and wet years. Our results reveal that 19 of 29 megacities depend for more than a third of their water supply on evaporation from land. We also show that for many of the megacities, the terrestrial dependence is higher in dry years. This high dependence on terrestrial evaporation for their precipitation exposes these cities to potential land-use change that could reduce the evaporation that generates precipitation. Combining indicators of water stress, moisture recycling exposure, economic capacity, vegetation-regulated evaporation, land-use change, and dry-season moisture recycling sensitivity reveals four highly vulnerable megacities (Karachi, Shanghai, Wuhan, and Chongqing). A further six megacities were found to have medium vulnerability with regard to their water supply. We conclude that understanding how upwind landscapes affect downwind municipal water resources could be a key component for understanding the complexity of urban water security. PMID:29534109

  16. Insight from the 5th World Water Forum on Securing Water for Food and Ecosystems in Africa : Report on BOCI Project BO-10-004-003: Water Conventions

    OpenAIRE

    Wageningen International

    2009-01-01

    Water scarcity is considered to be one of the largest threats for many parts of Africa. Under water scarce conditions reducing the consumption of water and preventing pollution of accessible water resources is essential. Combating water scarcity in both dimensions of quality and quantity is of special relevance for the LNV priority regions (including those in Water Mondiaal). Future LNV policies to address food security in Africa will affect the use, spread and fate of agrochemicals as well. ...

  17. Providing Criminological Security of Minors at the National Level

    Directory of Open Access Journals (Sweden)

    Andrei I. Savelev

    2017-08-01

    Full Text Available The article discusses issues related to the provision of criminological security of minors at the national level. The Author analyzes the normative legal basis and main directions of activity of subjects of prevention of the violation of child rights in the Russian Federation. The Author believes that the current system of legal guarantees of criminological security of minors not fully meet modern requirements of protection of rights, freedoms and legitimate interests of adolescents. In particular, the legislation of the Russian Federation is largely focused on protecting the interests of disadvantaged segments of the population, including minors, being in socially dangerous position. It is proposed to improve the existing legislation through the adoption of a new federal law “The bases of the system of prevention of offences and security of minors”, which will be an important step towards building a legal state.

  18. Climate Change and Water Security in South Africa; Assessing Conflict and Coping Strategies in KwaZulu-Natal

    Science.gov (United States)

    Hosea, P. O.

    2017-12-01

    The focus on the security implication of climate change was intensified after the 2007 United Nations Security Council debate on climate change as a threat multiplier. In the light of this, Africa is identified as the continent highly vulnerable to climate change impacts due to its high dependence on climate sensitive economy, high poverty prevalence rate, weak institutional coping capacity as well as poor social infrastructure. In the past decades, the peculiarity of South Africa vis-à-vis climate change vulnerability, especially water scarcity, has become an issue of political and economic concern. The country is water stressed due to its arid and semi-arid conditions. In light of this, the Council for Scientific and Industrial Research (CSIR) (2010) assert that while global temperature increased by 0.80C over the last century, the surface temperature around the Southern Africa region increased by 2.00C over the same period. This connotes that climate change and its impact is inevitable for the region. This will further exacerbate the already stress water resources within South Africa. Owing to Cilliers (2009) and the Council on Foreign Relations (2016) argument that most conflict in Africa are largely driven by resource competition which are masqueraded as issues based on politics, religion or ethnicity, this study investigates the propensity of conflict dynamics in relation to climate change and water security. Using eco-violence theory as a theoretical framework and on the premises of human security, the study assess the security implications triggered by the impact of climate change on water security of rural communities in uMkhanyakude District Municipality, KwaZulu-Natal, South Africa. It focused on the extent to which this might trigger conflict as a coping mechanism among rural dwellers to water insecurity in order to inform policy options. Data for the were sourced using a mixed method paradigm where 385 survey questionnaire were distributed using

  19. Social security administration in India- study of provident funds and pension scheme

    OpenAIRE

    Rao, Madhava P

    2005-01-01

    Social Security is becoming a distinct part of social policy of India and the time has come to give a serious thought to ever increasing Social Security needs of the population. There are diversified views on extension of Social Security coverage. Some say it should be limited to only working population and to their families and while others say that the entire population should be covered under Social Security programmes. Social Security schemes further have been branched out as protective...

  20. FOOD SECURITY PROVIDING OF THE SVERDLOVSKAYA OBLAST POPULATION AS THE AGRARIAN POLICY BASIS

    Directory of Open Access Journals (Sweden)

    M.V. Fedorov

    2008-12-01

    Full Text Available Food safety may be interpreted as production systems attribute providing during different technological processes the security and the quality of food products. The key role in this is played by control systems over these processes. Any control system is based on the information data concerning efficiency and state of the system. This information is necessary for operative quality management and the frequency of hypothetic deviations may serve as a universal numeric indicator of the technological processes breakages. The basic elements of food security provision in the region are seen as the following: orientation on our own resources; agro industrial complex restructuring wits a due account of disproportions in its spheres; innovation changes in the production processes in view of competitiveness increase; nutrition improvement and health of the population.

  1. A short overview of measures for securing water resources for irrigated crop production

    DEFF Research Database (Denmark)

    Jensen, Christian Richardt; Ørum, Jens Erik; Pedersen, Søren Marcus

    2014-01-01

    Agriculture is the main user of limited fresh water resources in the world. Optimisation of agricultural water resources and their use can be obtained by both agronomical and political incentives. Important options are: reduction of the loss of irrigation water in conveyance before it reaches...... of the 'virtual water' principles so that water-rich regions secure food supply to dry regions; reduction in waste of food, feed and biofuel from post-harvest to the end consumer; changing of food composition to less water-consuming products; regulating amount of irrigation water by rationing, subsidies or water...... pricing to support water-saving measures such as use of drip, irrigation scheduling and DI. The potential for water saving for different measures is discussed and estimated. Reduction in waste of food and loss of irrigation water from conveyance source to farm both has a great potential for water saving...

  2. Investigating Food and Agribusiness Corporations as Global Water Security, Management and Governance Agents: The case of Nestlé, Bunge and Cargill

    Directory of Open Access Journals (Sweden)

    Suvi Sojamo

    2012-10-01

    Full Text Available This article investigates the agency of the world’s largest food and agribusiness corporations in global water security via case studies of Nestlé, Bunge and Cargill by analysing their position in the political economy of the world agro-food system and the ways they intentionally and non-intentionally manage and govern water in their value chains and wider networks of influence. The concentrated power of a few corporations in global agro-food value chains and their ability to influence the agro-food market dynamics and networks throughout the world pose asymmetric conditions for reaching not only global food security but also water security. The article will analyse the different forms of power exercised by the corporations in focus in relation to global water security and the emerging transnational water governance regime, and the extent to which their value chain position and stakeholder interaction reflect or drive their actions. Due to their vast infrastructural and technological capacity and major role in the global agro-food political economy, food and agribusiness corporations cannot avoid increasingly engaging, for endogenous and exogenous reasons, in multi-stakeholder initiatives and partnerships to devise methods of managing the agro-food value chains and markets to promote global water security. However, their asymmetric position in relation to their stakeholders demands continuous scrutiny.

  3. Enabling Water-Energy–Food Nexus: A New Approach for Sustainable Agriculture and Food Security in Mountainous Landlocked Countries

    Directory of Open Access Journals (Sweden)

    Tek Bahadur Gurung

    2016-12-01

    Full Text Available Majority of landlocked mountainous countries are poorly ranked in Human Development Index (HDI, mostly due to poor per capita agriculture production, increasing population, unemployment, expensive and delayed transportation including several other factors. Generally, economy of such countries substantially relies on subsistence agriculture, tourism, hydropower and largely on remittance etc. Recently, it has been argued that to utilize scarce suitable land efficiently for food production, poor inland transport, hydropower, irrigation, drinking water in integration with other developmental infrastructures, an overarching policy linking water - energy – food nexus within a country for combating water, energy and food security would be most relevant. Thus, in present paper it has been opined that promotion of such linkage via nexus approach is the key to sustainable development of landlocked mountainous countries. Major land mass in mountainous countries like Nepal remains unsuitable for agriculture, road and other infrastructure profoundly imposing food, nutrition and energy security. However, large pristine snowy mountains function as wildlife sanctuaries, pastures, watershed, recharge areas for regional and global water, food and energy security. In return, landlocked mountainous countries are offered certain international leverages. For more judicious trade off, it is recommended that specific countries aerial coverage of mountains would be more appropriate basis for such leverages. Moreover, for sustainability of mountainous countries an integrated approach enabling water - energy – food nexus via watershed-hydropower-irrigation-aquaculture-agriculture-integrated linking policy model is proposed. This model would enable protection of watershed for pico, micro, and mega hydro power plants and tail waters to be used for aquaculture or irrigation or drinking water purposes for food and nutrition security.

  4. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  5. 33 CFR 127.705 - Security systems.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  6. The Saskatchewan River Basin - a large scale observatory for water security research (Invited)

    Science.gov (United States)

    Wheater, H. S.

    2013-12-01

    multiple jurisdictions. The SaskRB has therefore been developed as a large scale observatory, now a Regional Hydroclimate Project of the World Climate Research Programme's GEWEX project, and is available to contribute to the emerging North American Water Program. State-of-the-art hydro-ecological experimental sites have been developed for the key biomes, and a river and lake biogeochemical research facility, focussed on impacts of nutrients and exotic chemicals. Data are integrated at SaskRB scale to support the development of improved large scale climate and hydrological modelling products, the development of DSS systems for local, provincial and basin-scale management, and the development of related social science research, engaging stakeholders in the research and exploring their values and priorities for water security. The observatory provides multiple scales of observation and modelling required to develop: a) new climate, hydrological and ecological science and modelling tools to address environmental change in key environments, and their integrated effects and feedbacks at large catchment scale, b) new tools needed to support river basin management under uncertainty, including anthropogenic controls on land and water management and c) the place-based focus for the development of new transdisciplinary science.

  7. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  8. Soil Security Assessment of Tasmania

    Science.gov (United States)

    Field, Damien; Kidd, Darren; McBratney, Alex

    2017-04-01

    The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.

  9. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  10. Evaluation of surface water dynamics for water-food security in seasonal wetlands, north-central Namibia

    Directory of Open Access Journals (Sweden)

    T. Hiyama

    2014-09-01

    Full Text Available Agricultural use of wetlands is important for food security in various regions. However, land-use changes in wetland areas could alter the water cycle and the ecosystem. To conserve the water environments of wetlands, care is needed when introducing new cropping systems. This study is the first attempt to evaluate the water dynamics in the case of the introduction of rice-millet mixed-cropping systems to the Cuvelai system seasonal wetlands (CSSWs in north-central Namibia. We first investigated seasonal changes in surface water coverage by using satellite remote sensing data. We also assessed the effect of the introduction of rice-millet mixed-cropping systems on evapotranspiration in the CSSWs region. For the former investigation, we used MODIS and AMSR-E satellite remote sensing data. These data showed that at the beginning of the wet season, surface water appears from the southern (lower part and then expands to the northern (higher part of the CSSWs. For the latter investigation, we used data obtained by the classical Bowen ratio-energy balance (BREB method at an experimental field site established in September 2012 on the Ogongo campus, University of Namibia. This analysis showed the importance of water and vegetation conditions when introducing mixed-cropping to the region.

  11. Analysis of Water Resources Supply and Demand and Security of Water Resources Development in Irrigation Regions of the Middle Reaches of the Heihe River Basin, Northwest China

    Institute of Scientific and Technical Information of China (English)

    JI Xi-bin; KANG Er-si; CHEN Ren-sheng; ZHAO Wen-zhi; XIAO Sheng-chun; JIN Bo-wen

    2006-01-01

    Based on the data for meteorology, hydrology, soil, planting, vegetation, and socio-economic development of the irrigation region in the middle reaches of the Heihe River basin, Northwest China, the model of balance of water supply and demand in the region was established, and the security of water resource was assessed, from which the results that the effects of unified management of water resources in the Heihe River basin between Gansu Province and Inner Mongolia on regional hydrology are significant with a decrease in water supply diverted from Heihe River and an increase in groundwater extracted. In addition, it was found that the groundwater level has been steadily decreasing due to over pumping and decrease in recharges. In present year (2003), the volume of potential groundwater in the irrigation districts is far small because of the groundwater overdraft; even in the particular regions, there is no availability of groundwater resources for use. By 2003, water supply is not sufficient to meet the water demand in the different irrigation districts, the sustainable development and utilization of water resources are not secured, and the water supply crisis occurs in Pingchuan irrigation district. Achieving water security for the sustainable development of society, agriculture, economy, industry, and livelihoods while maintaining or improving the abilities of the management and planning of water resources, determining of the reasonable percentage between water supply and groundwater utilization and water saving in agricultural irrigation are taken into account. If this does not occur, it is feared that the present performance of water development and planning may further aggravate the problem of scarcities of water resources and further damage the fragile ecological system.

  12. Control and Regulation of Private Security Providers in Latin America and the Caribbean: A Comparative Analysis

    Directory of Open Access Journals (Sweden)

    Francesca Caonero

    2014-05-01

    Full Text Available States and different international players have drafted legal frameworks to adequately regulate the phenomenon of privatization of security. Among these initiatives is the Project for a Possible Convention on Private Military and Security Companies, prepared with guidance from the United Nations Human Rights Council. The objective of this proposed convention is to provide a universal framework to regulate these companies.The United Nations Regional Center for Peace, Disarmament and Development in Latin America and the Caribbean (UNLIREC has studied this Proposed Convention and contrasted it with existing national regulations. The objective of this study is to identify whether and how States already comply with some of the provisions contained in this proposal.Based on the study of national private security law, UNLIREC has contrasted it with the Convention Proposal identifying the different items in this document that are referred to in the different national regulations from various countries in Latin America and the Caribbean.As a result of this legal contrast, it can be observed that laws in some States in the region include significant legal aspects put forth in the Proposed Convention, such as licenses, registry and training. Other States go beyond that, stipulating specific regulations that can be noted. Others, on the contrary, lack any provisions regarding control and regulation of private security providers.DOI: http://dx.doi.org/10.5377/rpsp.v1i1.1392

  13. Loss of the CNA I secured river water system: analysis and effect evaluation

    International Nuclear Information System (INIS)

    Berra, Sandra; Guala, Mariana I.; Lorenzo, Andrea T.; Raffo Calderon, Maria C.; Urrutia, Guillermo

    1999-01-01

    In this work the evolution of the plant parameters is evaluated in the case of a loss of the secured circuit of river water (system UK). In particular the systems which are affected for this loss were studied. It was evaluated the functional degradation of these systems. (author)

  14. Providing strong Security and high privacy in low-cost RFID networks

    DEFF Research Database (Denmark)

    David, Mathieu; Prasad, Neeli R.

    2009-01-01

    Since the dissemination of Radio Frequency IDentification (RFID) tags is getting larger and larger, the requirement for strong security and privacy is also increasing. Low-cost and ultra-low-cost tags are being implemented on everyday products, and their limited resources constraints the security...

  15. Socio-Hydrological Observatory for Water Security (SHOWS): Examples of Adaptation Strategies With Next Challenges from Brazilian Risk Areas

    Science.gov (United States)

    Souza, F. A. A. D.; Mendiondo, E. M.; Taffarello, D.; Guzmán-Arias, D.; Fava, M. C.; Abreu, F.; Freitas, C. C.; de Macedo, M. B.; Estrada, C. R.; do Lago, C. A.

    2017-12-01

    In Brazil, more than 40,000 hot-spot areas, with vulnerable human settlements with ca. 120 million inhabitants and responsible of 60% of Brazilian Gross Net Product, are threatened by hydrological-driven disaster risks. In these areas, local resilient actions and adaptation strategies do integrate the current Brazilian Act and Regulation of Laws of urban waters, climate change and civil protection. However, these initiatives are still under slow progress, especially to cope with floods, landslides, droughts, progressive biodiversity losses and energy burnouts. Here we address these hot-spots through the concept of Socio-Hydrological Observatory for Water Security (SHOWS), with a mix of adaptation strategies, open-source, big data analysis and societal feedbacks. On the one hand, SHOWS merges strategies like the dynamic framework of water security (Srinivasan et al, 2017), drought risk mapping (Rossato et al, 2017) and water securitization under varying water demand and climate change until year 2100 (Mohor & Mendiondo, 2017; Guzmán-Arias et al, 2017). SHOWS acknowledges different perspectives of water insecurity, several spatiotemporal scales and regime shifts in socio-hydrologic systems. On the one hand, SHOWS links field monitoring during water insecurity hazards (Taffarello et al, 2016), ecosystem-based adaptation networks, and decision-making and big data sources to disaster management (Horita et al, 2017). By using selected examples from two Brazilian running interdisciplinary research aliances, i.e. CAPES-ProAlertas CEMADEN-CEPED/USP and the CNPq/FAPESP National Institute of Science & Technology on Climate Change-II Water Security, we also face the limits, the pros and cons of SHOWS' assumptions. Through real-cases paradoxes, (i.e. 2013/2014 drought), water dashboards and coevolution trends (i.e. impacts on river basin committees from scenarios until 2050, 2100 in NE & SE Brazil), SHOWS helps on guiding decisionmaking for next societal steps of water

  16. Climate change and water security with a focus on the Arctic

    Directory of Open Access Journals (Sweden)

    Birgitta Evengard

    2011-10-01

    Full Text Available Water is of fundamental importance for human life; access to water of good quality is of vital concern for mankind. Currently however, the situation is under severe pressure due to several stressors that have a clear impact on access to water. In the Arctic, climate change is having an impact on water availability by melting glaciers, decreasing seasonal rates of precipitation, increasing evapotranspiration, and drying lakes and rivers existing in permafrost grounds. Water quality is also being impacted as manmade pollutants stored in the environment are released, lowland areas are flooded with salty ocean water during storms, turbidity from permafrost-driven thaw and erosion is increased, and the growth or emergence of natural pollutants are increased. By 2030 it is estimated that the world will need to produce 50% more food and energy which means a continuous increase in demand for water. Decisionmakers will have to very clearly include life quality aspects of future generations in the work as impact of ongoing changes will be noticeable, in many cases, in the future. This article will focus on effects of climate-change on water security with an Arctic perspective giving some examples from different countries how arising problems are being addressed.

  17. The Climate Disruption Challenge for Water Security in a Growing World

    Science.gov (United States)

    Paxton, L. J.; Nix, M.; Ihde, A.; MacDonald, L. H.; Parker, C.; Schaefer, R. K.; Weiss, M.; Babin, S. M.; Swartz, W. H.; Schloman, J.

    2012-12-01

    Climate disruption, the increasingly large and erratic departures of weather and climate from the benign conditions of the last one hundred years, is the greatest challenge to the long-term stability of world governments. Population growth, food and water security, energy supplies, and economic factors are, to some degree, within the control of governance and policy and all of these are impacted by climate disruption. Climate disruption, on the other hand, is not amenable to direct modification on the short timescales that commonly dictate governmental policy and human response. Global average temperatures will continue to increase even if there were immediate, profound changes in emission scenarios. Policy makers are faced with the very practical and immediate problem of determining what can one reasonably do to ameliorate the impact of climate disruption. The issue from a policy viewpoint is: how does one make effective policy when faced with a situation in which there are varied viewpoints in competition. How does one establish a consensus for action? What information "speaks" to policy makers? Water security is one such issue and provides an important, immediate, and tangible device to use when we examine how one can determine what policies can be effectively pursued. The Global Assimilation of Information for Action (GAIA) project creates a support environment to address the impact of climate disruption on global, national, regional, and/or local interests. The basic research community is concerned with the scientific aspects of predicting climate change in terms of environmental parameters such as rainfall, temperature and humidity while decision makers must deal with planning for a world that may be very different from the one we have grown accustomed to. Decision makers must deal with the long-term impacts on public health, agriculture, economic productivity, security, extreme weather, etc in an environment that has come to focus on short-term issues. To

  18. The German electricity market. Does the present market design provide security of supply?; Strommarkt in Deutschland. Gewaehrleistet das derzeitige Marktdesign Versorgungssicherheit?

    Energy Technology Data Exchange (ETDEWEB)

    Janssen, Matthias; Peichert, Patrick; Perner, Jens; Riechmann, Christoph [Frontier Economics, Koeln (Germany); Niedrig, Thomas [Formaet Services GmbH, Rheinbach (Germany)

    2014-09-15

    A heated discussion is being waged in Germany and large parts of Europe over the introduction of what are referred to as capacity mechanisms, whose purpose is to provide security of supply in the electricity sector. In this context two consulting firms have undertaken a both qualitative and quantitative study of the fitness of the present market design, which is based on the ''Energy-Only Market'' (EOM), to provide security of supply in the German electricity market. The authors come to the conclusion that, if suitably framed, the EOM can continue to provide a secure electricity supply in accordance with consumer preferences and at the lowest possible cost.

  19. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  20. 33 CFR 105.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...

  1. To the Question of Information Security and Providing State and Municipal Services by Means of the Internet

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-09-01

    Full Text Available In the present article author investigates interconnected questions of information security and providing state and municipal services by means of the global information Internet. Author analyzes opinions of the number of leading Russian and foreign experts and scientists. In the summary author draws a conclusion that implementation of rules of law answering to modern realities and also fruitful work of law enforcement and supervisory authorities regarding law application practice improvement is necessary for information security and human rights protection.

  2. Theorizing the European union as Union as an International Security Provider

    DEFF Research Database (Denmark)

    This final paper will summarise the theoretical strands of the discussion in the preceding papers and reflect on the suitability of the analytical framework in the introduction in light of the empirical analysis by other contributors to the special issue. It will sketch out the main tenets of a t...... of a theory of the EU as an international security provider and point to directions for further research in this area.......This final paper will summarise the theoretical strands of the discussion in the preceding papers and reflect on the suitability of the analytical framework in the introduction in light of the empirical analysis by other contributors to the special issue. It will sketch out the main tenets...

  3. Water Demand Management Policy Brief No

    International Development Research Centre (IDRC) Digital Library (Canada)

    Bob Stanley

    Fair share: Water Demand Management can help provide fair access to water for the poor. Water Policy. Brief no.2 ... management (WDM) can help spread water more equitably, providing a measure of opportunity, security and ... improving health and quality of life for families. WDM measures can improve the efficiency of.

  4. Application of Evolutionary Mechanisms of Enhancers for Development Effective Artificial Intelligence Systems for Providing Data Security

    Directory of Open Access Journals (Sweden)

    M. L. Garanina

    2010-06-01

    Full Text Available This article describes the base approaches of the methods of evolutionary mechanisms (special type of genes — enhancers for parameterizations of AI systems genotype. This method can help in increasing adaptability of AI systems for providing data security.

  5. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Occupancy by police officers to... HOUSING Occupancy by Over-Income Families or Police Officers § 960.505 Occupancy by police officers to provide security for public housing residents. (a) Police officer. For purpose of this subpart E, “police...

  6. Molded polymer solar water heater

    Science.gov (United States)

    Bourne, Richard C.; Lee, Brian E.

    2004-11-09

    A solar water heater has a rotationally-molded water box and a glazing subassembly disposed over the water box that enhances solar gain and provides an insulating air space between the outside environment and the water box. When used with a pressurized water system, an internal heat exchanger is integrally molded within the water box. Mounting and connection hardware is included to provide a rapid and secure method of installation.

  7. Cogeneration of Electricity and Potable Water Using The International Reactor Innovative And Secure (IRIS) Design

    International Nuclear Information System (INIS)

    Ingersoll, D.T.; Binder, J.L.; Kostin, V.I.; Panov, Y.K.; Polunichev, V.; Ricotti, M.E.; Conti, D.; Alonso, G.

    2004-01-01

    The worldwide demand for potable water has been steadily growing and is projected to accelerate, driven by a continued population growth and industrialization of emerging countries. This growth is reflected in a recent market survey by the World Resources Institute, which shows a doubling in the installed capacity of seawater desalination plants every ten years. The production of desalinated water is energy intensive, requiring approximately 3-6 kWh/m3 of produced desalted water. At current U.S. water use rates, a dedicated 1000 MW power plant for every one million people would be required to meet our water needs with desalted water. Nuclear energy plants are attractive for large scale desalination application. The thermal energy produced in a nuclear plant can provide both electricity and desalted water without the production of greenhouse gases. A particularly attractive option for nuclear desalination is to couple a desalination plant with an advanced, modular, passively safe reactor design. The use of small-to-medium sized nuclear power plants allows for countries with smaller electrical grid needs and infrastructure to add new electrical and water capacity in more appropriate increments and allows countries to consider siting plants at a broader number of distributed locations. To meet these needs, a modified version of the International Reactor Innovative and Secure (IRIS) nuclear power plant design has been developed for the cogeneration of electricity and desalted water. The modular, passively safe features of IRIS make it especially well adapted for this application. Furthermore, several design features of the IRIS reactor will ensure a safe and reliable source of energy and water even for countries with limited nuclear power experience and infrastructure. The IRIS-D design utilizes low-quality steam extracted from the low-pressure turbine to boil seawater in a multi-effect distillation desalination plant. The desalination plant is based on the horizontal

  8. Water footprint components required to address the water-energy-food nexus, with the recent Urban Water Atlas for Europe as an example

    Science.gov (United States)

    Vanham, Davy

    2017-04-01

    The first part of this presentation analyses which water footprint (WF) components are necessary in WF accounting to provide relevant information to address the Sustainable Development Goals (SDG's) water security (SDG 6), food security (SDG 2) and energy security (SDG 7) in a nexus setting. It is strongly based on the publication Vanham (2016) http://dx.doi.org/10.1016/j.ecoser.2015.08.003. First, the nexus links between (1) the planetary boundary freshwater resources (green and blue water resources) and (2) food, energy and blue water security are discussed. Second, it is shown which water uses are mostly represented in WF accounting. General water management and WF studies only account for the water uses agriculture, industry and domestic water. Important water uses are however mostly not identified as separate entities or even included, i.e. green and blue water resources for aquaculture, wild foods, biofuels, hydroelectric cooling, hydropower, recreation/tourism, forestry (for energy and other biomass uses) and navigation. Third, therefore a list of essential separate components to be included within WF accounting is presented. The latter would be more coherent with the water-food-energy-ecosystem nexus. The second part of the presentation gives a brief overview of the recently published Urban Water Atlas for Europe. It shows for a selected city which WF components are represented and which not. As such, it also identifies research gaps.

  9. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  10. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  11. Avoiding Mazibuko : water security and constitutional rights in ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad ... state provide every person upon demand and without more with sufficient water. ... in common law, but both were decided as though access to water supply and ...

  12. Analysis And Assessment Of The Security Method Against Incidental Contamination In The Collective Water Supply System

    Directory of Open Access Journals (Sweden)

    Szpak Dawid

    2015-09-01

    Full Text Available The paper presents the main types of surface water incidental contaminations and the security method against incidental contamination in water sources. Analysis and assessment the collective water supply system (CWSS protection against incidental contamination was conducted. Failure Mode and Effects Analysis (FMEA was used. The FMEA method allow to use the product or process analysis, identification of weak points, and implementation the corrections and new solutions for eliminating the source of undesirable events. The developed methodology was shown in application case. It was found that the risk of water contamination in water-pipe network of the analyzed CWSS caused by water source incidental contamination is at controlled level.

  13. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  14. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  15. Sensor-enabled chem/bio contamination detection system dedicated to situational awareness of water distribution security status

    Science.gov (United States)

    Ginsberg, Mark D.; Smith, Eddy D.; VanBlaricum, Vicki; Hock, Vincent F.; Kroll, Dan; Russell, Kevin J.

    2010-04-01

    Both real events and models have proven that drinking water systems are vulnerable to deliberate and/or accidental contamination. Additionally, homeland security initiatives and modeling efforts have determined that it is relatively easy to orchestrate the contamination of potable water supplies. Such contamination can be accomplished with classic and non-traditional chemical agents, toxic industrial chemicals (TICs), and/or toxic industrial materials (TIMs). Subsequent research and testing has developed a proven network for detection and response to these threats. The method uses offthe- shelf, broad-spectrum analytical instruments coupled with advanced interpretive algorithms. The system detects and characterizes any backflow events involving toxic contaminants by employing unique chemical signature (fingerprint) response data. This instrumentation has been certified by the Office of Homeland Security for detecting deliberate and/or accidental contamination of critical water infrastructure. The system involves integration of several mature technologies (sensors, SCADA, dynamic models, and the HACH HST Guardian Blue instrumentation) into a complete, real-time, management system that also can be used to address other water distribution concerns, such as corrosion. This paper summarizes the reasons and results for installing such a distribution-based detection and protection system.

  16. 7 CFR 1780.14 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  17. The 21st Century Challenges and the Food-Energy-Water-Security (FEWS) Nexus in the Middle East Region

    Science.gov (United States)

    Moradkhani, H.; Hameed, M.

    2017-12-01

    Developing countries have experienced crucial conditions in meeting the needs for food, energy, and water security. This paper presents a country-level quantitative assessment of the current issues associated with the Food-Energy-Water-Security (FEWS) Nexus in the Middle East region. In this study, sixteen countries in the Middle East region are chosen, namely, Arabian Peninsula, Iran, Syria, Lebanon, Israel, Palestine, Egypt, and Turkey. The most recent datasets are used to study and analyze the factors that have emerged the demand to understand and manage the linkage of FEW systems in the region. Water scarcity, extreme events, population growth, urbanization, economic growth, poverty, and political stability are found to be the key drivers of the current challenges in the Middle East region. Additionally, the results suggest that these factors have created a subsequent stress on FEW resources specifically on water sector in the region. Therefore, more attention is required to sustain the FEW resources and cope with the socio-economic development.

  18. Does land tenure security matter for investment in soil and water conservation? Evidence from Kenya

    NARCIS (Netherlands)

    Kabubo-Mariara, J.; Linderhof, V.G.M.; Kruseman, G.

    2010-01-01

    This paper investigates the impact of tenure security and other factors on investment in soil and water conservation (SWC) in Kenya. Factor analysis, step-wise regression and reduced form model approaches are used to explain the willingness, likelihood and intensity of adoption of SWC investments.

  19. A simple security architecture for smart water management system

    CSIR Research Space (South Africa)

    Ntuli, N

    2016-05-01

    Full Text Available . Secure booting prevents installation of malicious code onto the device. By making sure that the booting process is secured, we can establish securely the root of trust for the device. Public key cryptography is utilized at this stage. During... Architecture 1168 Nonhlanhla Ntuli and Adnan Abu-Mahfouz / Procedia Computer Science 83 ( 2016 ) 1164 – 1169 3.2. Secure Communication While public key cryptography can be used in the first step (secure booting), it would be too heavy to use during...

  20. Integrated modeling approach for optimal management of water, energy and food security nexus

    Science.gov (United States)

    Zhang, Xiaodong; Vesselinov, Velimir V.

    2017-03-01

    Water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-period socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. The obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.

  1. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  2. Understanding the socio-institutional context to support adaptation for future water security in forest landscapes

    Directory of Open Access Journals (Sweden)

    Tahia Devisscher

    2016-12-01

    Full Text Available During the first half of the 21st century, socioeconomic development is expected to contribute faster and to a greater extent to global water stress than climate change. Consequently, we aimed to identify conditions that can facilitate local adaptation planning for future water security, accounting for the socio-institutional context, developmental needs, and interests affecting water use and management. Our study focused on three forest landscapes in Latin America where water stress was identified as a current concern potentially leading to future social conflict if not addressed. In the three sites, we adopted a participatory approach to implement a systematic diagnostic framework for the analysis of socio-institutional barriers and opportunities influencing local adaptation decision making. This novel application enabled science-society engagement in which civil society organizations were coleading the research. The field methods we used involved participatory social network mapping, semistructured interviews, and validation workshops. Our study generated insights into several interventions that could help overcome barriers affecting the adaptation decision-making process, particularly in the diagnosis and early planning phases. Points of intervention included fostering local participation and dialogue to facilitate coproduction of knowledge, and strengthening the role of key central actors in the water governance networks. These key actors are currently bridging multiple interests, information sources, and governance levels, and thus, they could become agents of change that facilitate local adaptation processes. Working jointly with civil society to frame the research proved effective to increase awareness about water issues, which related not only to the technological, economic, and political aspects of water, but also to organizational processes. The involvement of civil society created genuine interest in building further capacity for

  3. 17 CFR 240.14a-7 - Obligations of registrants to provide a list of, or mail soliciting material to, security holders.

    Science.gov (United States)

    2010-04-01

    ..., form of proxy or other communication to such holders, including to the extent known or reasonably... provided for under applicable state law identifying the proposal or other corporate action that will be the subject of the security holder's solicitation or communication and attesting that: (i) The security holder...

  4. Assessing the feasibility of integrating ecosystem-based with engineered water resource governance and management for water security in semi-arid landscapes: A case study in the Banas catchment, Rajasthan, India.

    Science.gov (United States)

    Everard, Mark; Sharma, Om Prakash; Vishwakarma, Vinod Kumar; Khandal, Dharmendra; Sahu, Yogesh K; Bhatnagar, Rahul; Singh, Jitendra K; Kumar, Ritesh; Nawab, Asghar; Kumar, Amit; Kumar, Vivek; Kashyap, Anil; Pandey, Deep Narayan; Pinder, Adrian C

    2018-01-15

    Much of the developing world and areas of the developed world suffer water vulnerability. Engineering solutions enable technically efficient extraction and diversion of water towards areas of demand but, without rebalancing resource regeneration, can generate multiple adverse ecological and human consequences. The Banas River, Rajasthan (India), has been extensively developed for water diversion, particularly from the Bisalpur Dam from which water is appropriated by powerful urban constituencies dispossessing local people. Coincidentally, abandonment of traditional management, including groundwater recharge practices, is leading to increasingly receding and contaminated groundwater. This creates linked vulnerabilities for rural communities, irrigation schemes, urban users, dependent ecosystems and the multiple ecosystem services that they provide, compounded by climate change and population growth. This paper addresses vulnerabilities created by fragmented policy measures between rural development, urban and irrigation water supply and downstream consequences for people and wildlife. Perpetuating narrowly technocentric approaches to resource exploitation is likely only to compound emerging problems. Alternatively, restoration or innovation of groundwater recharge practices, particularly in the upper catchment, can represent a proven, ecosystem-based approach to resource regeneration with linked beneficial socio-ecological benefits. Hybridising an ecosystem-based approach with engineered methods can simultaneously increase the security of rural livelihoods, piped urban and irrigation supplies, and the vitality of river ecosystems and their services to beneficiaries. A renewed policy focus on local-scale water recharge practices balancing water extraction technologies is consistent with emerging Rajasthani policies, particularly Jal Swavlamban Abhiyan ('water self-reliance mission'). Policy reform emphasising recharge can contribute to water security and yield socio

  5. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  6. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  7. Opportunities and Challenges for Water and Wastewater Industries to Provide Exchangeable Services

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, Bethany [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hunsberger, Randolph [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-11-13

    Water and wastewater treatment plants and distribution systems use significant amounts of energy, around 2 - 4% of the total electricity used in the US, and their energy use is projected to increase as populations increase and regulations become more stringent. Water and wastewater systems have largely been disconnected from the electric utilities' efforts to improve energy efficiency and provide energy efficiency and provide grid services, likely because their core mission is to provide clean water and treated wastewater. Energy efficiency has slowly crept into the water and wastewater industry as the economic benefit has become more apparent, but there is still potential for significant improvement. Some of the larger, more progressive water utilities are starting to consider providing grid services; however, it remains a foreign concept to many. This report explores intrinsic mechanisms by which the water and wastewater industries can provide exchangeable services, the benefit to the parties involved, and the barriers to implementation. It also highlights relevant case studies and next steps. Although opportunities for increasing process efficiencies are certainly available, this report focuses on the exchangeable services that water and wastewater loads can provide to help maintain grid reliability, keep overall costs down, and increase the penetration of distributed renewables on the electric grid. These services have potential to provide water utilities additional value streams, using existing equipment with modest or negligible upgrade cost.

  8. Learning from “Shadow Security”: Why understanding non-compliance provides the basis for effective security

    OpenAIRE

    Kirlappos, I.; Parkin, S.; Sasse, M. A.

    2014-01-01

    Over the past decade, security researchers and practitioners have tried to understand why employees do not comply with organizational security policies and mechanisms. Past re-search has treated compliance as a binary decision: people comply, or they do not. From our analysis of 118 in-depth interviews with individuals (employees in a large multinational organization) about security non-compliance, a 3rd response emerges: shadow security. This describes the instances where security-conscious ...

  9. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu, HI...

  10. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  11. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  12. Land security and the challenges of realizing the human right to water and sanitation in the slums of Mumbai, India.

    Science.gov (United States)

    Murthy, Sharmila L

    2012-12-15

    Addressing the human right to water and sanitation in the slums of Mumbai, India requires disentangling the provision of basic services from a more complicated set of questions around land security and land ownership. Millions of slum-dwellers in Mumbai lack adequate access to safe drinking water and sanitation, which places them at risk for waterborne diseases. Many slums are located in hazardous areas such as flood plains, increasing their susceptibility to climate change-related weather patterns. Access to water and sanitation in slums generally hinges on whether a dwelling was created prior to January 1, 1995, because those constructed created prior to that date have greater land security. Although the so-called "1995 cut-off rule" looms large in Mumbai slum policy, a closer reading of the relevant laws and regulations suggests that access to water and sanitation could be expanded to slums created after January 1, 1995. State and municipal governments already have the authority to expand access to water services; they just need to exercise their discretion. However, slums located on central government land are in a more difficult position. Central government agencies in Mumbai have often refused to allow the state and municipal governments to rehabilitate or improve access to services for slums located on their land. As a result, an argument could be made that by interfering with the efforts of sub-national actors to extend water and sanitation to services to slum-dwellers, the central government of India is violating its obligations to respect the human right to water and sanitation under international and national jurisprudence. Copyright © 2012 Murthy. This is an open access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original author and source are

  13. Providing safe drinking water to 1.2 billion unserved people

    Energy Technology Data Exchange (ETDEWEB)

    Gadgil, Ashok J.; Derby, Elisabeth A.

    2003-06-01

    Despite substantial advances in the past 100 years in public health, technology and medicine, 20% of the world population, mostly comprised of the poor population segments in developing countries (DCs), still does not have access to safe drinking water. To reach the United Nations (UN) Millennium Goal of halving the number of people without access to safe water by 2015, the global community will need to provide an additional one billion urban residents and 600 million rural residents with safe water within the next twelve years. This paper examines current water treatment measures and implementation methods for delivery of safe drinking water, and offers suggestions for making progress towards the goal of providing a timely and equitable solution for safe water provision. For water treatment, based on the serious limitations of boiling water and chlorination, we suggest an approach based on filtration coupled with ultraviolet (UV) disinfection, combined with public education. Additionally, owing to the capacity limitations for non-governmental organizations (NGOs) to take on this task primarily on their own, we suggest a strategy based on financially sustainable models that include the private sector as well as NGOs.

  14. Impact of Climate and Land Use Changes on Water and Food Security in Jordan: Implications for Transcending “The Tragedy of the Commons”

    Directory of Open Access Journals (Sweden)

    Jawad Taleb Al-Bakri

    2013-02-01

    Full Text Available This study investigates the impact of climate change and land use change on water resources and food security in Jordan. The country is dominated by arid climate with limited arable land and water resources, where the per capita share of water is less than 145 m3/year. The study focused on crop production and water resources under trends of anticipated climate change and population growth in the country. Remote sensing data were used to determine land use/cover changes and rates of urbanization, which took place at the cost of the cultivable land. Recession of irrigated areas led to lesser food production and food security. Outputs from crop production and water requirements models, in addition to regression analysis, were used to estimate the projected increase in agricultural water demand under the scenarios of increased air temperature and reduced rainfall by the years 2030 and 2050. Results indicated that problems of water scarcity and food insecurity would be exacerbated by climate change and increased population growth. To move from the tragedy of the commons towards transcendence, the study emphasized the need for adaptive measures to reduce the impacts of climate change on water resources and food security. The challenge, however, would remain the development and the efficient use of new water resources as a means for future sustainable development.

  15. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  16. Comparative Assessment of Physical and Social Determinants of Water Quantity and Water Quality Concerns

    Science.gov (United States)

    Gunda, T.; Hornberger, G. M.

    2017-12-01

    Concerns over water resources have evolved over time, from physical availability to economic access and recently, to a more comprehensive study of "water security," which is inherently interdisciplinary because a secure water system is influenced by and affects both physical and social components. The concept of water security carries connotations of both an adequate supply of water as well as water that meets certain quality standards. Although the term "water security" has many interpretations in the literature, the research field has not yet developed a synthetic analysis of water security as both a quantity (availability) and quality (contamination) issue. Using qualitative comparative and multi-regression analyses, we evaluate the primary physical and social factors influencing U.S. states' water security from a quantity perspective and from a quality perspective. Water system characteristics are collated from academic and government sources and include access/use, governance, and sociodemographic, and ecosystem metrics. Our analysis indicates differences in variables driving availability and contamination concerns; for example, climate is a more significant determinant in water quantity-based security analyses than in water quality-based security analyses. We will also discuss coevolution of system traits and the merits of constructing a robust water security index based on the relative importance of metrics from our analyses. These insights will improve understanding of the complex interactions between quantity and quality aspects and thus, overall security of water systems.

  17. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  18. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  19. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  20. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  1. 29 CFR 801.14 - Exemption for employers providing security services.

    Science.gov (United States)

    2010-07-01

    ... industry, generally, administrative employees may have access to customer accounts, schedules, information... securities, precious commodities or instruments, or proprietary information. (b)(1) Section 7(e) permits the...” which would be of vital importance during periods of war or civil emergency, or whose sabotage would...

  2. How do patients and providers react to different incentives in the Chinese multiple health security systems?

    Science.gov (United States)

    Zhang, Chun-Yu; Hashimoto, Hideki

    2015-03-05

    China has achieved universal health insurance coverage. This study examined how patients and hospitals react to the different designs of the plans and to monitoring of patients by the local authority in the Chinese multiple health security schemes. The sample for analysis consisted of 1006 orthopedic inpatients who were admitted between January and December 2011 at a tertiary teaching hospital located in Beijing. We conducted general linear regression analyses to investigate whether medical expenditure and length of stay differed according to the different incentives. Patients under plans with lower copayment rates consumed significantly more medication compared with those under plans with higher copayment rates. Under plans with an annual ceiling for insurance coverage, patients spent significantly more in the second half of the year than in the first half of the year. The length of stay was shorter among patients when there were government monitoring and a penalty to the hospital service provider. Our results indicate that the different designs and monitoring of the health security systems in China cause opportunistic behavior by patients and providers. Reformation is necessary to reduce those incentives, and improve equity and efficiency in healthcare use.

  3. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  4. Assessing food security in water scarce regions by Life Cycle Analysis: a case study in the Gaza strip

    Science.gov (United States)

    Recanati, Francesca; Castelletti, Andrea; Melià, Paco; Dotelli, Giovanni

    2013-04-01

    Food security is a major issue in Palestine for both political and physical reasons, with direct effects on the local population living conditions: the nutritional level of people in Gaza is classified by FAO as "insecure". As most of the protein supply comes from irrigated agricultural production and aquaculture, freshwater availability is a limiting factor to food security, and the primary reason for frequent conflicts among food production processes (e.g. aquaculture, land livestock or different types of crops). In this study we use Life Cycle Analysis to assess the environmental impacts associated to all the stages of water-based protein production (from agriculture and aquaculture) in the Gaza strip under different agricultural scenarios and hydroclimatic variability. As reported in several recent studies, LCA seems to be an appropriate methodology to analyze agricultural systems and assess associated food security in different socio-economic contexts. However, we argue that the inherently linear and static nature of LCA might prove inadequate to tackle with the complex interaction between water cycle variability and the food production system in water-scarce regions of underdeveloped countries. Lack of sufficient and reliable data to characterize the water cycle is a further source of uncertainty affecting the robustness of the analysis. We investigate pros and cons of LCA and LCA-based option planning in an average size farm in Gaza strip, where farming and aquaculture are family-based and integrated by reuse of fish breeding water for irrigation. Different technological solutions (drip irrigation system, greenhouses etc.) are evaluated to improve protein supply and reduce the pressure on freshwater, particularly during droughts. But this use of technology represent also a contribution in increasing sustainability in agricultural processes, and therefore in economy, of Gaza Strip (reduction in chemical fertilizers and pesticides etc.).

  5. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

    OpenAIRE

    Kalaiprasath, R.; Elankavi, R.; Udayakumar, R.

    2017-01-01

    The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether thes...

  6. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  7. The Challenge of Providing Safe Water with an Intermittently Supplied Piped Water Distribution System

    Science.gov (United States)

    Kumpel, E.; Nelson, K. L.

    2012-12-01

    An increasing number of urban residents in low- and middle-income countries have access to piped water; however, this water is often not available continuously. 84% of reporting utilities in low-income countries provide piped water for fewer than 24 hours per day (van den Berg and Danilenko, 2010), while no major city in India has continuous piped water supply. Intermittent water supply leaves pipes vulnerable to contamination and forces households to store water or rely on alternative unsafe sources, posing a health threat to consumers. In these systems, pipes are empty for long periods of time and experience low or negative pressure even when water is being supplied, leaving them susceptible to intrusion from sewage, soil, or groundwater. Households with a non-continuous supply must collect and store water, presenting more opportunities for recontamination. Upgrading to a continuous water supply, while an obvious solution to these challenges, is currently out of reach for many resource-constrained utilities. Despite its widespread prevalence, there are few data on the mechanisms causing contamination in an intermittent supply and the frequency with which it occurs. Understanding the impact of intermittent operation on water quality can lead to strategies to improve access to safe piped water for the millions of people currently served by these systems. We collected over 100 hours of continuous measurements of pressure and physico-chemical water quality indicators and tested over 1,000 grab samples for indicator bacteria over 14 months throughout the distribution system in Hubli-Dharwad, India. This data set is used to explore and explain the mechanisms influencing water quality when piped water is provided for a few hours every 3-5 days. These data indicate that contamination occurs along the distribution system as water travels from the treatment plant to reservoirs and through intermittently supplied pipes to household storage containers, while real

  8. Food security, irrigation, climate change, and water scarcity in India

    Science.gov (United States)

    Hertel, T. W.; Taheripour, F.; Gopalakrishnan, B. N.; Sahin, S.; Escurra, J.

    2015-12-01

    annual reductions in welfare will be about 24.3 billion for 2008 to 2030. This study highlights the importance of considering the interplay between climate and water availability in assessments of food security.

  9. A framework for modelling the complexities of food and water security under globalisation

    Science.gov (United States)

    Dermody, Brian J.; Sivapalan, Murugesu; Stehfest, Elke; van Vuuren, Detlef P.; Wassen, Martin J.; Bierkens, Marc F. P.; Dekker, Stefan C.

    2018-01-01

    We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  10. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  11. Impacts of multiple global environmental changes on African crop yield and water use efficiency: Implications to food and water security

    Science.gov (United States)

    Pan, S.; Yang, J.; Zhang, J.; Xu, R.; Dangal, S. R. S.; Zhang, B.; Tian, H.

    2016-12-01

    Africa is one of the most vulnerable regions in the world to climate change and climate variability. Much concern has been raised about the impacts of climate and other environmental factors on water resource and food security through the climate-water-food nexus. Understanding the responses of crop yield and water use efficiency to environmental changes is particularly important because Africa is well known for widespread poverty, slow economic growth and agricultural systems particularly sensitive to frequent and persistent droughts. However, the lack of integrated understanding has limited our ability to quantify and predict the potential of Africa's agricultural sustainability and freshwater supply, and to better manage the system for meeting an increasing food demand in a way that is socially and environmentally or ecologically sustainable. By using the Dynamic Land Ecosystem Model (DLEM-AG2) driven by spatially-explicit information on land use, climate and other environmental changes, we have assessed the spatial and temporal patterns of crop yield, evapotranspiration (ET) and water use efficiency across entire Africa in the past 35 years (1980-2015) and the rest of the 21st century (2016-2099). Our preliminary results indicate that African crop yield in the past three decades shows an increasing trend primarily due to cropland expansion (about 50%), elevated atmospheric CO2 concentration, and nitrogen deposition. However, crop yield shows substantially spatial and temporal variation due to inter-annual and inter-decadal climate variability and spatial heterogeneity of environmental drivers. Climate extremes especially droughts and heat wave have largely reduced crop yield in the most vulnerable regions. Our results indicate that N fertilizer could be a major driver to improve food security in Africa. Future climate warming could reduce crop yield and shift cropland distribution. Our study further suggests that improving water use efficiency through land

  12. 76 FR 48751 - Security Zones; Captain of the Port Lake Michigan Zone

    Science.gov (United States)

    2011-08-09

    ... Jardine Water Filtration Plant security zone would encompass all U.S. navigable waters of Lake Michigan... areas near shore to Chicago's water filtration plants; the security zones have been designed to allow.... 165.910 Security Zones; Captain of the Port Lake Michigan. (a) * * * (1) Jardine Water Filtration...

  13. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  14. Access to water provides economic relief through enhanced relationships in Kenya.

    Science.gov (United States)

    Zolnikov, Tara Rava; Blodgett-Salafia, Elizabeth

    2017-03-01

    Sub-Saharan Africa is comprised of low- and middle-income countries subject to the residual effects of chronic poverty. Poverty contributes to health disparities and social inequities. Public health strategies and solutions seek to remedy the effects of poverty. Providing access to quality water is one priority public health project that alleviates adverse health effects, but may have additional outcomes. Previous research has not thoroughly reviewed the economic relief and relationship changes from implemented water interventions. A qualitative phenomenological approach used 52 semi-structured interviews to understand relationship experiences among primary water gatherers and their families after implemented water interventions in a community. This study took place throughout the historically semi-arid eastern region in Kitui, Kenya, where community members have been beneficiaries of various water interventions. Prior to the water intervention, relationships were strained because of economic hardships. Households experienced economic difficulties in paying for children's school fees, buying bricks for housing structures, having water for house gardens, trees for shade in the compound, crops and providing water for their animals. After receiving access to water, relationships improved, because families were able to discuss and address economic challenges. Additional financial revenue was gained and used to pay for water to make bricks to sell or use on housing structures, expand on house gardens and agricultural crops, build new businesses, purchase water for animals, and construct local water spouts near the household. Access to water improved relationships, which encouraged economic growth. This information provides a critical component in understanding the interconnected nature between access to water, poverty and family relationships. Ultimately, this research suggests an increased need for access to quality water worldwide to improve both economic situations

  15. Position of the academy of nutrition and dietetics: nutrition security in developing nations: sustainable food, water, and health.

    Science.gov (United States)

    Nordin, Stacia M; Boyle, Marie; Kemmer, Teresa M

    2013-04-01

    It is the position of the Academy of Nutrition and Dietetics that all people should have consistent access to an appropriately nutritious diet of food and water, coupled with a sanitary environment, adequate health services, and care that ensure a healthy and active life for all household members. The Academy supports policies, systems, programs, and practices that work with developing nations to achieve nutrition security and self-sufficiency while being environmentally and economically sustainable. For nations to achieve nutrition security, all people must have access to a variety of nutritious foods and potable drinking water; knowledge, resources, and skills for healthy living; prevention, treatment, and care for diseases affecting nutrition status; and safety-net systems during crisis situations, such as natural disasters or deleterious social and political systems. More than 2 billion people are micronutrient deficient; 1.5 billion people are overweight or obese; 870 million people have inadequate food energy intake; and 783 million people lack potable drinking water. Adequate nutrient intake is a concern, independent of weight status. Although this article focuses on nutritional deficiencies in developing nations, global solutions for excesses and deficiencies need to be addressed. In an effort to achieve nutrition security, lifestyles, policies, and systems (eg, food, water, health, energy, education/knowledge, and economic) contributing to sustainable resource use, environmental management, health promotion, economic stability, and positive social environments are required. Food and nutrition practitioners can get involved in promoting and implementing effective and sustainable policies, systems, programs, and practices that support individual, community, and national efforts. Copyright © 2013 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  16. 33 CFR 106.140 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.140 Maritime Security (MARSEC) Directive. All OCS facility owners or operators subject to this part must comply...

  17. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  18. 33 CFR 101.405 - Maritime Security (MARSEC) Directives.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405 Maritime... necessary to respond to a threat assessment or to a specific threat against the maritime elements of the...

  19. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  20. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  1. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  2. Porous TiO₂-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis.

    Science.gov (United States)

    Galstyan, Vardan

    2017-12-19

    Gas sensors play an important role in our life, providing control and security of technical processes, environment, transportation and healthcare. Consequently, the development of high performance gas sensor devices is the subject of intense research. TiO₂, with its excellent physical and chemical properties, is a very attractive material for the fabrication of chemical sensors. Meanwhile, the emerging technologies are focused on the fabrication of more flexible and smart systems for precise monitoring and diagnosis in real-time. The proposed cyber chemical systems in this paper are based on the integration of cyber elements with the chemical sensor devices. These systems may have a crucial effect on the environmental and industrial safety, control of carriage of dangerous goods and medicine. This review highlights the recent developments on fabrication of porous TiO₂-based chemical gas sensors for their application in cyber chemical system showing the convenience and feasibility of such a model to provide the security and to perform the diagnostics. The most of reports have demonstrated that the fabrication of doped, mixed and composite structures based on porous TiO₂ may drastically improve its sensing performance. In addition, each component has its unique effect on the sensing properties of material.

  3. Development and analysis of security policies in security enhanced Android

    OpenAIRE

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  4. Achieving water security through community-based agreements in rural Northwestern Costa Rica

    Science.gov (United States)

    Bautista Solís, P.; Bommel, P.; Campos, X.; Suarez, A.; Leclerc, G.

    2016-12-01

    Community-based drinking water organizations have the responsibility in supplying water for domestic use to 29% of the Costa Rican population. Nowadays, more than 1.500 of these organizations face important challenges for achieving this critical mission, such as fulfilling national drinking-water quality standards, and improving their organization and administration to secure water supply and distribution under climate change. We conducted action-research in two communities with similar geographical and demographic conditions: Cuajiniquil and Colas de Gallo located in the drought prone Guanacaste region in Costa Rica. Both communities are contrasted regarding to their assets and organization. We addressed the following research question: Can a participatory process help communities assess the situation of their aqueduct and its management, project themselves in the future, and build more resilient strategies to face domestic water restrictions? Through 16 participatory sessions, we adapted the Wat-a-Game (WAG) toolkit to the problem of domestic water provision in these communities, creating the WAG-Tico role-playing game. This was complemented by two other activities: visits by regional actors sharing their experience, and exchange visits between both communities for cross-learning about community-based water management. The process resulted in a locally-led collaboration between both communities and the emergence of community commitments for improving drought resilience. WAG-Tico sensibilized participants to appreciate the value of community organization and the impacts of climate change on water supply, and develop aqueduct management rules. Exchange visits and regional actors interventions promoted opportunities for accessing to external resources (i.e. social, human and financial). Colas de Gallo created its first water committee for building a community aqueduct and their first drilled well. Cuajiniquil has committed in protecting its water springs, organized

  5. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  6. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  7. A framework for modelling the complexities of food and water security under globalisation

    Directory of Open Access Journals (Sweden)

    B. J. Dermody

    2018-01-01

    Full Text Available We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  8. Optimization Design of Cascade Water Price for Rural Drinking Water Security Project%农村饮水安全工程阶梯水价优化设计

    Institute of Scientific and Technical Information of China (English)

    孔珂; 徐征和; 田守岗

    2011-01-01

    Rational water price necessitates to guarantee the smooth running of water supply project and to realize the sustainable security of rural drinking water. It is put forward that the two-stage cascade water price, which consists of survival water amount and living water amount, is suitable for current rural conditions. Such problems as the return of rural water supplier's cost, the water demand of customers, the definition of survival water amount, and the affordable ability of water price are analyzed, which provides fundamental for the establishment of the optimization model. The water price scheme of a rural water plant in Linqing of Shangdong is calculated as an example, and the result shows that this price scheme has positive practical value.%合理的水价是保障供水工程健康发展,实现可持续的农村饮水安全的必要条件.提出由生存水量和生活水量构成的2级阶梯水价是适合农村现状的水价模式;分析了农村供水工程的成本回收、用水户的用水需求、生存水量的核定,以及水价承受能力问题,在此基础上建立了阶梯水价优化模型;以山东临清某农村水厂为例进行了实例测算,结果表明该方案有积极的实施价值.

  9. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  10. Role of small-scale independent providers in water and sanitation

    OpenAIRE

    Dijk, Meine Pieter

    2008-01-01

    textabstractSmall-scale independent providers (SSIPs) and households are good for 10–69% of the household water supply and sometimes up to 95% of the sanitation solutions in cities in developing countries. Different types of SSIP can be distinguished. They could be allowed to make a more important contribution to drinking water and sanitation in a situation where many governments cannot be the only one to supply drinking water and sanitary services. Theoretical and practical arguments are use...

  11. Information Interpretation Code For Providing Secure Data Integrity On Multi-Server Cloud Infrastructure

    OpenAIRE

    Sathiya Moorthy Srinivsan; Chandrasekar Chaillah

    2014-01-01

    Data security is one of the biggest concerns in cloud computing environment. Although the advantages of storing data in cloud computing environment is extremely high, there arises a problem related to data missing. CyberLiveApp (CLA) supports secure application development between multiple users, even though cloud users distinguish their vision privileges during storing of data. But CyberLiveApp failed to integrate the system with certain cloud-based computing environments on multi-server. En...

  12. Evaluating ALWadHA for providing secure localisation for wireless sensor networks

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2013-09-01

    Full Text Available secure localisation algorithms that are able to work in a hostile environment. An attacker could compromise, or masquerade as, a beacon node and send incorrect location information. Localisation in a hostile environment is a critical problem in wireless...

  13. Large-Scale Survey Findings Inform Patients’ Experiences in Using Secure Messaging to Engage in Patient-Provider Communication and Self-Care Management: A Quantitative Assessment

    Science.gov (United States)

    Patel, Nitin R; Lind, Jason D; Antinori, Nicole

    2015-01-01

    Background Secure email messaging is part of a national transformation initiative in the United States to promote new models of care that support enhanced patient-provider communication. To date, only a limited number of large-scale studies have evaluated users’ experiences in using secure email messaging. Objective To quantitatively assess veteran patients’ experiences in using secure email messaging in a large patient sample. Methods A cross-sectional mail-delivered paper-and-pencil survey study was conducted with a sample of respondents identified as registered for the Veteran Health Administrations’ Web-based patient portal (My HealtheVet) and opted to use secure messaging. The survey collected demographic data, assessed computer and health literacy, and secure messaging use. Analyses conducted on survey data include frequencies and proportions, chi-square tests, and one-way analysis of variance. Results The majority of respondents (N=819) reported using secure messaging 6 months or longer (n=499, 60.9%). They reported secure messaging to be helpful for completing medication refills (n=546, 66.7%), managing appointments (n=343, 41.9%), looking up test results (n=350, 42.7%), and asking health-related questions (n=340, 41.5%). Notably, some respondents reported using secure messaging to address sensitive health topics (n=67, 8.2%). Survey responses indicated that younger age (P=.039) and higher levels of education (P=.025) and income (P=.003) were associated with more frequent use of secure messaging. Females were more likely to report using secure messaging more often, compared with their male counterparts (P=.098). Minorities were more likely to report using secure messaging more often, at least once a month, compared with nonminorities (P=.086). Individuals with higher levels of health literacy reported more frequent use of secure messaging (P=.007), greater satisfaction (P=.002), and indicated that secure messaging is a useful (P=.002) and easy

  14. Large-Scale Survey Findings Inform Patients' Experiences in Using Secure Messaging to Engage in Patient-Provider Communication and Self-Care Management: A Quantitative Assessment.

    Science.gov (United States)

    Haun, Jolie N; Patel, Nitin R; Lind, Jason D; Antinori, Nicole

    2015-12-21

    Secure email messaging is part of a national transformation initiative in the United States to promote new models of care that support enhanced patient-provider communication. To date, only a limited number of large-scale studies have evaluated users' experiences in using secure email messaging. To quantitatively assess veteran patients' experiences in using secure email messaging in a large patient sample. A cross-sectional mail-delivered paper-and-pencil survey study was conducted with a sample of respondents identified as registered for the Veteran Health Administrations' Web-based patient portal (My HealtheVet) and opted to use secure messaging. The survey collected demographic data, assessed computer and health literacy, and secure messaging use. Analyses conducted on survey data include frequencies and proportions, chi-square tests, and one-way analysis of variance. The majority of respondents (N=819) reported using secure messaging 6 months or longer (n=499, 60.9%). They reported secure messaging to be helpful for completing medication refills (n=546, 66.7%), managing appointments (n=343, 41.9%), looking up test results (n=350, 42.7%), and asking health-related questions (n=340, 41.5%). Notably, some respondents reported using secure messaging to address sensitive health topics (n=67, 8.2%). Survey responses indicated that younger age (P=.039) and higher levels of education (P=.025) and income (P=.003) were associated with more frequent use of secure messaging. Females were more likely to report using secure messaging more often, compared with their male counterparts (P=.098). Minorities were more likely to report using secure messaging more often, at least once a month, compared with nonminorities (P=.086). Individuals with higher levels of health literacy reported more frequent use of secure messaging (P=.007), greater satisfaction (P=.002), and indicated that secure messaging is a useful (P=.002) and easy-to-use (P≤.001) communication tool, compared

  15. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  16. The security analyzer: A security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.

    1986-09-01

    The Security Analyzer is a software tool capable of analyzing the effectiveness of a facility's security system. It is written in the Prolog logic programming computer language, using entity-relationship data modeling techniques. The program performs the following functions: (1) provides descriptive, locational and operational status information about intrusion detectors and assessment devices (i.e., ''sensors'' and ''cameras'') upon request; (2) provides for storage and retrieval of maintenance history information for various components of the security system (including intrusion detectors), and allows for changing that information as desired; (3) provides a ''search'' mode, wherein all paths are found from any specified physical location to another specified location which satisfy user chosen ''intruder detection'' probability and elapsed time criteria (i.e., the program finds the ''weakest paths'' from a security point of view). The first two of these functions can be provided fairly easily with a conventional database program; the third function could be provided using Fortran or some similar language, though with substantial difficulty. In the Security Analyzer program, all these functions are provided in a simple and straight-forward manner. This simplicity is possible because the program is written in the symbolic (as opposed to numeric) processing language Prolog, and because the knowledge base is structured according to entity-relationship modeling principles. Also, the use of Prolog and the entity-relationship modeling technique allows the capabilities of the Security analyzer program, both for knowledge base interrogation and for searching-type operations, to be easily expanded in ways that would be very difficult for a numeric and more algorithmically deterministic language such as Fortran to duplicate. 4 refs

  17. Recent Developments in Microbiological Approaches for Securing Mine Wastes and for Recovering Metals from Mine Waters

    Directory of Open Access Journals (Sweden)

    D. Barrie Johnson

    2014-04-01

    Full Text Available Mining of metals and coals generates solid and liquid wastes that are potentially hazardous to the environment. Traditional methods to reduce the production of pollutants from mining and to treat impacted water courses are mostly physico-chemical in nature, though passive remediation of mine waters utilizes reactions that are catalysed by microorganisms. This paper reviews recent advances in biotechnologies that have been proposed both to secure reactive mine tailings and to remediate mine waters. Empirical management of tailings ponds to promote the growth of micro-algae that sustain populations of bacteria that essentially reverse the processes involved in the formation of acid mine drainage has been proposed. Elsewhere, targeted biomineralization has been demonstrated to produce solid products that allow metals present in mine waters to be recovered and recycled, rather than to be disposed of in landfill.

  18. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  19. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  20. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  1. Geology and History of Water-Containment Ponds at U12n, U12t, and U12e Tunnels, Rainier Mesa, Nevada National Security Site

    International Nuclear Information System (INIS)

    Huckins-Gang, H.; Townsend, M.

    2011-01-01

    Tunnels constructed in Rainier Mesa at the Nevada National Security Site (formerly Nevada Test Site) intersected water-producing areas (perched well above the regional groundwater system) during mining and drilling. There was enough overall sustained flow from three of the tunnel complexes (U12n, U12t, and U12e, also known as N-Tunnel, T-Tunnel, and E-Tunnel), that ponds were constructed in drainages below the portals to contain the discharged water. Water flow has now been blocked from N-Tunnel and T-Tunnel, and the ponds there are dry; however, E-Tunnel continues to produce water. The Underground Test Area Sub-Project of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office is examining the possibility that contaminants from the tunnel complexes may be able to reach the regional groundwater flow system. Because some radiologically contaminated water was conveyed to these ponds, the ponds have been viewed as a potential source of groundwater contamination (in addition to the tunnel complexes themselves but part of the same hydrologic source term). Although the regional water table is very deep (greater than 305 meters [1,000 feet]) beneath the pond locations, some of the ponds were constructed on carbonate rocks, which some scientists think might provide a 'fast path' to the regional groundwater system. This report describes the geology and hydrologic conditions in the area of these three sets of tunnel ponds to aid in determining whether the ponds should be modeled as sources of contaminant migration. Data concerning the locations of the ponds, the volume of effluent discharged, and the concentration of tritium and other radionuclides in the water have been compiled from published and unpublished sources and included also.

  2. 33 CFR 165.1409 - Security Zones; Hawaii, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...

  3. 76 FR 17158 - Assumption Buster Workshop: Distributed Data Schemes Provide Security

    Science.gov (United States)

    2011-03-28

    ... national security systems, is seeking expert participants in a day-long workshop on the pros and cons of... AGENCY: The National Coordination Office (NCO) for the Networking and Information Technology Research and... Office for the Networking and Information Technology Research and Development (NITRD) Program on behalf...

  4. Clean power from deserts. The DESERTEC concept for energy, water and climate security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-07-01

    The main challenge for the future is to reclaim energy from renewable and clean sources in environmentally compatible ways. Here the deserts of the earth can play a key role. They receive about 700 times more energy from the sun than humankind consumes by burning fossil fuels, day by day. Deserts are the places with the best solar radiation conditions and with the least possible impact of collector deployment onto the biosphere on earth. In deserts, clean power can be produced by solar thermal power plants (CSP) in a truly sustainable way and at any volume of conceivable demand. Power can be transmitted with low losses by high voltage direct current (HVDC) lines to more than 90% of the world's population. This gives the deserts a new role: Together with the many other forms of accessible renewable energy the newly utilized desert would enable us to replace fossil fuels and thus end the ongoing destruction of our natural living conditions. To put this into practice, countries with deserts, countries with high energy demand and countries with technology competence must cooperate. This is an opportunity for the Mediterranean riparian regions of Europe, the Middle East and North Africa (EUMENA) to form a community for energy, water and climate security. With the political will, EUMENA countries could now launch 'EUMENA-DESERTEC' Program, to bring humankind back into balance with its environment, by putting deserts and technology into service for energy, water and climate security. This would be an important step towards creating a truly sustainable civilization.

  5. Conceptualizing and measuring energy security: A synthesized approach

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Mukherjee, Ishani

    2011-01-01

    This article provides a synthesized, workable framework for analyzing national energy security policies and performance. Drawn from research interviews, survey results, a focused workshop, and an extensive literature review, this article proposes that energy security ought to be comprised of five dimensions related to availability, affordability, technology development, sustainability, and regulation. We then break these five dimensions down into 20 components related to security of supply and production, dependency, and diversification for availability; price stability, access and equity, decentralization, and low prices for affordability; innovation and research, safety and reliability, resilience, energy efficiency, and investment for technology development; land use, water, climate change, and air pollution for sustainability; and governance, trade, competition, and knowledge for sound regulation. Further still, our synthesis lists 320 simple indicators and 52 complex indicators that policymakers and scholars can use to analyze, measure, track, and compare national performance on energy security. The article concludes by offering implications for energy policy more broadly. -- Highlights: → Energy security should consist of five dimensions related to availability, affordability, technology development, sustainability, and regulation. → The dimensions of energy security can be broken down into 20 components. → These components can be distilled into 320 simple indicators and 52 complex indicators.

  6. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  7. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  8. 33 CFR 165.1410 - Security Zones; Kauai, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Kauai, HI. 165..., HI. (a) Location. The following areas, from the surface of the water to the ocean floor, are security... Nawiliwili Harbor, Kauai, HI or within 3 nautical miles seaward of the Nawiliwili Harbor COLREGS DEMARCATION...

  9. Porous TiO2-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis

    Science.gov (United States)

    2017-01-01

    Gas sensors play an important role in our life, providing control and security of technical processes, environment, transportation and healthcare. Consequently, the development of high performance gas sensor devices is the subject of intense research. TiO2, with its excellent physical and chemical properties, is a very attractive material for the fabrication of chemical sensors. Meanwhile, the emerging technologies are focused on the fabrication of more flexible and smart systems for precise monitoring and diagnosis in real-time. The proposed cyber chemical systems in this paper are based on the integration of cyber elements with the chemical sensor devices. These systems may have a crucial effect on the environmental and industrial safety, control of carriage of dangerous goods and medicine. This review highlights the recent developments on fabrication of porous TiO2-based chemical gas sensors for their application in cyber chemical system showing the convenience and feasibility of such a model to provide the security and to perform the diagnostics. The most of reports have demonstrated that the fabrication of doped, mixed and composite structures based on porous TiO2 may drastically improve its sensing performance. In addition, each component has its unique effect on the sensing properties of material. PMID:29257076

  10. How does the media portray drinking water security in Indigenous communities in Canada? An analysis of Canadian newspaper coverage from 2000-2015

    Directory of Open Access Journals (Sweden)

    Steven Lam

    2017-03-01

    Full Text Available Abstract Background Drinking water insecurity and related health outcomes often disproportionately impact Indigenous communities internationally. Understanding media coverage of these water-related issues can provide insight into the ways in which public perceptions are shaped, with potential implications for decision-making and action. This study aimed to examine the extent, range, and nature of newspaper coverage of drinking water security in Canadian Indigenous communities. Methods Using ProQuest database, we systematically searched for and screened newspaper articles published from 2000 to 2015 from Canadian newspapers: Windspeaker, Toronto Star, The Globe and Mail, and National Post. We conducted descriptive quantitative analysis and thematic qualitative analysis on relevant articles to characterize framing and trends in coverage. Results A total of 1382 articles were returned in the search, of which 256 articles were identified as relevant. There was limited coverage of water challenges for Canadian Indigenous communities, especially for Métis (5% and Inuit (3% communities. Most stories focused on government responses to water-related issues, and less often covered preventative measures such as source water protection. Overall, Indigenous peoples were quoted the most often. Double-standards of water quality between Indigenous and non-Indigenous communities, along with conflict and cooperation efforts between stakeholders were emphasized in many articles. Conclusion Limited media coverage could undermine public and stakeholder interest in addressing water-related issues faced by many Canadian Indigenous communities.

  11. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  12. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  13. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  14. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  15. Information Communication and Technology for Water Resource Management and Food Security in Kenya: A Case Study of Kericho and Uasin Gishu Districts

    Science.gov (United States)

    Omboto, P. I.; Macharia, J.; Mbagaya, Grace; Standa, F. N.

    2011-01-01

    Recent reports on Kenya have indicated food insecurity and destruction of water catchments as serious problems facing the country. Despite the tremendous strides in Information and Communication Technology (ICT), the country has not taken advantage of the technology to improve food security by effectively managing her water resources. A survey on…

  16. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  17. 33 CFR 106.255 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and inspected, tested, calibrated, and...

  18. Emerging trends in ICT security

    CERN Document Server

    Akhgar, Babak

    2013-01-01

    Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach

  19. "Upstream Thinking": the catchment management approach of a water provider

    Science.gov (United States)

    Grand-Clement, E.; Ross, M.; Smith, D.; Anderson, K.; Luscombe, D.; Le Feuvre, N.; Brazier, R. E.

    2012-04-01

    directly held within the company, and second because it shows how local communities and groups are considered and valued by the company. Monitoring changes and providing a solid scientific base is also undertaken to prove the concept and justify any investment. The work carried out so far has highlighted that SWW's collaborative approach to catchment management is changing the relationship between private water suppliers in the UK and stakeholders or groups having an impact on water quality. This results in a progressive move from a situation where the polluter has to pay, to rewarding providers of clean water instead. The value of ecosystem payments of this kind is being discussed with the appropriate authorities (i.e. Natural England, and the Department for Environment, Food and Rural Affairs) so that it can form part of ensuring sustainable water supplies in future, with all the environmental and ecological benefits of clear raw waters in rivers, lakes and streams.

  20. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.230 Maritime Security (MARSEC) Level coordination and implementation. (a) The facility owner...

  1. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2006-01-01

    Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.

  2. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  3. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  4. Incentive Issues in Information Security Management

    Science.gov (United States)

    Lee, Chul Ho

    2012-01-01

    This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…

  5. Collaborative Adaptation Planning for Water Security: Preliminary Lessons, Challenges, and the Way Forward for Maipo Basin Adaptation Plan, Chile

    Science.gov (United States)

    Vicuna, S.; Scott, C. A.; Bonelli, S.; Bustos, E.; Meza, F. J.

    2014-12-01

    The Maipo basin holds 40% of Chile's total population and almost half of the country's Gross Domestic Product. The basin is located in the semiarid central region of the country and, aside from the typical pressures of growth in developing country basins, the Maipo river faces climate change impacts associated with a reduction in total runoff and changes in its seasonality. Surface water is the main water source for human settlements and economic activities including agriculture. In 2012 we started a research project to create a climate variability and climate change adaptation plan for the basin. The pillars of the plan are co-produced by researchers and a Scenario Building Team (SBT) with membership of relevant water and land use stakeholders (including from civil society, public and private sectors) in the basin. Following similar experiences in other regions in the world that have faced the challenges of dealing with long term planning under uncertainty, the project has divided the task of developing the plan into a series of interconnected elements. A critical first component is to work on the desired vision(s) of the basin for the future. In this regards, the "water security" concept has been chosen as a framework that accommodates all objectives of the SBT members. Understanding and quantifying the uncertainties that could affect the future water security of the basin is another critical aspect of the plan. Near and long term climate scenarios are one dimension of these uncertainties that are combined with base development uncertainties such as urban growth scenarios. A third component constructs the models/tools that allows the assessment of impacts on water security that could arise under these scenarios. The final critical component relates to the development of the adaptation measures that could avoid the negative impacts and/or capture the potential opportunities. After two years in the development of the adaptation plan a series of results has been

  6. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  7. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC) Level...

  8. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  9. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  10. 33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... disseminating appropriate security information to port stakeholders. ... Maritime Security (AMS) Committee. 103.310 Section 103.310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  11. China's new problems of food security revealed by the Food Equivalent Unit

    Directory of Open Access Journals (Sweden)

    Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN

    2014-02-01

    Full Text Available China's food security has a great influence on the world, and has always been the top priority in China. In recent years, as the concept of food security is evolving into one of nutrition security and the importance of food diversity is increasing, research based on nutrition security and broad food systems are increasingly needed in today's China. Thus, not only grain for human consumption, but also animal foods have been integrated into the Food Equivalent, which is used to analyze China's current agriculture system and reveal the water resource distribution. The results indicated that the average animal food consumption has risen by 78.6%, and now China's daily supply of animal food per capita has reached about 50% of that in the USA and 80% of that in the South Korea. So there exist an obvious disparity in animal food supply between China and these two countries. It is impossible for the China's current agricultural system to achieve the level in the USA. Under China's current agricultural system, the consumption proportion of feed grain had surpassed the consumption of food grain, increased sharply from 33% in 1992 to 67% in 2011. However, the growth potential of total grain output is approaching an upper limit, so the continued growth of feed grain demand exerts great pressure on the China's food supply. The discordance of the spatial distribution of water resource and virtual water revealed that China's current agriculture system had a low efficiency in being able to achieve food and nutrition security. China's current "grain farming" cannot meet the demand of increasing nutrition and appropriate resource utilization. The implementation of grassland agriculture appears feasible and necessary for saving feed grain, providing a large number of high-quality animal foods and appropriate water resource utilization.

  12. Report: EPA Needs to Assess the Quality of Vulnerability Assessments Related to the Security of the Nation’s Water Supply

    Science.gov (United States)

    Report #2003-M-00013, September 24, 2003. In connection with our ongoing evaluation of the Environmental Protection Agency’s (EPA’s) activities to enhance the security of the Nation’s water supply, we noted an issue that requires your immediate attention.

  13. 76 FR 70350 - West Oahu Offshore Security Zone

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1048] RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the navigable waters of Oahu's western...

  14. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  15. 33 CFR 165.720 - Safety/Security Zone: St. Johns River, Jacksonville, FL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: St. Johns... OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED... § 165.720 Safety/Security Zone: St. Johns River, Jacksonville, FL. (a) Location. The water and the land...

  16. Responding to the challenges of water security: the Eighth Phase of the International Hydrological Programme, 2014–2021

    Directory of Open Access Journals (Sweden)

    B. Jimenez-Cisneros

    2015-04-01

    Full Text Available This paper presents the major water challenges at global, regional and local levels, including the need to adapt to climate change. It relates how the International Hydrological Programme (IHP – an intergovernmental scientific programme – will respond in its Eighth Phase to the water-related risks and seize potential opportunities, thereby contributing to ensure Water Security at all levels. The Member States of UNESCO IHP periodically define priorities for research, technological development, innovation and education. To implement the priorities in a coordinated manner, the Member States can count on the team and the projects of IHP based at UNESCO, as well as on the "UNESCO Water Family|, consisting to date of a Category 1 centre UNESCO-IHE located in the Netherlands; the World Water Assessment Programme, based in Italy, which produces the World Water Development Report of the United Nations; 30 Category 2 water centres under the auspices of UNESCO; and 35 water chairs in various parts of the world. Governments can access the powerful network of the UNESCO Water Family through IHP and its Intergovernmental Council.

  17. Tele-Lab IT-Security: an Architecture for an online virtual IT Security Lab

    Directory of Open Access Journals (Sweden)

    Christoph Meinel

    2008-05-01

    Full Text Available Recently, Awareness Creation in terms of IT security has become a big thing – not only for enterprises. Campaigns for pupils try to highlight the importance of IT security even in the user’s early years. Common practices in security education – as seen in computer science courses at universities – mainly consist of literature and lecturing. In the best case, the teaching facility offers practical courses in a dedicated isolated computer lab. Additionally, there are some more or less interactive e-learning applications around. Most existing offers can do nothing more than impart theoretical knowledge or basic information. They all lack of possibilities to provide practical experience with security software or even hacker tools in a realistic environment. The only exceptions are the expensive and hard-to-maintain dedicated computer security labs. Those can only be provided by very few organizations. Tele-Lab IT-Security was designed to offer hands-on experience exercises in IT security without the need of additional hardware or maintenance expenses. The existing implementation of Tele-Lab even provides access to the learning environment over the Internet – and thus can be used anytime and anywhere. The present paper describes the extended architecture on which the current version of the Tele-Lab server is built.

  18. 33 CFR 103.305 - Composition of an Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... port stakeholders having a special competence in maritime security; and (7) Port stakeholders affected... Security (AMS) Committee. 103.305 Section 103.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  19. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  20. Security for service oriented architectures

    CERN Document Server

    Williams, Walter

    2014-01-01

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, includ

  1. Impact of lengthening open water season on food security in Alaska coastal communities: Global impacts may outweigh local "frontline" effects

    Science.gov (United States)

    Rolph, R.; Mahoney, A. R.

    2015-12-01

    Using ice concentration data from the Alaska Sea Ice Atlas from 1953-2013 for selected communities in Alaska, we find a consistent trend toward later freeze up and earlier breakup, leading a lengthened open water period. Such changes are often considered to bring a variety of "frontline" local impacts to Arctic coastal communities such as increased rates of coastal erosion. However, direct consequences of these changes to local food security (e.g. through impacts on subsistence activities and marine transport of goods) may be outweighed at least in the short term by the effects of large scale Arctic sea ice change coupled with global oil markets. For example, a later freeze-up might delay local hunters' transition from boats to snow-machines, but whether this trend will affect hunting success, especially in the next few years, is uncertain. Likewise, the magnitude of change in open water season length is unlikely to be sufficient to increase the frequency with which communities are served by barges. However, an expanding open water season throughout the Arctic has implications for the global economy, which can have indirect effects on local communities. In the Chukchi and Beaufort Seas, where rapid sea ice change has been accompanied by increased interest in oil and gas development, the U.S. Bureau of Ocean Energy Management currently requires drilling operations to cease 38 days prior to freeze up. Taking this into account, the lengthening open water season has effectively extended the drilling season for oil companies by 184% since the 1950s. If oil development goes ahead, local communities will likely experience a range of indirect impacts on food security due to increased vessel traffic and demand on infrastructure coupled with changes in local economies and employment opportunities. Increased likelihood of an oil spill in coastal waters also poses a significant threat to local food security. Thus, while Arctic coastal communities are already experiencing

  2. Perceptions of Water Ownership, Water Management, and the Responsibility of Providing Clean Water

    Directory of Open Access Journals (Sweden)

    Jacqueline Noga

    2013-11-01

    Full Text Available Perceptions of water and water related issues still render many under-researched topics. This study aims to further our knowledge regarding people’s perceptions of water and our understanding about the different ways individuals use water. The authors asked the question: Does the way an individual perceives water (i.e., as a commodity, a human right, private resource, public resource and/or natural resource influence consumption and conservation of water, and sentiments towards control and allocation of water? An exploratory online questionnaire was designed to generate qualitative and quantitative data of survey participants’ perceptions, beliefs and actions towards water issues, such as overconsumption and scarcity. Data analysis included comparison of the quantitative data regarding the non-statistical association between how an individual perceives water and the individual’s beliefs, as well as qualitative analysis of the comments using an iterative pattern coding technique. One hundred and sixty four individuals participated in the survey (75% completion rate and over 430 comments were made. Themes that emerged from the comments included: responsibility, scarcity, the value of water, knowledge gained and education needed. Comparison of the different perceptions of water revealed that different perceptions of what water is resulted in different beliefs about what the cost of water should be. These findings have implications for future water use, including what needs to change in order to increase appreciation for water issues.

  3. Ecological Security Pattern Analysis Based on InVEST and Least-Cost Path Model: A Case Study of Dongguan Water Village

    Directory of Open Access Journals (Sweden)

    Qian Lin

    2016-02-01

    Full Text Available The famous “world’s factory” city, Dongguan, like many other places in China, is a typical beneficiary of China’s Reform and Opening-up Policy. However, rapid urban sprawl and economic growth are at the expense of the destruction of the local environment. Therefore, it is of great importance to establish an ecological security network for sustainable development. InVEST models, effective tools to measure sensitivity and intensity of external threats to quantify habitat value, are used to calculate habitat quality of water and land. By combining structural connectivity and the Least-Cost Path model (LCP model, in which corridors are determined based on the minimum accumulative cost path between each critical point, ecological security patterns were calculated. According to the results, the northwest region of Dongguan, having a large quantity of farmlands and water and therefore many corridors and critical patches, is the most essential area in the overall security of ecological environments, which should be protected first. If developed, it should be dominated by eco-tourism and eco-agriculture. We hope that research on the ecological network, which includes critical patches and corridors formed by greenland and rivers, will lead toward better-informed proposals for local urban planning and regional sustainable development.

  4. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  5. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  6. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  7. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  8. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  9. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine Safety and Security Council, composed of senior Coast Guard officials, acts as policy advisor to the...

  10. Drinking Water - National Drinking Water Clearinghouse

    Science.gov (United States)

    Savings Septic Unsafe Disposable Wipe Woes FacebookLogo FOCUS AREAS Drinking Water Wastewater Training Security Conservation & Water Efficiency Water We Drink Source Water Protection SORA/COI EPA MOU CartIcon Links Listserv Educators Homeowners Operators Small Systems Drinking Water Read On Tap Latest

  11. Protecting livelihoods, boosting food security in Kenya | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-05-21

    May 21, 2015 ... Protecting livelihoods, boosting food security in Kenya ... America, and the Caribbean with funds from the Government of Canada's fast-start financing. ... Water management and food security in vulnerable regions of China.

  12. Economic resilience through "One-Water" management

    Science.gov (United States)

    Hanson, Randall T.; Schmid, Wolfgang

    2013-01-01

    Disruption of water availability leads to food scarcity and loss of economic opportunity. Development of effective water-resource policies and management strategies could provide resiliance to local economies in the face of water disruptions such as drought, flood, and climate change. To accomplish this, a detailed understanding of human water use and natural water resource availability is needed. A hydrologic model is a computer software system that simulates the movement and use of water in a geographic area. It takes into account all components of the water cycle--“One Water”--and helps estimate water budgets for groundwater, surface water, and landscape features. The U.S. Geological Survey MODFLOW One-Water Integrated Hydrologic Model (MODFLOWOWHM) software and scientific methods can provide water managers and political leaders with hydrologic information they need to help ensure water security and economic resilience.

  13. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    Science.gov (United States)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  14. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  15. 27 CFR 19.966 - Security.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.966 Section 19.966 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF... and Security § 19.966 Security. Proprietors shall provide security adequate to deter the unauthorized...

  16. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  17. Information security management with ITIL V3

    CERN Document Server

    Cazemier, Jacques A; Peters, Louk

    2010-01-01

    This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security ? providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security manageme

  18. Xingu Project - Integrating Land Use Planning and Water Governance in Amazonia: Towards Improved Freshwater Security in the Agricultural Frontier of Mato Grosso.

    Science.gov (United States)

    Krusche, A. V.; Ballester, M. V.; Neill, C.; Elsenbeer, H.; Johnson, M. S.; Coe, M. T.; Garavello, M.; Molina, S. G.; Empinotti, V.; Reichardt, F.; Deegan, L.; Harris, L.

    2014-12-01

    The main goal of this project is to identify how impacts from land conversion, cropland expansion and intensification of both crop and animal production interact to affect regional evapotranspiration, rainfall generation, river flooding, and water quality and stream habitats, allowing us to identify thresholds of change that will endanger agricultural production, livelihoods of non-agricultural settlers and the region's new urban population and infrastructure. We will survey the effects of this on (1) soybean farmers, (2) cattle ranchers, (3) small-scale farm families, (4) rural non-agriculturists, including fishers, and (5) urban residents and map their roles as stakeholders. We will also conduct current water use surveys among the different stakeholder groups, accompanied by questions on desired aspects for future freshwater security to identify targets for desirable outcomes of water governance strategies. These targets, together with the information on land use drivers, water quantity and quality and predicted scenarios for global changes will be incorporated into a fully integrated and interactive geospatially oriented socio-ecological model that can serve as framework for future water governance that enhances Freshwater Security in such systems. This is an international cooperation initiative lead by Brazil and with the participation of Canada, Germany and United States of America.

  19. 33 CFR 105.250 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... include procedures for identifying and responding to security system and equipment failures or...

  20. 33 CFR 104.260 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... procedures for identifying and responding to security system and equipment failures or malfunctions. ...

  1. Handbook of SCADA/control systems security

    CERN Document Server

    Radvanovsky, Robert

    2013-01-01

    The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide. Divided into five sections, the book examines topics comprising functions within

  2. MEMS and MOEMS for national security applications

    Science.gov (United States)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  3. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  4. Carboy Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors

  5. Cyber Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  6. Carboy Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, Daniel [Idaho National Laboratory, Idaho (United States)

    2012-03-15

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  7. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  8. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  9. A Portable Computer Security Workshop

    Science.gov (United States)

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  10. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  11. Security challenges for virtualization in cloud

    International Nuclear Information System (INIS)

    Tayab, A.

    2015-01-01

    Virtualization is a model that is vastly growing in IT industry. Virtualization provides more than one logical resource in one single physical machine. Infrastructure use cloud services and on behalf of virtualization, cloud computing is also a rapidly growing model of IT industry. Cloud provider and cloud user, both remain ignorant of each other's security. Since virtualization and cloud computing are rapidly expanding and becoming more and more complex in infrastructure, more security is required to protect them from potential attacks and security threats. Virtualization provides various benefits in terms of hardware utilization, resources protection, remote access and other resources. This paper intends to discuss the common exploits of security uses in the virtualized environment and focuses on the security threats from the attacker's perspective. This paper discuss the major areas of virtualized model environment and also address the security concerns. And finally presents a solution for secure valorization in IT infrastructure and to protect inter communication of virtual machines. (author)

  12. Impacts of Floods Events on Food Security

    Science.gov (United States)

    Caporali, E.; Pacetti, T.; Rulli, M. C.

    2017-12-01

    The analysis of the interactions among natural disasters and food security is particularly significant for developing countries where food availability (one of the four pillars of food security together with access, utilization and stability) can be highly jeopardize by extreme events that damage the primary access to food, i.e. the agriculture. The main objective of this study is to analyze the impact of flood events on food security for two disastrous flood events in Bangladesh on 2007 and in Pakistan on 2010, selected here as case studies based on the existing literature related to extreme floods.The adopted methodology integrates remote sensing data, agricultural statistics, and water footprint values in order to (i) evaluating the potentially affected agricultural areas; (ii) converting the affected areas into crop loss; (iii) estimating the associated calories and water footprint losses. In Bangladesh, the estimated lost rice is around 12.5% of the total potential production, which implies a 5.3% calories loss with respect to the total potential energy provided by rice and 4.4% of total WF associated to national food supply. In Pakistan, the results show a crops loss of 19% for sugarcane and 40% for rice, with a related calories loss of 8.5% and a WF loss of 13.5%.The results highlight the countries vulnerability to flood, being both countries strongly dependent on local agricultural production. The 2007 flood event reflected critically upon Bangladeshi food security, almost doubling the existing food deficit. The same happened in Pakistan where an already scarce food supply has been worsened by the 2010 flood.Method results are fully repeatable; whereas, for remote sensed data the sources of data are valid worldwide and the data regarding land use and crops characteristics are strongly site specific, which need to be carefully evaluated.These case studies stress the importance of integrating different analysis approaches to carry out an assessment of the

  13. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  14. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  15. Complicating food security: Definitions, discourses, commitments

    Directory of Open Access Journals (Sweden)

    William Ramp

    2014-12-01

    Full Text Available Food security is now commonly seen as one of the defining global issues of the century, intertwined with population and consumption shifts, climate change, environmental degradation, water scarcity, and the geopolitics attending globalization. Some analysts suggest that food security threats are so urgent that philosophical scruples must be set aside in order to concentrate all resources on developing and implementing radical strategies to avert a looming civilizational crisis. This article suggests that definitions of food security invoke commitments and have consequences, and that continued critical and conceptual attention to the language employed in food security research and policy is warranted.

  16. Securing cloud services a pragmatic approach to security architecture in the cloud

    CERN Document Server

    Newcombe, Lee

    2012-01-01

    This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.

  17. Barriers Preventing Food Security in Israel, 2050

    Directory of Open Access Journals (Sweden)

    Yoav Gal

    2013-03-01

    Full Text Available The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production limitations affecting long-term planning and the ability to ensure food security under these conditions. It was found that there are five key factors important for the decision process: population, land, water, technology and international trade. The data show that today Israel imports a very large scale of virtual land and virtual water in terms of agricultural products. This means that the attention of the decision makers must be diverted from considerations of short-term profit to long-term food security.

  18. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  19. The Market Value of Information System (IS) Security: An Event Study of E-Banking Service Providers

    Science.gov (United States)

    Brock, Linda

    2012-01-01

    Understanding the financial value resulting from IS security investments is critically important to organizations focused on protecting service confidentiality, integrity, and availability in order to preserve firm revenues and reputations. Quantifying the financial effect from IS security investments is difficult to derive. This study…

  20. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  1. Patient choice of providers in a preferred provider organization.

    Science.gov (United States)

    Wouters, A V; Hester, J

    1988-03-01

    This article is an analysis of patient choice of providers by the employees of the Security Pacific Bank of California and their dependents who have access to the Med Network Preferred Provider Organization (PPO). The empirical results show that not only is the PPO used by individuals who require relatively little medical care (as measured by predicted office visit charges) but that the PPO is most intensively used for low-risk services such as treatment for minor illness and preventive care. Also, the most likely Security Pacific Health Care beneficiary to use a PPO provider is a recently hired employee who lives in the south urban region, has a relatively low income, does not have supplemental insurance coverage, and is without previous attachments to non-PPO primary care providers. In order to maximize their ability to reduce plan paid benefits, insurers who contract with PPOs should focus on increasing PPO utilization among poorer health risks.

  2. Early warning smartphone diagnostics for water security and analysis using real-time pH mapping

    Science.gov (United States)

    Hossain, Md. Arafat; Canning, John; Ast, Sandra; Rutledge, Peter J.; Jamalipour, Abbas

    2015-12-01

    Early detection of environmental disruption, unintentional or otherwise, is increasingly desired to ensure hazard minimization in many settings. Here, using a field-portable, smartphone fluorimeter to assess water quality based on the pH response of a designer probe, a map of pH of public tap water sites has been obtained. A custom designed Android application digitally processed and mapped the results utilizing the global positioning system (GPS) service of the smartphone. The map generated indicates no disruption in pH for all sites measured, and all the data are assessed to fall inside the upper limit of local government regulations, consistent with authority reported measurements. This implementation demonstrates a new security concept: network environmental forensics utilizing the potential of novel smartgrid analysis with wireless sensors for the detection of potential disruption to water quality at any point in the city. This concept is applicable across all smartgrid strategies within the next generation of the Internet of Things and can be extended on national and global scales to address a range of target analytes, both chemical and biological.

  3. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  4. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  5. Using Trust for Secure Collaboration in Uncertain Environments

    DEFF Research Database (Denmark)

    Cahill, Vinny; Gray, Elizabeth; Seigneur, Jean-Marc

    2003-01-01

    The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.......The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration....

  6. Secure software development training course

    Directory of Open Access Journals (Sweden)

    Victor S. Gorbatov

    2017-06-01

    Full Text Available Information security is one of the most important criteria for the quality of developed software. To obtain a sufficient level of application security companies implement security process into software development life cycle. At this stage software companies encounter with deficit employees who able to solve problems of software design, implementation and application security. This article provides a description of the secure software development training course. Training course of application security is designed for co-education students of different IT-specializations.

  7. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  8. Freshwater Ecosystem Service Flow Model To Evaluate Regional Water Security: A Case Study In Beijing-Tianjin-Hebei Region, China

    Science.gov (United States)

    Li, D.; Li, S.

    2016-12-01

    Freshwater service, as the most important support ecosystem service, is essential to human survival and development. Many studies have evidenced the spatial differences in the supply and demand of ecosystem services and raised the concept of ecosystem service flow. However, rather few studies quantitatively characterize the freshwater service flow. This paper aims to quantify the effect of freshwater ecosystem service flow on downstream areas in Beijing-Tianjin-Hebei (BTH) region, China over 2000, 2005 and 2010. We computed the freshwater ecosystem service provision with InVEST model. We calculated freshwater ecosystem service consumption with water quota method. We simulated the freshwater ecosystem service flow using our simplified flow model and assessed the regional water security with the improved freshwater security index. The freshwater provision service mainly depends on climatic factors that cannot be influenced by management, while the freshwater consumption service is constrained by human activities. Furthermore, the decrease of water quota for agricultural, domestic and industrial water counteracts the impact of increasing freshwater demand. The analysis of freshwater ecosystem service flow reveals that the majority area of the BTH (69.2%) is affected by upstream freshwater. If freshwater ecosystem service flow is considered, the water safety areas of the whole BTH account for 66.9%, 66.1%, 71.3%, which increase 6.4%, 6.8% and 5.7% in 2000, 2005 and 2010, respectively. These results highlight the need to understand the teleconnections between distant freshwater ecosystem service provision and local freshwater ecosystem service use. This approach therefore helps managers choose specific management and investment strategies for critical upstream freshwater provisions across different regions.

  9. Accounting for Water Insecurity in Modeling Domestic Water Demand

    Science.gov (United States)

    Galaitsis, S. E.; Huber-lee, A. T.; Vogel, R. M.; Naumova, E.

    2013-12-01

    Water demand management uses price elasticity estimates to predict consumer demand in relation to water pricing changes, but studies have shown that many additional factors effect water consumption. Development scholars document the need for water security, however, much of the water security literature focuses on broad policies which can influence water demand. Previous domestic water demand studies have not considered how water security can affect a population's consumption behavior. This study is the first to model the influence of water insecurity on water demand. A subjective indicator scale measuring water insecurity among consumers in the Palestinian West Bank is developed and included as a variable to explore how perceptions of control, or lack thereof, impact consumption behavior and resulting estimates of price elasticity. A multivariate regression model demonstrates the significance of a water insecurity variable for data sets encompassing disparate water access. When accounting for insecurity, the R-squaed value improves and the marginal price a household is willing to pay becomes a significant predictor for the household quantity consumption. The model denotes that, with all other variables held equal, a household will buy more water when the users are more water insecure. Though the reasons behind this trend require further study, the findings suggest broad policy implications by demonstrating that water distribution practices in scarcity conditions can promote consumer welfare and efficient water use.

  10. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  11. Monitoring Food Security Indicators from Remote Sensing and Predicting Cereal Production in Afghanistan

    Science.gov (United States)

    Pervez, M. S.; Budde, M. E.; Rowland, J.

    2015-12-01

    We extract percent of basin snow covered areas above 2500m elevation from Moderate Resolution Imaging Spectroradiometer (MODIS) 500-meter 8-day snow cover composites to monitor accumulation and depletion of snow in the basin. While the accumulation and depletion of snow cover extent provides an indication of the temporal progression of the snow pack, it does not provide insight into available water for irrigation. Therefore, we use snow model results from the National Operational Hydrologic Remote Sensing Center to quantify snow water equivalent and volume of water available within the snowpack for irrigation. In an effort to understand how water availability, along with its inter-annual variability, relates to the food security of the country, we develop a simple, effective, and easy-to-implement model to identify irrigated areas across the country on both annual and mid-season basis. The model is based on applying thresholds to peak growing season vegetation indices—derived from 250-meter MODIS images—in a decision-tree classifier to separate irrigated crops from non-irrigated vegetation. The spatial distribution and areal estimates of irrigated areas from these maps compare well with irrigated areas classified from multiple snap shots of the landscape from Landsat 5 optical and thermal images over selected locations. We observed that the extents of irrigated areas varied depending on the availability of snowmelt and can be between 1.35 million hectares in a year with significant water deficit and 2.4 million hectares in a year with significant water surplus. The changes in the amount of available water generally can contribute up to a 30% change in irrigated areas. We also observed that the strong correlation between inter-annual variability of irrigated areas and the variability in the country's cereal production could be utilized to predict an annual estimate of cereal production, providing early indication of food security scenarios for the country.

  12. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  13. 36 CFR 1275.22 - Security.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...

  14. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  15. Social Security for China’s Migrant Workers – Providing for Old Age

    Directory of Open Access Journals (Sweden)

    Andrew Watson

    2009-01-01

    Full Text Available The concept of “migrant workers” derives from the household registration system of China’s planned economy period. The continued existence of that system conflicts with the development of an integrated labour market. The current social security system, based on household registration and a large number of local pools, discriminates against migrant workers because of their mobility and the lack of mechanisms to transfer benefits between pools. As a result, migrants have made major contributions to China’s economic development but do not get the same benefits as urban residents. Faced with this challenge, China’s government has begun to introduce policy reforms to improve social security for migrants. This article explores this development through a focus on old-age insurance. It analyses the special needs of migrants, the obstacles facing policy development and the proposed solutions. It argues that social justice and social equity require the development of a system that treats all citizens equally, and that the logic of an integrated labour market will ultimately require a unified national system of old-age insurance.

  16. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  17. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  18. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  19. Evaluating Common Privacy Vulnerabilities in Internet Service Providers

    Science.gov (United States)

    Kotzanikolaou, Panayiotis; Maniatis, Sotirios; Nikolouzou, Eugenia; Stathopoulos, Vassilios

    Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users' needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.

  20. Temporal and Spatial Distribution of Ecological Security in Arid Region Based on GIS: A Case Study in Xinjiang

    Science.gov (United States)

    Zhang, Q.; Song, W.; Yang, J.

    2017-12-01

    Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy

  1. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  2. 33 CFR 165.500 - Safety/Security Zones; Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zones; Chesapeake... HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS... Safety/Security Zones; Chesapeake Bay, Maryland. (a) Definitions. (1) Certain Dangerous Cargo (CDC) means...

  3. Evaluation of Small-Scale Providers of Water Supply and Sanitation Services in Peru

    OpenAIRE

    World Bank

    2007-01-01

    The Water and Sanitation Program (WSP), administered by the World Bank, helps countries find sustainable solutions to ensure efficient delivery of the quality water supply and sanitation services the population demands. The WSP is carrying out a systematic analysis in several countries to identify the role of small-scale providers (SSP) of water and sanitation services to poor populations ...

  4. Sustainable Water Infrastructure Asset Management: A Gap Analysis of Customer and Service Provider Perspectives

    Directory of Open Access Journals (Sweden)

    Sangjong Han

    2015-09-01

    Full Text Available The ultimate goal of urban water infrastructure asset management may be sustainable water supply with satisfaction for customers. In this work, we attempted to evaluate the gaps between the perspectives of customers and service providers in Korea’s water infrastructure asset management. To evaluate the customers’ perspective, a hierarchical questionnaire survey was conducted to estimate the weights of influence for six customer values and their attributes on Korean water utility management. To evaluate the service providers’ perspective, an AHP (Analytic Hierarchy Process analysis was performed to estimate the weights of influence for the customer values and their PIs (performance indicators. The gap analysis results show that customers place higher value on customer service satisfaction (emotion and information than do the service providers (managers, whereas the managers place more value on affordability than do the customers. The findings from this work imply that improving customer service is effective in satisfying the desirable water LOS (level of service for customers. Recommendations have also been provided for administrators and engineers to develop integrated decision-making systems that can reflect customer needs regarding the improvement of their water infrastructure asset management. The findings from this work may be helpful for the Korean government and water supply utilities in improving the sustainability of their water infrastructure asset management.

  5. Fuel supply security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    Stable fuel supply is a prerequisite for any nuclear power program including ISER-PIUS. It encompasses procurement of uranium ore, enriched uranium and fuel elements. Uranium is different from oil in that it can be stockpiled for more than a decade besides the fact that the core residence time is as long as six years, for example in the case of ISER-PIUS. These basic fuel characteristics are favoring nuclear fuel over others in terms of supply security. The central concern will be a gradual increase in prices of uranium and enrichment. Under the present glut situation with the worldwide prevalence of LWRs, fuel supply security seems ensured for the time being till the middle of 21st century. It is estimated that by the turn of the century, the free world will have roughly 450 GWe capacity of nuclear power. If 10 % is supplied for ISER-PIUS, more than 200 modules of 200 MWe ISER-PIUS may be deployed all over the world probably starting around 2000. As part of the fuel supply security consideration, heavy water reactor (HWR) may seem interesting to such a country as Indonesia where there is uranium resources but no enrichment capability. But it needs heavy water instead and the operation is not so easy as of LWR, because of the positive void coefficient as was seen at the Chernobyl-4. Safeguarding of the fuel is also difficult, because it lends itself to on line refueling. The current and future situation of the fuel supply security for LWR seem well founded and established long into the future. (Nogami, K.)

  6. EU-Russia Relations Regarding Water Resources in Central Asia

    Directory of Open Access Journals (Sweden)

    Anastasia Likhacheva

    2014-05-01

    Full Text Available In Central Asia, the water deficit and water-energy problem have been one of among the most acute and conflict-ridden challenges for the sustainable development of the region and for regional security. Key trade and investment partners, including Russia and the European Union, could play a considerable role in influencing this issue, due to the long-lasting status quo, the inability to find a solution through intra-regional dialogue and the region’s rising dependence on foreign trade. Indeed, water-related interactions between Russia and the EU have been developing in a complementary manner. The EU possesses new technologies and its members have access to long-term capital markets, while Russia carries influence through providing security, regulating migration and holding a favourable political position for offering mediation services to the republics of Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan. This article examines EU-Russia relations regarding water issues in Central Asia over the medium term. By analyzing cooperative and non-cooperative strategies used by the major stakeholders in the water conflict (the five republics and the third parties of Russia and the EU, it confirms the continuous complementary character of EU and Russian activities in this context. Russia will take responsibility for moderating the principal questions (as with the construction of big dams such as Rogunor Kambarata, as they relate to the provision of security guarantees. The EU will act through providing support for water companies from small and medium-sized enterprises, and promoting the European Water Initiative principles and by developing its investment policy. The intersection of interests is possible when if Russia will attracts an independent arbiter, such as an actor available to provide guarantees related to the values of professional objectivism, human rights support and environment protection. These issues inevitably arise with

  7. International Cooperation for the Training of Water Managers from Developing Countries

    Science.gov (United States)

    Aswathanarayana, U.

    2007-12-01

    Water is the key to the well being of a community. On one hand, water security is linked to food security, as food cannot be grown without water. On the other hand, water security is linked to environmental security, as water is needed to maintain the health of a community. International cooperation is proposed for the training in Hyderabad, India, with international faculty, of ~ 300 water managers from the developing countries at an estimated cost of ~USD 3300/- per candidate (including ~ USD 1800/- for international travel), through ten interactive and customized training programmes during the period of five years, to enable them to address two crucial issues affecting the poor in the developing countries, namely, access to affordable water and coping with water scarcity. Ways of Good governance and geographical targeting of poverty alleviation programmes are built into each training programme. Each training programme will be for about three weeks (inclusive of field work). Each course will have a component common to all, plus a component customized to the biophysical and socioeconomic situation in a candidate's country. Ten course manuals will be produced. which can later be published commercially as low-cost volumes, for the benefit of the readership in the Developing countries . Each candidate will be provided his own computer, and software, and individual faculty adviser. On the basis of the training received, a candidate should be able to carry with him at the end of the course a draft outline of techno-socio-economic action plan for his country/area in respect of the theme of the course, prepared by himself/herself. A copy of this outline would be provided to the World Bank, and relevant organizations for follow- up activity

  8. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  9. Role of small-scale independent providers in water and sanitation

    NARCIS (Netherlands)

    M.P. van Dijk (Meine Pieter)

    2008-01-01

    textabstractSmall-scale independent providers (SSIPs) and households are good for 10–69% of the household water supply and sometimes up to 95% of the sanitation solutions in cities in developing countries. Different types of SSIP can be distinguished. They could be allowed to make a more important

  10. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    Science.gov (United States)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto

  11. Effective ASCII-HEX steganography for secure cloud

    International Nuclear Information System (INIS)

    Afghan, S.

    2015-01-01

    There are many reasons of cloud computing popularity some of the most important are; backup and rescue, cost effective, nearly limitless storage, automatic software amalgamation, easy access to information and many more. Pay-as-you-go model is followed to provide everything as a service. Data is secured by using standard security policies available at cloud end. In spite of its many benefits, as mentioned above, cloud computing has also some security issues. Provider as well as customer has to provide and collect data in a secure manner. Both of these issues plus efficient transmitting of data over cloud are very critical issues and needed to be resolved. There is need of security during the travel time of sensitive data over the network that can be processed or stored by the customer. Security to the customer's data at the provider end can be provided by using current security algorithms, which are not known by the customer. There is reliability problem due to existence of multiple boundaries in the cloud resource access. ASCII and HEX security with steganography is used to propose an algorithm that stores the encrypted data/cipher text in an image file which will be then sent to the cloud end. This is done by using CDM (Common Deployment Model). In future, an algorithm should be proposed and implemented for the security of virtual images in the cloud computing. (author)

  12. Analyzing Security-Enhanced Linux Policy Specifications

    National Research Council Canada - National Science Library

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  13. Building a new storyline for Florida's domestic security to provide future resiliency for the state

    OpenAIRE

    Pape, Dominick D.

    2008-01-01

    CHDS State/Local Quickly after the 9/11 event, the state of Florida drafted one of the Nation's first comprehensive counterterrorism strategies to aid in the protection of the state's visitors and citizens. This strategy was drafted early in the new paradigm of Homeland Security. The strategy had several modifications over the years but has not had a comprehensive review since its inception. Many things have changed in the arena of Homeland Security since that first step after the 9/11 ...

  14. Understanding and managing the food-energy-water nexus - opportunities for water resources research

    Science.gov (United States)

    Cai, Ximing; Wallington, Kevin; Shafiee-Jood, Majid; Marston, Landon

    2018-01-01

    Studies on the food, energy, and water (FEW) nexus lay a shared foundation for researchers, policy makers, practitioners, and stakeholders to understand and manage linked production, utilization, and security of FEW systems. The FEW nexus paradigm provides the water community specific channels to move forward in interdisciplinary research where integrated water resources management (IWRM) has fallen short. Here, we help water researchers identify, articulate, utilize, and extend our disciplinary strengths within the broader FEW communities, while informing scientists in the food and energy domains about our unique skillset. This paper explores the relevance of existing and ongoing scholarship within the water community, as well as current research needs, for understanding FEW processes and systems and implementing FEW solutions through innovations in technologies, infrastructures, and policies. Following the historical efforts in IWRM, hydrologists, water resources engineers, economists, and policy analysts are provided opportunities for interdisciplinary studies among themselves and in collaboration with energy and food communities, united by a common path to achieve sustainability development goals.

  15. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  16. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  17. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  18. Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users

    Science.gov (United States)

    Edwards, Keith

    2015-01-01

    Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…

  19. Teaching Web Security Using Portable Virtual Labs

    Science.gov (United States)

    Chen, Li-Chiou; Tao, Lixin

    2012-01-01

    We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

  20. Securing social media in the enterprise

    CERN Document Server

    Dalziel, Henry

    2015-01-01

    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media wi

  1. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

    Directory of Open Access Journals (Sweden)

    Christian Schmitt

    2015-07-01

    Full Text Available This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

  2. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  3. Water security: How much is enough?

    CSIR Research Space (South Africa)

    Oelofse, Suzanna HH

    2015-11-01

    Full Text Available scored below 50% 13 How much is enough? Life expectancy = 62 year (MRC, 2014) Basic human needs = 25 litre/person/day = 9125 litre/person/annum Lifetime basic water requirement (25*365*62) = 565 750 litres = 113 x 5000 litres 14... Current water demand for Basic Human Needs • 54 million (StatsSA, 2014) • 1 350 000 m3 /day required for basic human needs = 270 000 x 5000 Litres/day Water scarce = < 1 000 m3/capita/annum Water stressed = < 1700 m3/capita/annum 15...

  4. Peru Water Resources: Integrating NASA Earth Observations into Water Resource Planning and Management in Perus La Libertad Region

    Science.gov (United States)

    Padgett-Vasquez, Steve; Steentofte, Catherine; Holbrook, Abigail

    2014-01-01

    Developing countries often struggle with providing water security and sanitation services to their populations. An important aspect of improving security and sanitation is developing a comprehensive understanding of the country's water budget. Water For People, a non-profit organization dedicated to providing clean drinking water, is working with the Peruvian government to develop a water budget for the La Libertad region of Peru which includes the creation of an extensive watershed management plan. Currently, the data archive of the necessary variables to create the water management plan is extremely limited. Implementing NASA Earth observations has bolstered the dataset being used by Water For People, and the METRIC (Mapping EvapoTranspiration at High Resolution and Internalized Calibration) model has allowed for the estimation of the evapotranspiration values for the region. Landsat 8 imagery and the DEM (Digital Elevation Model) from the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) sensor onboard Terra were used to derive the land cover information, and were used in conjunction with local weather data of Cascas from Peru's National Meteorological and Hydrological Service (SENAMHI). Python was used to combine input variables and METRIC model calculations to approximate the evapotranspiration values for the Ochape sub-basin of the Chicama River watershed. Once calculated, the evapotranspiration values and methodology were shared Water For People to help supplement their decision support tools in the La Libertad region of Peru and potentially apply the methodology in other areas of need.

  5. Protecting food security when facing uncertain climate: Opportunities for Afghan communities

    Science.gov (United States)

    Salman, Dina; Amer, Saud A.; Ward, Frank A.

    2017-11-01

    Climate change, population growth, and weakly developed water management institutions in many of the world's dry communities have raised the importance of designing innovative water allocation methods that adapt to water supply fluctuations while respecting cultural sensitivities. For example, Afghanistan faces an ancient history of water supply fluctuations that have contributed to periodic food shortage and famine. Poorly designed and weakly enforced water allocation methods continue to result in agriculture sector underperformance and periodic food shortages when water shortfalls occur. To date, little research has examined alternative water sharing rules on a multi-basin scale to protect food security for a subsistence irrigation society when the community faces water shortage. This paper's contribution examines the economic performance of three water-sharing mechanisms for three basins in Afghanistan with the goal of protecting food security for crop irrigation under ongoing threats of drought, while meeting growing demands for food in the face of anticipated population growth. We achieved this by formulating an integrated empirical optimization model to identify water-sharing measures that minimize economic losses while protecting food security when water shortages occur. Findings show that implementation of either a water trading policy or a proportional shortage policy that respects cultural sensitivities has the potential to raise economic welfare in each basin. Such a policy can reduce food insecurity risks for all trading provinces within each basin, thus being a productive institution for adapting to water shortage when it occurs. Total economic welfare gains are highest when drought is the most severe for which suffering would otherwise be greatest. Gains would be considerably higher if water storage reservoirs were built to store wet year flows for use in dry years. Our results light a path for policy makers, donors, water administrators, and farm

  6. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  7. Security Provision and Political Formation in Hybrid Orders

    Directory of Open Access Journals (Sweden)

    Michael Lawrence

    2017-08-01

    Full Text Available The security sector reform literature is increasingly turning towards the inclusion of non-state security providers, but the long-term patterns of political development to which such engagement might contribute remain underexplored. This article thus provides several lenses with which to understand the relationship between non-state security provision and political development. It first presents three perspectives (functionalism, political economy, and communitarianism with which to understand the nature and behavior of non-state security providers. Second, it outlines five possible long-term trajectories of political formation and the role of non-state security providers in each. These discussions highlight the idea of hybridity, and the remainder of the paper argues that the concept can be usefully applied in (at least two ways. The third section proposes that hybridity can help overcome longstanding but misleading conceptual binaries, while the fourth rearticulates hybridity as a dynamic developmental process – 'hybridization' – that can be contrasted with security politics as the underlying logic by which security providers (both state and non-state interact and change over time.

  8. Security basics for computer architects

    CERN Document Server

    Lee, Ruby B

    2013-01-01

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support fo

  9. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  10. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  11. 7 CFR 1786.58 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1786.58 Section 1786.58 Agriculture... Discounted Prepayments on RUS Direct/Insured Loans § 1786.58 Security. If, after prepayment of RUS Notes, the... be, will consider request for the accommodation of such liens for the purpose of providing security...

  12. Agriculture and Energy: Implications for Food Security, Water, and Land Use

    Science.gov (United States)

    Tokgoz, S.; Zhang, W.; Msangi, S.; Bhandary, P.

    2011-12-01

    population under hunger and poverty. In light of these threats and opportunities facing the global food system, the proposed study takes a long-term perspective and addresses the main medium and long- term drivers of agricultural markets using the International Model for Policy Analysis of Agricultural Commodities and Trade developed by the Environment and Production Technology Division of IFPRI to project future production, consumption, and trade of key agricultural commodities. The main objective of the study is to analyze the link between energy and agricultural markets, focusing on the "new" role of agriculture as a supplier of energy for transportation through biofuels, and the subsequent impact on land use and demand for water from the agricultural sector. In this context, this study incorporates various scenarios of future energy demand and energy price impacts on global agricultural markets (food prices and food security), water use implications (irrigation water consumption by agricultural sector), and land use implications (changes in national and global crop area). The scenarios are designed to understand the impact of energy prices on biofuel production, cost of production for agricultural crops, conversion of rainfed area to irrigated area, and necessary levels of crop productivity growth to counter these effects.

  13. Assessing water availability over peninsular Malaysia using public domain satellite data products

    International Nuclear Information System (INIS)

    Ali, M I; Hashim, M; Zin, H S M

    2014-01-01

    Water availability monitoring is an essential task for water resource sustainability and security. In this paper, the assessment of satellite remote sensing technique for determining water availability is reported. The water-balance analysis is used to compute the spatio-temporal water availability with main inputs; the precipitation and actual evapotranspiration rate (AET), both fully derived from public-domain satellite products of Tropical Rainfall Measurement Mission (TRMM) and MODIS, respectively. Both these satellite products were first subjected to calibration to suit corresponding selected local precipitation and AET samples. Multi-temporal data sets acquired 2000-2010 were used in this study. The results of study, indicated strong agreement of monthly water availability with the basin flow rate (r 2 = 0.5, p < 0.001). Similar agreements were also noted between the estimated annual average water availability with the in-situ measurement. It is therefore concluded that the method devised in this study provide a new alternative for water availability mapping over large area, hence offers the only timely and cost-effective method apart from providing comprehensive spatio-temporal patterns, crucial in water resource planning to ensure water security

  14. Privately Provided Accommodation Service Quality and Customer Satisfaction

    Directory of Open Access Journals (Sweden)

    Joshua Mugambwa

    2016-04-01

    Full Text Available Privately provided accommodation is a growing service in Uganda’s higher education sector due to education liberalization and demand for education. This research took a case study of Nsamizi Training Institute of Social Development (NTISD to determine the relationship between privately provided accommodation service quality and customer satisfaction. Specifically, the objectives of the study were (a to find out the relationship between security and NTISD students’ satisfaction with privately provided accommodation, and (b to find out the hierarchical level of importance of NTISD student satisfaction of the three service quality dimensions (reliability, security, and tangibles with privately provided accommodation. Using quantitative and qualitative modes of data analysis and a sample of 300 students from 20 private hostels, this study established a strong positive significant relationship between security and satisfaction regarding privately provided accommodation. This implies that accommodation service providers should increase the quality of security so as to increase the satisfaction of students regarding privately provided accommodation. The study established the hierarchical order of importance from the most important service quality dimension, respectively, as follows: reliability, security, and tangibles. Therefore, private accommodation service managers should pay extra attention to the dimensions in the same order.

  15. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  16. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  17. 7 CFR 3550.108 - Security requirements (loans only).

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security requirements (loans only). 3550.108 Section..., DEPARTMENT OF AGRICULTURE DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS Section 504 Origination and Section 306C Water and Waste Disposal Grants § 3550.108 Security requirements (loans only). When the total...

  18. An artificial water body provides habitat for an endangered estuarine seahorse species

    Science.gov (United States)

    Claassens, Louw

    2016-10-01

    Anthropogenic development, especially the transformation of natural habitats to artificial, is a growing concern within estuaries and coastal areas worldwide. Thesen Islands marina, an artificial water body, added 25 ha of new estuarine habitat to the Knysna Estuary in South Africa, home to the Knysna seahorse. This study aimed to answer: (I) Can an artificial water body provide suitable habitat for an endangered seahorse species? And if so (II) what characteristics of this new habitat are important in terms of seahorse utilization? Four major habitat types were identified within the marina canals: (I) artificial reno mattress (wire baskets filled with rocks); (II) Codium tenue beds; (III) mixed vegetation on sediment; and (IV) barren canal floor. Seahorses were found throughout the marina system with significantly higher densities within the reno mattress habitat. The artificial water body, therefore, has provided suitable habitat for Hippocampus capensis, a noteworthy finding in the current environment of coastal development and the increasing shift from natural to artificial.

  19. 33 CFR 165.1312 - Security Zone; Portland Rose Festival on Willamette River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Portland Rose Festival on Willamette River. 165.1312 Section 165.1312 Navigation and Navigable Waters COAST GUARD... § 165.1312 Security Zone; Portland Rose Festival on Willamette River. (a) Location. The following area...

  20. Food Security and Women's Access to Natural Resources workshop; a brief report.

    Science.gov (United States)

    1997-01-01

    This article describes the workshop on Food Security and Women's Access to Natural Resources, held in January 1997 in Mumbai, India. The workshop was organized jointly by the Tata Institute of Social Sciences and the Indian Association of Women's Studies. The aim was to examine the food security situation in Maharashtra and Gujarat states in the west, the initiative to build alternative institutions, legal changes augmenting industrialization, and how traditional rights to common property resources can be legalized and how the poor can have access to new resources. The workshop organizers were unable to obtain experts on some topics. Core discussion centered on changes in industrialization, natural resources, gender and food security; access to natural resources and poverty alleviation programs; initiatives to create food security; and laws related to access to land and water. Discussions revealed the alienation of small and marginal farmers, landless laborers, and artisans from their livelihoods and survival strategies for these disenfranchised groups. The design of drought eradication and water conservation programs did not permit women and men working at construction sites to have access to the program assets. Case studies revealed situations in which women won the right of access to community water and then negotiated for land in lease. The women used landowners to negotiate credit and access development program assets, but normal channels of the National Bank of Agricultural Research and Development could have provided these benefits. Participants discussed how governments can be held accountable and how public funds could be used to revamp poverty alleviation and asset creation programs. All agreed that macrolevel development should give priority to agricultural development and legal constraints or problems. Five follow-up activities are identified.

  1. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  2. Model-based Impact Assessment of an Integrated Water Management Strategy on Ecosystem Services relevant to Food Security in Namibia

    Science.gov (United States)

    Luetkemeier, R.; Liehr, S.

    2012-04-01

    North-central Namibia is characterized by seasonal alterations of drought and heavy rainfall, mostly saline groundwater resources and a lack of perennial rivers. Water scarcity poses a great challenge for freshwater supply, harvest and food security against the background of high population growth and climate change. CuveWaters project aims at poverty reduction and livelihood improvement on a long term basis by introducing a multi-resource-mix as part of an integrated water resources management (IWRM) approach. Herein, creating water buffers by rainwater harvesting (RWH) and subsurface water storage as well as reuse of treated wastewater facilitates micro-scale gardening activities. This link constitutes a major component of a sustainable adaptation strategy by contributing to the conservation and improvement of basic food and freshwater resources in order to reduce drought vulnerability. This paper presents main findings of an impact assessment carried out on the effect of integrated water resources management on ecosystem services (ESS) relevant to food security within the framework of CuveWaters project. North-central Namibia is perceived as a social-ecological system characterized by a strong mutual dependence between natural environment and anthropogenic system. This fundamental reliance on natural resources highlights the key role of ESS in semi-arid environments to sustain human livelihoods. Among other services, food provision was chosen for quantification as one of the most fundamental ESS in north-central Namibia. Different nutritional values were utilized as indicators to adopt a demand-supply approach (Ecosystem Service Profile) to illustrate the ability of the ecosystem to meet people's nutritional requirements. Calculations have been conducted using both Bayesian networks to incorporate uncertainty introduced by the variability of monthly precipitation and the application of plant specific water production functions. Results show that improving the

  3. 7 CFR 765.252 - Lease of security.

    Science.gov (United States)

    2010-01-01

    ... as security for FLP loans. (1) For loans secured by real estate before December 23, 1985, the Agency has a security interest in any mineral rights the borrower has on the real estate pledged as... Lease of security. (a) Real estate leases. The borrower may lease real estate security provided the...

  4. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  5. 33 CFR 2.36 - Navigable waters of the United States, navigable waters, and territorial waters.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Navigable waters of the United States, navigable waters, and territorial waters. 2.36 Section 2.36 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL JURISDICTION Jurisdictional Terms § 2.36 Navigable waters...

  6. Incomplete water securitization in coupled hydro-human production sytems

    Science.gov (United States)

    van den Boom, B.; Pande, S.

    2012-04-01

    least good as for all the agents and that makes at least one agent better off . On the other hand, allocations under autarky EA will tend to be inefficient, meaning that other allocations may exist that would be preferred by some agents without compromising the interest of the others. By the same token, the in-between case with water securities will generally also fail to achieve full efficiency. Nonetheless, some securitization will always be at least as good as none while it will be better under conditions of water scarcity that are common in dryland area river basins. Hence water allocations under EWS will generally lead to an improvement over those under EA. It should be noted that the fully efficient equilibrium is only imaginary because it requires a separate water security for every agent, for every period and for every contingency that nature might hold. Clearly, because of dimensionality, this amount of securities will be beyond reach. Therefore, water securitization with a limited number of securities remains as the only practical option to deal with the inefficiency of water allocations under autarky. The economic theory of incomplete markets provides a useful framework to study limited water securitization. We apply the theory in the context of our water allocation framework using an institutional setting where downstream agent i may secure water from upstream agent (i-1) through an agreement that pays for (i-1)'s water savings. In this manner we identify (I-1) water securities, one for each pair of contiguous agents. Each security addresses, at the local level, the interaction of flows over time and over contingencies that might occur. Under scarcity conditions prevalent in many river basins, agents will show an interest to supply and demand such securities. In particular, downstream area can often make more productive use of water. Accordingly, in the water autarky equilibrium EA, they would be willing to pay for more water, while, at the same time

  7. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  8. Homeland Security Affairs Journal (press release)

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Homeland Defense and Security

    2013-01-01

    Homeland Security Affairs (HSA) is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  9. 7 CFR 1786.103 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1786.103 Section 1786.103 Agriculture... Prepayments on RUS Notes in the Event of a Merger of Certain RUS Electric Borrowers § 1786.103 Security. If... of providing security for loans the proceeds of which were used to prepay RUS Notes. Such lien...

  10. Security Management in a Multimedia System

    Science.gov (United States)

    Rednic, Emanuil; Toma, Andrei

    2009-01-01

    In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the database itself, in the same way, for all classic and multimedia records. So what is the reason for the creation of a security…

  11. What role for law in achieving transboundary drainage basin security?--the development and testing of the Legal Assessment Model (LAM) for transboundary watercourse states.

    Science.gov (United States)

    Wouters, P K

    2004-01-01

    The beneficial use of the world's transboundary waters raises difficult issues for drainage basin security on most parts of the globe. International law provides that each transboundary watercourse State is entitled to, and obliged to ensure, an "equitable and reasonable use" of these shared waters. The IWLRI developed and tested a Legal Assessment Model (LAM) through the work of interdisciplinary teams working in three different transboundary situations--China (upstream), Mozambique (downstream) and Palestine (shared groundwater). The LAM provides a tool for transboundary watercourse States to use in the preparation of their national water strategy for use at the national and international levels. The model should now be tested at the basin level, with a view to assisting to accomplish the peaceful and rational use of transboundary waters in line with the governing rule of international law and thereby to facilitate the overall policy objective of drainage basin security.

  12. Climate change, water security and the need for integrated policy development: the case of on-farm infrastructure investment in the Australian irrigation sector

    International Nuclear Information System (INIS)

    Maraseni, T N; Mushtaq, S; Reardon-Smith, K

    2012-01-01

    The Australian Government is currently addressing the challenge of increasing water scarcity through significant on-farm infrastructure investment to facilitate the adoption of new water-efficient pressurized irrigation systems. However, it is highly likely that conversion to these systems will increase on-farm energy consumption and greenhouse gas (GHG) emissions, suggesting potential conflicts in terms of mitigation and adaptation policies. This study explored the trade-offs associated with the adoption of more water efficient but energy-intensive irrigation technologies by developing an integrated assessment framework. Integrated analysis of five case studies revealed trade-offs between water security and environmental security when conversion to pressurized irrigation systems was evaluated in terms of fuel and energy-related emissions, except in cases where older hand-shift sprinkler irrigation systems were replaced. These results suggest that priority should be given, in implementing on-farm infrastructure investment policy, to replacing inefficient and energy-intensive sprinkler irrigation systems such as hand-shift and roll-line. The results indicated that associated changes in the use of agricultural machinery and agrochemicals may also be important. The findings of this study support the use of an integrated approach to avoid possible conflicts in designing national climate change mitigation and adaptation policies, both of which are being developed in Australia. (letter)

  13. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Naval Amphibious Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a...

  14. 33 CFR 165.709 - Security Zone; Charleston Harbor, Cooper River, South Carolina.

    Science.gov (United States)

    2010-07-01

    ..., Cooper River, South Carolina. 165.709 Section 165.709 Navigation and Navigable Waters COAST GUARD... § 165.709 Security Zone; Charleston Harbor, Cooper River, South Carolina. (a) Regulated area. The Coast Guard is establishing a fixed security zone on all waters of the Cooper River, bank-to-bank and surface...

  15. Reimagining SSR in Contexts of Security Pluralism

    Directory of Open Access Journals (Sweden)

    Megan Price

    2017-07-01

    Full Text Available Within the repertoire of international stabilization interventions, security sector reform (SSR and other conventional efforts to strengthen security and governance institutions remain central. There is increasing recognition that the policies and practices operating under the rubric of SSR are blind to the empirical reality of 'security pluralism' in most stabilization contexts. In these contexts, both security providers directly authorized by the state (police, army and a multitude of other coercive actors engage in producing and reproducing order, and enjoy varying degrees of public authority and legitimacy. Recognizing this, research was undertaken in three cities (Beirut, Nairobi, and Tunis to discern the conditions enabling various security providers to forge constructive relations with local populations and governance actors. Drawing on insights generated by these case studies, this article problematizes conventional state-centric approaches and argues for a bold reimagining of SSR. It makes the case for an SSR approach that prioritizes promoting the accountability and responsiveness of all security providers, integrating efforts to strengthen the social determinants of security, and enabling a phased transition from relational to rules-based systems of security provision and governance.

  16. Water Resources: the Central Component of the WEF Nexus?

    Science.gov (United States)

    Ding, K.; Gunda, T.; Hornberger, G. M.

    2017-12-01

    Increasing population growth, consumption of natural resources, and deterioration of the environment coupled with climate change impacts (such as increased variability in precipitation) will challenge our abilities to provide water, energy and food (WEF) to the global populace. Less developed areas, such as the countries in Sub-Saharan Africa, are particularly vulnerable to such resource issues due to immature governance and management structures and strategies. We introduce an integrated approach to resource security analysis, which traditionally has focused on the WEF components separately and apply the methods to a suite of countries in Sub-Saharan Africa. Specifically, we evaluate the inter-connected nature of WEF securities by considering physical, demographic, socioeconomic, health, and institutional parameters related to each of the resource securities and by analyzing the relationships among the metrics. For example, reported food deficits for countries are strongly correlated with reported levels of access to safe drinking water. Multivariate statistical analyses are applied to identify relationships among resources and to develop indices that robustly and comprehensively capture the WEF nexus. Our results indicate that water plays the central role in the WEF nexus, due to its extensive use for both food and energy production in these countries. This approach provides a framework for analyzing the WEF nexus in other regions of the world.

  17. Maternal secure-base scripts and children's attachment security in an adopted sample.

    Science.gov (United States)

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth

  18. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  19. The ultimate emergency measures to secure a NPP under an accidental condition with no designed power or water supply

    Energy Technology Data Exchange (ETDEWEB)

    Liang, K.S., E-mail: ksliang@alum.mit.edu [Institute of Nuclear Engineering and Science, National Tsing Hua University, 101 Sec. 2, Kuang-Fu Road, Hsinchu 30013, Taiwan (China); School of Nuclear Science and Engineering, Shanghai Jiao Tong University, 800 Dong-Chuan Road, Shanghai (China); Chiang, S.C. [Department of Nuclear Safety, Taiwan Power Company, 242 Sec. 3, Roosevelt Road, Taipei 10016, Taiwan (China); Hsu, Y.F.; Young, H.J.; Pei, B.S. [Institute of Nuclear Engineering and Science, National Tsing Hua University, 101 Sec. 2, Kuang-Fu Road, Hsinchu 30013, Taiwan (China); Wang, L.C. [Department of Nuclear Safety, Taiwan Power Company, 242 Sec. 3, Roosevelt Road, Taipei 10016, Taiwan (China)

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer An ultimate measure to secure core was developed, if power or water supply cannot be restored in time. Black-Right-Pointing-Pointer This ultimate measure was simulated by RELAP5-3D to verify the concept of this emergency plan. Black-Right-Pointing-Pointer Quantification of the required raw water injection rate was performed for NPPS in Taiwan Black-Right-Pointing-Pointer Reactor controlled depressurization within the 1st hour is essential to reduce the required raw water injection rate. Black-Right-Pointing-Pointer For PWR, even heat sink can be developed, RCP seal leak might eventually cause core uncover 10 h after seal leak occurs. - Abstract: In the recent nuclear catastrophe which occurred in Japan on March 11, 2011, several units of Fukushima conventional BWR experienced a total loss of power and water supply triggered by a heavy earthquake and a following Tsunami beyond design basis. In Fukushima accident it was observed that sea water was injected into reactors only after hydrogen explosion took place and it was considered a little too late to prevent core from damage. With regard to this fact, the Taiwan power company develops an ultimate measure to prevent reactor from encountering core damage, if either designed AC power or reactor water supply cannot be restored in time. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. Once any designed AC power or reactor water supply is made available, this DIVing plan will be activated to (1) depressurize reactor first, (2) inject any available water into reactor by any available power supply if this critical status cannot be restored in time, and (3) vent the containment if necessary to maintain containment integrity. In this paper the DIVing plan was simulated by RELAP5-3D to verify the concept of it and also to quantify the required raw water injection rate to prevent core from damage for both

  20. The ultimate emergency measures to secure a NPP under an accidental condition with no designed power or water supply

    International Nuclear Information System (INIS)

    Liang, K.S.; Chiang, S.C.; Hsu, Y.F.; Young, H.J.; Pei, B.S.; Wang, L.C.

    2012-01-01

    Highlights: ► An ultimate measure to secure core was developed, if power or water supply cannot be restored in time. ► This ultimate measure was simulated by RELAP5-3D to verify the concept of this emergency plan. ► Quantification of the required raw water injection rate was performed for NPPS in Taiwan ► Reactor controlled depressurization within the 1st hour is essential to reduce the required raw water injection rate. ► For PWR, even heat sink can be developed, RCP seal leak might eventually cause core uncover 10 h after seal leak occurs. - Abstract: In the recent nuclear catastrophe which occurred in Japan on March 11, 2011, several units of Fukushima conventional BWR experienced a total loss of power and water supply triggered by a heavy earthquake and a following Tsunami beyond design basis. In Fukushima accident it was observed that sea water was injected into reactors only after hydrogen explosion took place and it was considered a little too late to prevent core from damage. With regard to this fact, the Taiwan power company develops an ultimate measure to prevent reactor from encountering core damage, if either designed AC power or reactor water supply cannot be restored in time. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. Once any designed AC power or reactor water supply is made available, this DIVing plan will be activated to (1) depressurize reactor first, (2) inject any available water into reactor by any available power supply if this critical status cannot be restored in time, and (3) vent the containment if necessary to maintain containment integrity. In this paper the DIVing plan was simulated by RELAP5-3D to verify the concept of it and also to quantify the required raw water injection rate to prevent core from damage for both PWR and BWR plants in Taiwan, after the loss of passive cooling mechanism. Provided the passive cooling mechanism is lost

  1. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  2. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  3. 33 CFR 165.731 - Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River Entrance Channel.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: Cumberland... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED... Seventh Coast Guard District § 165.731 Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River...

  4. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  5. CIP Course Aids in Town's Water Supply Quest

    OpenAIRE

    Center for Homeland Defense and Security

    2012-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Michael Biasotti studied his town’s aging water infrastructure while taking the Critical Infrastructure: Vulnerability Analysis and Protection course at CHDS. His study would eventually provide a map for the town...

  6. 33 CFR 165.1408 - Security Zones; Maui, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Maui, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1408 Security Zones; Maui, HI... Harbor, Maui, HI or within 3 nautical miles seaward of the Kahului Harbor COLREGS DEMARCATION (See 33 CFR...

  7. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  8. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  9. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  10. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  11. Assessment of quality of water provided for wildlife in the Central Kalahari Game Reserve, Botswana

    Science.gov (United States)

    Selebatso, Moses; Maude, Glyn; Fynn, Richard W. S.

    2018-06-01

    Arid and semi-arid environments have low and unpredictable rainfall patterns resulting in limited availability of surface water for wildlife. In the Central Kalahari Game Reserve (CKGR) wildlife populations have lost access to natural surface water through cordon fences, livestock and human encroachment along the access routes. Artificial waterholes have been developed in the reserve to compensate for this loss. However, there have not been any assessments of the quality of water provided for wildlife and how that may be contributing to populations declines in the CKGR. We assessed water quality from 12 artificial waterholes against both Botswana and international livestock standards for drinking. Overall the quality of water provided is poor and poses a health risk to both animals and humans. Eight out of twelve boreholes tested exceeded the maximum acceptable Total Dissolved Solids (TDS) limits while three and four boreholes have toxic levels of lead and arsenic, respectively. Thus, pumping ground water could have more negative than positive impacts on wildlife thus defeating the intended management purpose. Failure to provide water of acceptable quality is a major concern for wildlife management in the CKGR and it may underlie some wildlife declines in the reserve. These findings confirm that restriction of populations from natural water sources create complex management challenges, especially where safe and sustainable alternative sources are scarce. Restriction of access of the population to natural water sources by fences and provision of poor quality water could compromise the overall fitness of wildlife populations and contribute to their decline.

  12. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  13. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including computer... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA...

  14. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  15. Secure and Efficient Routable Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  16. The Persistence of Informality: Small-Scale Water Providers in Manila’s Post-Privatisation Era

    Directory of Open Access Journals (Sweden)

    Deborah Cheng

    2014-02-01

    Full Text Available This article troubles the notion of a formal-informal dichotomy in urban water provision. Whereas expansion of a water utility typically involves the replacement of informal providers, the experience in Manila demonstrates that the rapid connection of low-income areas actually hinges, in part, on the selective inclusion and exclusion of these smaller actors. In this sense, privatisation has not eliminated small-scale water provision, but has led to the reconfiguration of its usage, blurring the boundaries between formal and informal. By examining the spatial and temporal evolution of small-scale water provision in Manila’s post-privatisation era, I show how certain spaces are seen as less serviceable than others. Critically, small providers working in partnership with the utilities are sanctioned because they supplement the utilities’ operations. The areas in which they work are considered served, factoring into aggregate coverage statistics, even though their terms of service are often less desirable than those of households directly connected to the utilities. In contrast, small providers that operate outside of the utilities’ zones of coverage are considered inferior, to be replaced. The result is a differentiation in informality – one in which the private utilities largely determine modes of access and thus the spatialisation of informal water provision.

  17. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  18. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  19. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  20. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  1. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  2. Cognitive Security of Wireless Communication Systems in the Physical Layer

    Directory of Open Access Journals (Sweden)

    Mustafa Harun Yılmaz

    2017-01-01

    Full Text Available While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

  3. Resilience and (in)security

    DEFF Research Database (Denmark)

    dunn cavelty, myriam; Kaufmann, Mareile; Kristensen, Kristian Søby

    2015-01-01

    , and redefine relations of security and insecurity. We show the increased attention – scholarly as well as political – given to resilience in recent times and provide a review of the state of critical security studies literature on resilience. We argue that to advance this discussion, resilience needs...

  4. Design-Efficiency in Security

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    In this document, we present our applied results on balancing security and performance using a running example, which is based on sensor networks. These results are forming a basis for a new approach to balance security and performance, and therefore provide design-­efficiency of key updates. We...

  5. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    .../Circ.) 1352 (``Cargo Stowage and Securing (CSS Code) Annex 14 Guidance on Providing Safe Working... Providing Safe Working Conditions for the Securing of Containers'') of the IMO 2010 CSS Code. A cargo safe.... Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I. Public Participation...

  6. The Need to Provide for Security in Old Age in Hierarchy of Needs-An Estimation of Its Ranking within the Polish Population

    Science.gov (United States)

    Roszkiewicz, Malgorzata

    2004-01-01

    The results of studies conducted in the last 5 years in Poland formed the basis for the assumption that amongst many needs an individual or a Polish household seeks to satisfy, the need to provide for security in old age takes a prominent position. Determining the position of this need among other needs as defined in Schrab's classification…

  7. The virtual water content of major grain crops and virtual water flows between regions in China.

    Science.gov (United States)

    Sun, Shi-Kun; Wu, Pu-Te; Wang, Yu-Bao; Zhao, Xi-Ning

    2013-04-01

    The disproportionate distribution of arable land and water resources has become a bottleneck for guaranteeing food security in China. Virtual water and virtual water trade theory have provided a potential solution to improve water resources management in agriculture and alleviate water crises in water-scarce regions. The present study evaluates the green and blue virtual water content of wheat, maize and rice at the regional scale in China. It then assesses the water-saving benefits of virtual water flows related to the transfer of the three crops between regions. The national average virtual water content of wheat, maize and rice were 1071 m(3) per ton (50.98% green water, 49.02% blue water ), 830 m(3) per ton (76.27% green water, 23.73% blue water) and 1294 m(3) per ton (61.90% green water, 38.10% blue water), respectively. With the regional transfer of wheat, maize and rice, virtual water flows reached 30.08 Gm(3) (59.91% green water, 40.09% blue water). Meanwhile, China saved 11.47 Gm(3) green water, while it consumed 7.84 Gm(3) more blue water than with a no-grain transfer scenario in 2009. In order to guarantee food security in China, the government should improve water productivity (reduce virtual water content of crops) during the grain production process. Meanwhile, under the preconditions of economic feasibility and land-water resources availability, China should guarantee the grain-sown area in southern regions for taking full advantage of green water resources and to alleviate the pressure on water resources. © 2012 Society of Chemical Industry.

  8. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes

  9. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation

  10. Directions for Web and E-Commerce Applications Security

    OpenAIRE

    Thuraisingham, Bhavani; Clifton, Chris; Gupta, Amar; Bertino, Elisa; Ferrari, Elena

    2003-01-01

    This paper provides directions for web and e-commerce applications security. In particular, access control policies, workflow security, XML security and federated database security issues pertaining to the web and ecommerce applications are discussed.

  11. Conceptualizing Biopolitics: Citizen-State Interactions in the Securing of Water Services in South Africa.

    Science.gov (United States)

    Bulled, Nicola

    2015-01-01

    Despite constitutional obligations to provide clean water to all citizens in South Africa, access to water and related services remains highly contested. The discord between constitutional promises and lived realities of water access, particularly through national infrastructure, provides a platform on which to examine Foucauldian notions of biopolitics, the control of populations through technologies of governing. Drawing on the situations of residents in the rural Vhembe district in the north eastern corner of the country, I examine how individuals conceptualize the relationship that exists between citizen and state and the responsibilities of each in post-Apartheid South Africa as it relates to water access. In addition, I describe strategies employed throughout South Africa to voice rights to water and how these approaches are perceived. Finally, I consider how the three primary forms of 'water citizenship'-citizen, agent, and subject-influence the current and future health of vulnerable residents.

  12. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. 33 CFR 165.1190 - Security Zone; San Francisco Bay, Oakland Estuary, Alameda, CA.

    Science.gov (United States)

    2010-07-01

    ..., Oakland Estuary, Alameda, CA. 165.1190 Section 165.1190 Navigation and Navigable Waters COAST GUARD... § 165.1190 Security Zone; San Francisco Bay, Oakland Estuary, Alameda, CA. (a) Location. The following area is a security zone: All navigable waters of the Oakland Estuary, California, from the surface to...

  14. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  15. Technologies for water resources management: an integrated approach to manage global and regional water resources

    Energy Technology Data Exchange (ETDEWEB)

    Tao, W. C., LLNL

    1998-03-23

    Recent droughts in California have highlighted and refocused attention on the problem of providing reliable sources of water to sustain the State`s future economic development. Specific elements of concern include not only the stability and availability of future water supplies in the State, but also how current surface and groundwater storage and distribution systems may be more effectively managed and upgraded, how treated wastewater may be more widely recycled, and how legislative and regulatory processes may be used or modified to address conflicts between advocates of urban growth, industrial, agricultural, and environmental concerns. California is not alone with respect to these issues. They are clearly relevant throughout the West, and are becoming more so in other parts of the US. They have become increasingly important in developing and highly populated nations such as China, India, and Mexico. They are critically important in the Middle East and Southeast Asia, especially as they relate to regional stability and security issues. Indeed, in almost all cases, there are underlying themes of `reliability` and `sustainability` that pertain to the assurance of current and future water supplies, as well as a broader set of `stability` and `security` issues that relate to these assurances--or lack thereof--to the political and economic future of various countries and regions. In this latter sense, and with respect to regions such as China, the Middle East, and Southeast Asia, water resource issues may take on a very serious strategic nature, one that is most illustrative and central to the emerging notion of `environmental security.` In this report, we have identified a suite of technical tools that, when developed and integrated together, may prove effective in providing regional governments the ability to manage their water resources. Our goal is to formulate a framework for an Integrated Systems Analysis (ISA): As a strategic planning tool for managing

  16. Secure Storage Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  17. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  18. Alleviating the water scarcity in the North China Plain: the role of virtual water and real water transfer

    Science.gov (United States)

    Zhang, Zhuoying; Yang, Hong; Shi, Minjun

    2016-04-01

    The North China Plain is the most water scarce region in China. Its water security is closely relevant to interregional water movement, which can be realized by real water transfers and/or virtual water transfers. This study investigates the roles of virtual water trade and real water transfer using Interregional Input-Output model. The results show that the region is receiving 19.4 billion m3/year of virtual water from the interregional trade, while exporting 16.4 billion m3/year of virtual water in the international trade. In balance, the region has a net virtual water gain of 3 billion m3/year from outside. Its virtual water inflow is dominated by agricultural products from other provinces, totalling 16.6 billion m3/year, whilst its virtual water export is dominated by manufacturing sectors to other countries, totalling 11.7 billion m3/year. Both virtual water import and real water transfer from South to North Water Diversion Project are important water supplements for the region. The results of this study provide useful scientific references for the establishment of combating strategies to deal with the water scarcity in the future.

  19. WaterSMART-The Colorado River Basin focus-area study

    Science.gov (United States)

    Bruce, Breton W.

    2012-01-01

    Increasing demand for the limited water resources of the United States continues to put pressure on water-resource agencies to balance the competing needs of ecosystem health with municipal, agricultural, and recreational uses. In 2007, the U.S. Geological Survey (USGS) identified a National Water Census as one of six pivotal future science directions for the USGS in the following decade. The envisioned USGS National Water Census would evaluate large-scale effects of changes in land use and land cover, water use, and climate on water availability, water quality, and human and aquatic ecosystem health. The passage of the SECURE (Science and Engineering to Comprehensively Understand and Responsibly Enhance) Water Act in 2009 was a key step towards implementing the USGS National Water Census. Section 9508 of the Act authorizes a "national water availability and use assessment program" within the USGS (1) to provide a more accurate assessment of the status of the water resources of the United States; and (2) to develop the science for improved forecasts of the availability of water for future economic, energy production, and environmental uses. Initial funding for the USGS to begin working on the National Water Census came with the approval of the U.S. Department of the Interior's WaterSMART (Sustain and Manage America's Resources for Tomorrow) Initiative. The WaterSMART Initiative provides funding to the USGS, Bureau of Reclamation, and U.S. Department of Energy to achieve a sustainable water strategy to meet the Nation's water needs. WaterSMART funding also allowed the USGS to begin the national Water Availability and Use Assessment, as called for under the SECURE Water Act.

  20. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  1. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  2. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  3. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  4. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  5. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  6. Water Footprint and Virtual Water Trade of Brazil

    NARCIS (Netherlands)

    da Silva, Vicente de Paulo R.; de Oliveira, Sonaly D.; Hoekstra, Arjen Ysbert; Neto, Jose Dantas; Campos, João Hugo B.C.; Braga, Celia C.; Araújo, Lincoln Eloi; Oliveira Aleixo, Danilo; de Brito, Jose Ivaldo B.; de Souza, Marcio Dionisio; de Holanda, Romildo M.

    2016-01-01

    Freshwater scarcity has increased at an alarming rate worldwide; improved water management plays a vital role in increasing food production and security. This study aims to determine the water footprint of Brazil’s national food consumption, the virtual water flows associated with international

  7. Advanced Materials, Technologies, and Complex Systems Analyses: Emerging Opportunities to Enhance Urban Water Security.

    Science.gov (United States)

    Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J

    2017-09-19

    Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.

  8. Lake Storage Measurements For Water Resources Management: Combining Remotely Sensed Water Levels and Surface Areas

    Science.gov (United States)

    Brakenridge, G. R.; Birkett, C. M.

    2013-12-01

    Presently operating satellite-based radar altimeters have the ability to monitor variations in surface water height for large lakes and reservoirs, and future sensors will expand observational capabilities to many smaller water bodies. Such remote sensing provides objective, independent information where in situ data are lacking or access is restricted. A USDA/NASA (http://www.pecad.fas.usda.gov/cropexplorer/global_reservoir/) program is performing operational altimetric monitoring of the largest lakes and reservoirs around the world using data from the NASA/CNES, NRL, and ESA missions. Public lake-level products from the Global Reservoir and Lake Monitor (GRLM) are a combination of archived and near real time information. The USDA/FAS utilizes the products for assessing international irrigation potential and for crop production estimates; other end-users study climate trends, observe anthropogenic effects, and/or are are involved in other water resources management and regional water security issues. At the same time, the Dartmouth Flood Observatory (http://floodobservatory.colorado.edu/), its NASA GSFC partners (http://oas.gsfc.nasa.gov/floodmap/home.html), and associated MODIS data and automated processing algorithms are providing public access to a growing GIS record of the Earth's changing surface water extent, including changes related to floods and droughts. The Observatory's web site also provide both archival and near real time information, and is based mainly on the highest spatial resolution (250 m) MODIS bands. Therefore, it is now possible to provide on an international basis reservoir and lake storage change measurements entirely from remote sensing, on a frequently updating basis. The volume change values are based on standard numerical procedures used for many decades for analysis of coeval lake area and height data. We provide first results of this combination, including prototype displays for public access and data retrieval of water storage

  9. Anthropocene Futures and Water Security

    Directory of Open Access Journals (Sweden)

    F. Berkhout

    2015-04-01

    Full Text Available A central claim about the Anthropocene is that this new epoch, in which people have become the primary geological force, raises profound questions about the sustainability of human development (Crutzen 2002. Human populations have grown dramatically, especially over the past two centuries; these people have grown on average wealthier, drawing on massively greater natural resources and environmental services, including water (Steffen et al. 2011. A number of ‘planetary boundaries' have been defined (Röckstrom et al. 2009, which point to the most urgent dimensions of the global sustainability problems that flow from the scale and scope of human appropriations and interventions in biophysical Earth Systems. These include by now familiar changes and impacts associated with climate change, ozone depletion, biodiversity loss and land-use change, as well as global freshwater use. Röckstrom et al. (2009 suggest using consumptive water run-off (or blue water use as a proxy for global freshwater use. Assuming an upper limit of ~12 500–15 000 km3 year−1 of accessible blue water resources, they suggest that consumptive uses above a threshold of 4000–6000 km3 year-1 would represent a significant risk to ecosystems, moisture feedbacks and freshwater/ocean mixing. Given that consumptive use is now at about 2600 km3 year−1 the authors conclude that there appears to be some room for manoeuvre, although there continues to be a trend of rapidly growing consumptive water use at the global scale. In addition, a number of other problems associated with access to resources have been pointed to: peak oil; peak phosphorus; and the resilience of ecosystem services (Steffen 2011. Beyond this, there is the growing awareness of "systemic risks" to global economic, financial and political systems linked to the degradation, failure or transformation of key biophysical and ecological systems. Perhaps one of the most striking claims is that an epoch of relative

  10. Anthropocene Futures and Water Security

    Science.gov (United States)

    Berkhout, F.

    2015-04-01

    A central claim about the Anthropocene is that this new epoch, in which people have become the primary geological force, raises profound questions about the sustainability of human development (Crutzen 2002). Human populations have grown dramatically, especially over the past two centuries; these people have grown on average wealthier, drawing on massively greater natural resources and environmental services, including water (Steffen et al. 2011). A number of `planetary boundaries' have been defined (Röckstrom et al. 2009), which point to the most urgent dimensions of the global sustainability problems that flow from the scale and scope of human appropriations and interventions in biophysical Earth Systems. These include by now familiar changes and impacts associated with climate change, ozone depletion, biodiversity loss and land-use change, as well as global freshwater use. Röckstrom et al. (2009) suggest using consumptive water run-off (or blue water use) as a proxy for global freshwater use. Assuming an upper limit of ~12 500-15 000 km3 year-1 of accessible blue water resources, they suggest that consumptive uses above a threshold of 4000-6000 km3 year-1 would represent a significant risk to ecosystems, moisture feedbacks and freshwater/ocean mixing. Given that consumptive use is now at about 2600 km3 year-1 the authors conclude that there appears to be some room for manoeuvre, although there continues to be a trend of rapidly growing consumptive water use at the global scale. In addition, a number of other problems associated with access to resources have been pointed to: peak oil; peak phosphorus; and the resilience of ecosystem services (Steffen 2011). Beyond this, there is the growing awareness of "systemic risks" to global economic, financial and political systems linked to the degradation, failure or transformation of key biophysical and ecological systems. Perhaps one of the most striking claims is that an epoch of relative stability in these systems

  11. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  12. Citizen-based Strategies to Improve Community Security: Working ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Citizen-based Strategies to Improve Community Security: Working with Vulnerable Populations to Address Urban Violence in Medellin ... Water Resources Association, in close collaboration with IDRC, is holding a webinar titled “Climate change and adaptive water management: Innovative solutions from the Global South”.

  13. Security Theories of Third World

    Directory of Open Access Journals (Sweden)

    Alexandra Victorovna Khudaykulova

    2016-12-01

    Full Text Available This article analyzes the security studies in the “Third World”. The evolution of the conceptual apparatus in the field of security studies and in the understanding of the “Third World” is given. The author provides us an analysis of the security issues in the so-called “post-colonial” countries in the years of “cold war” and in the post-bipolar period, defines the domain of security for the developing world and the current agenda. Particular attention is paid to the analysis of the security concepts of the late XX century - the “security of the person”, “securitization”, “humanitarian intervention” - which are of particular concern to countries of the “Third World”. An alternative format of the “Third World” in the categories of postmodern, modern and premodern worlds is given, the term of “non-Westphalian” state is used as well. Basic characteristics of the “Third World” in the socio-economic and political spheres are provided. The author emphasizes that the state of security of the “Third World” is fundamentally different from that of the developed Western countries, since most threats in non-Western countries, does not come from the outside, but from within. Accordingly, the non-Western security theory does not focus exclusively on military issues and explore a wide range of issues of civil nature - economic, political, social, environmental and development challenges, as well as poverty and underdevelopment.

  14. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  15. Computer security simulation

    International Nuclear Information System (INIS)

    Schelonka, E.P.

    1979-01-01

    Development and application of a series of simulation codes used for computer security analysis and design are described. Boolean relationships for arrays of barriers within functional modules are used to generate composite effectiveness indices. The general case of multiple layers of protection with any specified barrier survival criteria is given. Generalized reduction algorithms provide numerical security indices in selected subcategories and for the system as a whole. 9 figures, 11 tables

  16. Water footprint as an indicator of agricultural productivity in African countries

    Science.gov (United States)

    Chico Zamanillo, Daniel; Zhang, Guoping; Mathews, Ruth

    2017-04-01

    Sub-Saharan Africa is one of the regions with the largest scope for improved agricultural development that would contribute to global food security while respecting environmental boundaries. More importantly, undernourishment is a challenge for many African countries and needs to be addressed to achieve the 2030 Agenda for Sustainable Development. This study was conducted to support the Netherlands Ministry of Foreign Affair's Inclusive Green Growth aim of increasing water use efficiency by 25% in Dutch financed projects. A water footprint profile was developed for 7 Sub-Saharan countries; Benin, Ethiopia, Ghana, Kenya, Mali, Mozambique and Rwanda. The profiles provide an overview of water use from the perspective of the goods produced within the country, the consumption of goods, in particular agricultural crops, whether these goods are produced domestically or imported from other countries and the level of blue water scarcity experienced in the country. Across all countries, key food crops such as maize, and sorghum have low water productivity relative to the global water footprint benchmark. Export crops such as tea in Kenya or cocoa in Ghana show a good performance over global production. Furthermore, the water footprint of crops over the period 2006-2013 was compared to data from the period 1996-2005. Changes in yield and the resulting changes in the water footprint were assessed for both food and export crops. Yields in food crops improved in some countries, and in some years, but not consistently across all countries and years. The greatest gains in water productivity were in key export crops. The results provide insights into whether improvements have been made in water productivity in recent years and through comparison with the global water footprint benchmark, remaining opportunities for further gains in water productivity were identified. Going forward, policies that will enhance further improvement in water productivity and support greater food and

  17. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  18. Water availability, water quality water governance: the future ahead

    Science.gov (United States)

    Tundisi, J. G.; Matsumura-Tundisi, T.; Ciminelli, V. S.; Barbosa, F. A.

    2015-04-01

    The major challenge for achieving a sustainable future for water resources and water security is the integration of water availability, water quality and water governance. Water is unevenly distributed on Planet Earth and these disparities are cause of several economic, ecological and social differences in the societies of many countries and regions. As a consequence of human misuse, growth of urbanization and soil degradation, water quality is deteriorating continuously. Key components for the maintenance of water quantity and water quality are the vegetation cover of watersheds, reduction of the demand and new water governance that includes integrated management, predictive evaluation of impacts, and ecosystem services. Future research needs are discussed.

  19. Spring security 3.x cookbook

    CERN Document Server

    Mankale, Anjana

    2013-01-01

    This book follows a cookbook style exploring various security solutions provided by Spring Security for various vulnerabilities and threat scenarios that web applications may be exposed to at the authentication and session level layers.This book is for all Spring-based application developers as well as Java web developers who wish to implement robust security mechanisms into web application development using Spring Security.Readers are assumed to have a working knowledge of Java web application development, a basic understanding of the Spring framework, and some knowledge of the fundamentals o

  20. Computer and information security handbook

    CERN Document Server

    Vacca, John R

    2012-01-01

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed

  1. Supporting diverse data providers in the open water data initiative: Communicating water data quality and fitness of use

    Science.gov (United States)

    Larsen, Sara; Hamilton, Stuart; Lucido, Jessica M.; Garner, Bradley D.; Young, Dwane

    2016-01-01

    Shared, trusted, timely data are essential elements for the cooperation needed to optimize economic, ecologic, and public safety concerns related to water. The Open Water Data Initiative (OWDI) will provide a fully scalable platform that can support a wide variety of data from many diverse providers. Many of these will be larger, well-established, and trusted agencies with a history of providing well-documented, standardized, and archive-ready products. However, some potential partners may be smaller, distributed, and relatively unknown or untested as data providers. The data these partners will provide are valuable and can be used to fill in many data gaps, but can also be variable in quality or supplied in nonstandardized formats. They may also reflect the smaller partners' variable budgets and missions, be intermittent, or of unknown provenance. A challenge for the OWDI will be to convey the quality and the contextual “fitness” of data from providers other than the most trusted brands. This article reviews past and current methods for documenting data quality. Three case studies are provided that describe processes and pathways for effective data-sharing and publication initiatives. They also illustrate how partners may work together to find a metadata reporting threshold that encourages participation while maintaining high data integrity. And lastly, potential governance is proposed that may assist smaller partners with short- and long-term participation in the OWDI.

  2. 33 CFR 165.502 - Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cove... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...

  3. 28 CFR 16.53 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... 1974 § 16.53 Use and collection of social security numbers. Each component shall ensure that employees... privilege as a result of refusing to provide their social security numbers, unless the collection is... provide their social security numbers must be informed of: (1) Whether providing social security numbers...

  4. Sustainable Energy for All - What does it mean for Water and Food Security : Seeking sustainable development CLEWS: Climate-change, Land-use, Energy and Water (CLEW) Strategies

    OpenAIRE

    Hermann, Sebastian; Howells, Mark; Welsch, Manuel; Rogner, Hans Holger; Steduto, Pasquale; Gielen, Dolf; Roehrl, Alexander; Bazilian, Morgan

    2011-01-01

    This background note serves to inform the “hot topic” session entitled ‘Sustainable Energy for All – What does it mean for Water and Food Security?’.Energy is vital for human development. This is why the United Nations proclaimed 2012 as the ‘International Year of Sustainable Energy for All’. The goal is to ensure universal access to modern energy services by 2030. Today’s energy production, however, is already putting prohibitive strain on the global environment. In support of worldwide effo...

  5. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  6. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  7. Capturing security requirements for software systems

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  8. Outline of a future security system to provide physical protection of nuclear installations

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1984-01-01

    Nuclear energy, within three or four decades, may become a main pillar of the world's energy supply. The author discusses the problems entailed by the necessity to protect nuclear facilities against assaults, and whether this can be ensured without interference with civic rights. The method applied by the author to show the significance of the problems is to explain the current situation, and to compare it with a plausible outline of the developments to be expected over the next 50 years. He shows the hazards to be taken into account due to criminal actions by persons from outside, or by persons working in nuclear facilities. A main problem is the fact that the security system to be set up has to encompass not only the nuclear installation itself, but also the surrounding area, and the measures to be taken will have an impact on the society, which necessarily will curtail personal freedom. The author presumes that the necessity to guarantee physical protection of nuclear facilities will lead to a modification of the meaning of basic rights, and states his anxiety that security for nuclear installations might affect our concept of freedom. (HSCH) [de

  9. Internet security information system implement method

    International Nuclear Information System (INIS)

    Liu Baoxu; Mei Jie; Xu Rongsheng; An Dehai; Yu Mingjian; Chen Xiangyang; Zheng Peng

    1999-01-01

    On the basis of analysis of the key elements that will affect the Internet Security Information System, the author takes UNIX Operating System as an example, and provides the important stages that must be considered when implementing the Internet Security Information System. An implemental model of the Internet Security Information System is given

  10. An evaluation of the ecological and environmental security on China's terrestrial ecosystems.

    Science.gov (United States)

    Zhang, Hongqi; Xu, Erqi

    2017-04-11

    With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.

  11. Security Sector Reform in Albania

    OpenAIRE

    Abazi, Enika; Bumci, Aldo; Hide, Enri; Rakipi, Albert

    2009-01-01

    International audience; This paper analyses security sector reform (SSR) in Albania. In all its enterprises in reforming the security sector,Albania is assisted by different initiatives and projects that provide expertise and financial support. To assesswhether reforms improved the overall security environment (national and human) of the country, it is necessaryto measure the effectiveness of the various initiatives and projects. This is gauged by how well the initiatives andprojects achieved...

  12. Secure videoconferencing equipment switching system and method

    Science.gov (United States)

    Hansen, Michael E [Livermore, CA

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  13. Improved verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; Markantes, Tom

    2000-04-01

    Together, OVP Security Pigment in OVI Security Ink, provide an excellent method of overt banknote protection. The effective use of overt security feature requires an educated public. The rapid rise in computer-generated counterfeits indicates that consumers are not as educate das to banknote security features as they should be. To counter the education issue, new methodologies have been developed to improve the validation of banknotes using the OVI ink feature itself. One of the new methods takes advantage of the overt nature of the product's optically variable effect. Another method utilizes the unique optical interference characteristics provided by the OVP platelets.

  14. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  15. Security of Nuclear Information. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance on implementing the principle of confidentiality and on the broader aspects of information security (i.e. integrity and availability). It assists States in bridging the gap between existing government and industry standards on information security, the particular concepts and considerations that apply to nuclear security and the special provisions and conditions that exist when dealing with nuclear material and other radioactive material. Specifically it seeks to assist states in the identification, classification, and assignment of appropriate security controls to information that could adversely impact nuclear security if compromised

  16. Secure system design and trustable computing

    CERN Document Server

    Potkonjak, Miodrag

    2016-01-01

    This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

  17. 33 CFR 165.110 - Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone... Limited Access Areas First Coast Guard District § 165.110 Safety and Security Zone; Liquefied Natural Gas.... The following areas are safety and security zones: (1) Vessels underway. All navigable waters of the...

  18. Analysis of the nexus between population, water resources and Global Food Security highlights significance of governance and research investments and policy priorities.

    Science.gov (United States)

    Yunusa, Isa A M; Zerihun, Ayalsew; Gibberd, Mark R

    2018-05-10

    Analyses of sensitivity of Global Food Security (GFS) score to a key set of supply or demand factors often suggest population and water supply as being the most critical and on which policies tend to focus. To explore other policy options, we characterised the nexus between GFS and a set of supply or demand factors including defining including population, agricultural and industrial water-use, agricultural publications (as a surrogate for investment in agricultural research and development [R&D]), and corruption perception index (CPI), to reveal opportunities for attaining enduring GFS. We found that despite being the primary driver of demand for food, population showed no significant correlation with GFS scores. Similarly agricultural water-use was poorly correlated with GFS scores, except in countries where evaporation exceeds precipitation and irrigation is significant. However, GFS had a strong positive association with industrial water-use as a surrogate for overall industrialisation. Recent expansions in cultivated land area failed to yield concomitant improvements in GFS score since such expansions have been mostly into marginal lands with low productivity and also barely compensated for lands retired from cropping in several developed economies. However, GFS was positively associated with agricultural R&D investments, as it was with the CPI scores. The apparent and relative strengths of these drivers on GFS outcome amongst countries were in the order: industrial water-use ≈ publication rate ≈ corruption perception > agricultural water-use > population. We concluded by suggesting that to enshrine enduring food security, policies should prioritise (1) increased R&D investments that address farmer needs, and (2) governance mechanisms that promote accountability in both research and production value chains. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  19. Proactive Security Testing and Fuzzing

    Science.gov (United States)

    Takanen, Ari

    Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flaw-less. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly installed), they now are probably one of the most common reasons why people switch vendors or software providers. The maintenance costs from security updates often add to become one of the biggest cost items to large Enterprise users. Fortunately test automation techniques have also improved. Techniques like model-based testing (MBT) enable efficient generation of security tests that reach good confidence levels in discovering zero-day mistakes in software. This technique is called fuzzing.

  20. A critical evaluation of two point-of-use water treatment technologies: can they provide water that meets WHO drinking water guidelines?

    Science.gov (United States)

    Murphy, Heather M; McBean, Edward A; Farahbakhsh, Khosrow

    2010-12-01

    Point-of-use (POU) technologies have been proposed as solutions for meeting the Millennium Development Goal (MDG) for safe water. They reduce the risk of contamination between the water source and the home, by providing treatment at the household level. This study examined two POU technologies commonly used around the world: BioSand and ceramic filters. While the health benefits in terms of diarrhoeal disease reduction have been fairly well documented for both technologies, little research has focused on the ability of these technologies to treat other contaminants that pose health concerns, including the potential for formation of contaminants as a result of POU treatment. These technologies have not been rigorously tested to see if they meet World Health Organization (WHO) drinking water guidelines. A study was developed to evaluate POU BioSand and ceramic filters in terms of microbiological and chemical quality of the treated water. The following parameters were monitored on filters in rural Cambodia over a six-month period: iron, manganese, fluoride, nitrate, nitrite and Escherichia coli. The results revealed that these technologies are not capable of consistently meeting all of the WHO drinking water guidelines for these parameters.