WorldWideScience

Sample records for publicly traded securities

  1. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  2. Evaluating of foreign trade security

    OpenAIRE

    Vasyliev Andriy

    2015-01-01

    A method of evaluating foreign trade security is considered based on horizontally integrated approach to research security issues, taking into account the conditions of management, factors, components and levels of external security. The work was based theories of security, economics, management theory, practice of state regulation of foreign trade.

  3. An analysis of security price risk and return among publicly traded pharmacy corporations.

    Science.gov (United States)

    Gilligan, Adrienne M; Skrepnek, Grant H

    2013-01-01

    Community pharmacies have been subject to intense and increasing competition in the past several decades. To determine the security price risk and rate of return of publicly traded pharmacy corporations present on the major U.S. stock exchanges from 1930 to 2009. The Center of Research in Security Prices (CRSP) database was used to examine monthly security-level stock market prices in this observational retrospective study. The primary outcome of interest was the equity risk premium, with analyses focusing upon financial metrics associated with risk and return based upon modern portfolio theory (MPT) including: abnormal returns (i.e., alpha), volatility (i.e., beta), and percentage of returns explained (i.e., adjusted R(2)). Three equilibrium models were estimated using random-effects generalized least squares (GLS): 1) the Capital Asset Pricing Model (CAPM); 2) Fama-French Three-Factor Model; and 3) Carhart Four-Factor Model. Seventy-five companies were examined from 1930 to 2009, with overall adjusted R(2) values ranging from 0.13 with the CAPM to 0.16 with the Four-Factor model. Alpha was not significant within any of the equilibrium models across the entire 80-year time period, though was found from 1999 to 2009 in the Three- and Four-Factor models to be associated with a large, significant, and negative risk-adjusted abnormal returns of -33.84%. Volatility varied across specific time periods based upon the financial model employed. This investigation of risk and return within publicly listed pharmacy corporations from 1930 to 2009 found that substantial losses were incurred particularly from 1999 to 2009, with risk-adjusted security valuations decreasing by one-third. Copyright © 2013 Elsevier Inc. All rights reserved.

  4. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  5. 17 CFR 41.23 - Listing of security futures products for trading.

    Science.gov (United States)

    2010-04-01

    ... security futures products for trading, a designated contract market or registered derivatives transaction... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Listing of security futures products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING...

  6. Contra trading in Bursa Malaysia Securities Berhad: a Sharīʿah and legal appraisal

    Directory of Open Access Journals (Sweden)

    Noor Suhaida Kasri

    2017-07-01

    Full Text Available Purpose - The purpose of this paper is to analyze the practice of contra trading in Bursa Malaysia Securities Berhad. Through a critical examination of the practice, it aims to discuss the issues from the angles of Sharīʿah and Malaysian common law. Design/methodology/approach - The paper uses a qualitative research methodology. The information on the practice of contra trading is obtained through the Bursa Malaysia Securities Berhad’s website and literature as well as series of meetings and discussions held with Bursa Malaysia Securities Berhad. In comprehending and dissecting the Sharīʿah and legal issues, classical along with contemporary Sharīʿah literature including local and international Sharīʿah advisory bodies’ resolutions and standards have been referred to. The Sharīʿah analysis of these issues is further supported by reference to the statute and by-laws of Bursa Malaysia Securities Berhad as well as other related legal literature. Findings - This paper finds that contra trading involves a real sale and purchase of shares; the shares are not taken into the possession of the contra trader, neither physically nor constructively; the liability of shares is not transferred to the contra trader; though the practice of profiting in contra trading may contradict the prohibition on profiting without bearing liability, the permissibility of contra trading could still be argued from the contextual approach of public interest (maṣlaḥah and needs (hājah; and contra trading is not gambling. Research limitations/implications - This paper is limited in its analysis to only Sharīʿah and legal perspectives. It does not cover a thorough empirical and quantitative investigation that would measure the extent of the public needs for contra trading and the real benefits that contra trading brings about to the society in the long run. Such studies will further demonstrate whether contra trading deserves a relaxation from the strict Shar

  7. A secure online image trading system for untrusted cloud environments.

    Science.gov (United States)

    Munadi, Khairul; Arnia, Fitri; Syaryadhi, Mohd; Fujiyoshi, Masaaki; Kiya, Hitoshi

    2015-01-01

    In conventional image trading systems, images are usually stored unprotected on a server, rendering them vulnerable to untrusted server providers and malicious intruders. This paper proposes a conceptual image trading framework that enables secure storage and retrieval over Internet services. The process involves three parties: an image publisher, a server provider, and an image buyer. The aim is to facilitate secure storage and retrieval of original images for commercial transactions, while preventing untrusted server providers and unauthorized users from gaining access to true contents. The framework exploits the Discrete Cosine Transform (DCT) coefficients and the moment invariants of images. Original images are visually protected in the DCT domain, and stored on a repository server. Small representation of the original images, called thumbnails, are generated and made publicly accessible for browsing. When a buyer is interested in a thumbnail, he/she sends a query to retrieve the visually protected image. The thumbnails and protected images are matched using the DC component of the DCT coefficients and the moment invariant feature. After the matching process, the server returns the corresponding protected image to the buyer. However, the image remains visually protected unless a key is granted. Our target application is the online market, where publishers sell their stock images over the Internet using public cloud servers.

  8. A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs

    Science.gov (United States)

    Elahi, Golnaz; Yu, Eric

    In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholder interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for "good enough" security, given the competing demands from many parties. In this paper, we examine how conceptual modeling can provide explicit and systematic support for analyzing security trade-offs. After considering the desirable criteria for conceptual modeling methods, we examine several existing approaches for dealing with security trade-offs. From analyzing the limitations of existing methods, we propose an extension to the i* framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches.

  9. LEGAL SECURITY ON CELLPHONE TRADING THROUGH ELECTRONIC MEDIA IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Aan Aswari

    2017-05-01

    Full Text Available The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in performing its obligation reflect the concrete aspect. Warranty provides protection security for related parties with some governing regulations during transaction. However, some other supporting components have not been effectively contribute to balance the utilization of technology in trading. Keywords: legal security, trading, cellphone, electronic media

  10. 26 CFR 1.1445-8 - Special rules regarding publicly traded partnerships, publicly traded trusts and real estate...

    Science.gov (United States)

    2010-04-01

    ... partnerships, publicly traded trusts and real estate investment trusts (REITs). 1.1445-8 Section 1.1445-8... estates upon the disposition of U.S. real property interests. Except as otherwise provided in this... Bonds § 1.1445-8 Special rules regarding publicly traded partnerships, publicly traded trusts and real...

  11. 75 FR 55574 - Joint Public Roundtable on Swap Execution Facilities and Security-Based Swap Execution Facilities

    Science.gov (United States)

    2010-09-13

    ...; File No. 4-612] Joint Public Roundtable on Swap Execution Facilities and Security-Based Swap Execution Facilities AGENCY: Commodity Futures Trading Commission (``CFTC'') and Securities and Exchange Commission... discuss swap execution facilities and security-based swap execution facilities in the context of certain...

  12. Leveraging Trade Agreements to Meet U.S. Security Aims

    Science.gov (United States)

    2016-04-08

    President George H.W. Bush sought means to influence the policies of Latin American states more effectively. Mexico , particularly in the post-Cold War era...security goals. A review of the U.S. trade policy, and its nesting with the National Security Strategy, demonstrates how President Barack Obama’s... President Barack Obama’s strategic “pivot to Asia,” and the Trans-Pacific Partnership (TPP) trade agreement facilitate U.S. enduring national

  13. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for certain derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... Miscellaneous Exemptions § 240.3a12-7 Exemption for certain derivative securities traded otherwise than on a...

  14. Trade Publications in the Marketing Classroom.

    Science.gov (United States)

    Stull, William A.

    1991-01-01

    Describes how marketing teachers can use trade publications to enhance the quality of and provide relevance to the marketing education curriculum. Identifies representative trade publications; suggests how to get them for classroom use and how teachers can use them. (JOW)

  15. Managing the trade-public health linkage in defence of trade ...

    African Journals Online (AJOL)

    Managing the trade-public health linkage in defence of trade liberalisation and ... of United States-measures affecting the production and sale of clove cigarettes. ... Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad.

  16. 76 FR 1101 - Property Traded on an Established Market

    Science.gov (United States)

    2011-01-07

    ... Property Traded on an Established Market AGENCY: Internal Revenue Service (IRS), Treasury. ACTION: Notice... regulations relating to determining when property is traded on an established market (that is, publicly traded... traded on an established securities market (often referred to as ``publicly traded''), the issue price of...

  17. 17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.

    Science.gov (United States)

    2010-04-01

    ... trading in a security futures product on a designated contract market or registered derivatives...) Registered derivatives transaction execution facilities. Prior to listing a security futures product for... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Prohibition of dual trading in...

  18. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  19. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  20. 77 FR 16112 - Eugene Science, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-03-19

    ... Trading March 15, 2012. It appears to the Securities and Exchange Commission that there is a lack of... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  1. 77 FR 16113 - ASP Ventures Corp., Order of Suspension of Trading

    Science.gov (United States)

    2012-03-19

    ... Trading March 15, 2012. It appears to the Securities and Exchange Commission that there is a lack of... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  2. 78 FR 65744 - Newtech Resources Ltd., Order of Suspension of Trading

    Science.gov (United States)

    2013-11-01

    ... Trading October 21, 2013. It appears to the Securities and Exchange Commission that there is a lack of... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  3. 77 FR 58424 - Enwin Resources, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-09-20

    ... Trading September 18, 2012. It appears to the Securities and Exchange Commission that there is a lack of... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  4. Trends in International Security and Trade (Trade Experts’ Roundtable, 2017

    Directory of Open Access Journals (Sweden)

    Elinor Sloan

    2017-08-01

    Full Text Available With so many trouble spots in the world, it can be difficult for Canadian businesses to know where to trade successfully and with some assurance of security. Canadian government organizations affiliated with Global Affairs Canada (GAC need to take a broader view of international security, rather than assessing states in isolation, if businesses are to have the vital information they need. Multinational firms typically have their own risk-management strategies, but smaller enterprises need outside help to get information on the safety and viability of potential export markets. However, none of these GAC-affiliated organizations examines the security risks inherent in the interactions between countries. While GAC focuses mainly on economics, tariffs, language barriers and other factors, the Crown corporation Export Development Canada (EDC does risk assessments of various countries to determine what level of political risk insurance it should offer to Canadian companies. The Business Development Bank, best known for its domestic work with Canadian businesses, has branched out into the foreign realm too, but only in terms of industry and market research on export assessments. Based on long-term GDP projections, some interesting forecasts have been made that will affect how and where Canadian businesses trade internationally. They will need accurate information on risk and security in order to do so. By 2030, the four largest world economies will be those of the U.S., China, India and Japan. For now, the best bets for Canadian businesses in the short to medium term include China, India and some Southeast Asian countries, although there are some accompanying dangers in these areas. Pakistan, Nigeria and Egypt have the potential to be good markets for Canadian exports, but the current risk from terrorist activity precludes foreign commercial interests. The unstable relationships between countries in the world’s hotspots need continuing assessment and

  5. Privacy and security perceptions of european citizens: A test of the trade-off model

    NARCIS (Netherlands)

    Friedewald, M.; Lieshout, M. van; Rung, S.; Ooms, M.; Ypma, J.

    2015-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional “trade-off” paradigm that argues that citizens might be willing to sacrifice some privacy for more security. Academics have long argued against the trade-off paradigm, but these arguments have

  6. The Supply of Trade Credit by Brazilian Publicly Traded Firms

    Directory of Open Access Journals (Sweden)

    Rafael Felipe Schiozer

    2011-12-01

    Full Text Available This paper investigates the determinants of trade credit supply by Brazilian publicly traded companies between the years of 2005 and 2008. International literature (both theoretical and empirical documents that the main determinants of trade credit supply are the size of the firm and the size of its debt. Both indicate that the availability of resources to the firm is an important factor for the supply of trade credit. In addition, the literature confirms strategic uses of trade credit such as those for price discrimination purposes. The results obtained using a sample of 157 Brazilian companies do not support that size and indebtedness are relevant determinants for trade credit supply, but they confirm the supply of trade credit as a strategic tool for the firms. Additionally we observed a significant decrease in trade credit supply in 2008, the year in which a severe international financial crisis took place.

  7. 77 FR 4853 - Onyx Service & Solutions, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-01-31

    ... Suspension of Trading January 27, 2012. It appears to the Securities and Exchange Commission that there is a... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  8. 76 FR 12144 - Advanced Optics Electronics, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2011-03-04

    ... Suspension of Trading March 2, 2011. It appears to the Securities and Exchange Commission that there is a... the opinion that the public interest and the protection of investors require a suspension of trading... Securities Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for...

  9. 78 FR 33142 - Lanbo Financial Group, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-06-03

    ... Suspension of Trading May 30, 2013. It appears to the Securities and Exchange Commission that there is a lack... the opinion that the public interest and the protection of investors require a suspension of trading... the Securities Exchange Act of 1934, that trading in the securities of the above-listed company is...

  10. Global maize trade and food security: implications from a social network model.

    Science.gov (United States)

    Wu, Felicia; Guclu, Hasan

    2013-12-01

    In this study, we developed a social network model of the global trade of maize: one of the most important food, feed, and industrial crops worldwide, and critical to food security. We used this model to analyze patterns of maize trade among nations, and to determine where vulnerabilities in food security might arise if maize availability was decreased due to factors such as diversion to nonfood uses, climatic factors, or plant diseases. Using data on imports and exports from the U.N. Commodity Trade Statistics Database for each year from 2000 to 2009 inclusive, we summarized statistics on volumes of maize trade between pairs of nations for 217 nations. There is evidence of market segregation among clusters of nations; with three prominent clusters representing Europe, Brazil and Argentina, and the United States. The United States is by far the largest exporter of maize worldwide, whereas Japan and the Republic of Korea are the largest maize importers. In particular, the star-shaped cluster of the network that represents U.S. maize trade to other nations indicates the potential for food security risks because of the lack of trade these other nations conduct with other maize exporters. If a scenario arose in which U.S. maize could not be exported in as large quantities, maize supplies in many nations could be jeopardized. We discuss this in the context of recent maize ethanol production and its attendant impacts on food prices elsewhere worldwide. © 2013 Society for Risk Analysis.

  11. 76 FR 32246 - Uniontown Energy, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2011-06-03

    ... Trading June 1, 2011. It appears to the Securities and Exchange Commission that there is a lack of current... opinion that the public interest and the protection of investors require a suspension of trading in the... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  12. Self-Sufficiency versus Security: How Trade Protectionism Challenges the Sustainability of the Food Supply in Russia

    Directory of Open Access Journals (Sweden)

    Vasilii Erokhin

    2017-10-01

    Full Text Available Food security is increasingly influenced by multilateral trade systems and foreign trade policies implemented by national governments. Many of them are now concerned about the sustainability of food supply and the vulnerability of domestic food markets to price volatility, and seek to support domestic producers and protect themselves from increasing food imports. Such restrictions improve food self-sufficiency, but decrease food security. It is important to understand any changes that may have occurred in the food consumption pattern due to trade protectionism and to observe any nutritional implications of these changes. This paper employs the rational food security (RFS assessment approach, which differentiates sources of food supply on the domestic market, assesses the influence of agricultural and trade frameworks on food consumption patterns, and complies consumption with the appropriate food intake threshold. In the case of Russia, the study demonstrates that the conventional consumption approach to self-sufficiency (FSCA underestimates the food insecurity level by not accounting for nutrition factors. In addition, the gap between the FSCA and the RFS increases in times of protectionist trade policy and decreases when the agricultural and trade policy framework turns to liberalization. The paper concludes that trade protectionism challenges the sustainability of food supply by decreasing food availability and quality of food products, causes dietary changes, and threatens the food security of the country.

  13. 75 FR 7546 - Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification...

    Science.gov (United States)

    2010-02-22

    ... DEPARTMENT OF COMMERCE Census Bureau 15 CFR Part 30 [Docket Number: 090422707-91445-02] RIN 0607-AA48 Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification... Trade Regulations (FTR) to eliminate the requirement to report a Social Security Number (SSN) as an...

  14. 78 FR 76377 - Makism3D Corp.; Order of Suspension of Trading

    Science.gov (United States)

    2013-12-17

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Makism3D Corp.; Order of Suspension of Trading... protection of investors require a suspension of trading in the securities of Makism3D Corp. (``Makism3D... opinion that the public interest and the protection of investors require a suspension of trading in the...

  15. 78 FR 65744 - High End Ventures, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2013-11-01

    ... of Trading October 21, 2013. It appears to the Securities and Exchange Commission that there is a... opinion that the public interest and the protection of investors require a suspension of trading in the... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  16. International trade versus public health during the FCTC negotiations, 1999-2003.

    Science.gov (United States)

    Mamudu, Hadii M; Hammond, Ross; Glantz, Stanton A

    2011-01-01

    To examine why the Framework Convention on Tobacco Control did not include an explicit trade provision and delineate the central arguments in the debate over trade provision during the negotiations. Triangulate interviews with participants in the FCTC negotiations, the FCTC negotiations documents, and tobacco industry documents. An explicit FCTC trade provision on relation between international trade and public health became a contentious issue during the negotiations. As a result, two conflicting positions, health-over-trade and opposition to health-over-trade emerged. Opposition to explicit trade language giving health priority was by both tobacco industry and countries that generally supported strong FCTC provisions because of concerns over 'disguised protectionism' and setting a precedent whereby governments could forfeit their obligations under pre-existing treaties. Owing to lack of consensus among political actors involved in the negotiations, a compromise position eliminating any mention of trade emerged, which was predicated on belief among some in the public health community that public health would prevail in future trade versus health conflicts. The absence of an explicit FCTC trade provision was due to a political compromise rather than the impact of international trade agreements and decisions on public health and lack of consensus among health advocates. This failure to include an explicit trade provision in the FCTC suggests that the public health community should become more involved in trade and health issues at all levels of governance and press the FCTC Conference of the Parties for clarification of this critical issue.

  17. 17 CFR 249.820 - Form 19b-4(e) for the listing and trading of new derivative securities products by self...

    Science.gov (United States)

    2010-04-01

    ... and trading of new derivative securities products by self-regulatory organizations that are not deemed... listing and trading of new derivative securities products by self-regulatory organizations that are not... self-regulatory organization's listing and trading of a new derivative securities product that is not...

  18. When is public enforcement of insider trading regulations effective?

    NARCIS (Netherlands)

    Wielhouwer, J.L.

    2013-01-01

    In this paper we investigate when public enforcement of insider trading regulations reduces the amount of insider trading. We model a game between a potentially self-interested regulator enforcing insider trading laws and a trader who may be trading on inside information. We show that equilibrium

  19. Malaysia: Political, Security, Economic, and Trade Issues Considered

    Science.gov (United States)

    2007-02-13

    general election. Key observers have also pointed to decisions by Parti-Islam sa- Malaysia (PAS), Parti Keadilan Rakyat , and the Democratic Action Party...Sultan fulfills this function. Each state has a state legislature. The lower house of Malaysia’s Parliament, the Dewan Rakyat , has 193 members elected...Order Code RL33878 Malaysia : Political, Security, Economic, and Trade Issues Considered February 13, 2007 Bruce Vaughn, Coordinator Specialist in

  20. LEGAL SECURITY ON CELLPHONE TRADING THROUGH ELECTRONIC MEDIA IN INDONESIA

    OpenAIRE

    Aan Aswari

    2017-01-01

    The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...

  1. Legal Security on Cellphone Trading Through Electronic Media in Indonesia

    OpenAIRE

    Aswari, Aan; Pasamai, Syamsudin; Qomar, Nurul; Abbas, Ilham

    2017-01-01

    The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...

  2. Trade and commerce in improved crops and food: an essay on food security.

    Science.gov (United States)

    Kershen, Drew L

    2010-11-30

    Agricultural trade between nations is a significant proportion of total international trade. Agricultural trade in transgenic crops faces extra complications due to the existence of domestic and international regimes that focus specifically on agricultural biotechnology. These specialized regimes create legal and commercial challenges for trade in transgenic crops that have significant implications for the food security of the nations of the world. By food security, one should understand not just the available supply of food, but also the quality of the food and the environmental impact of agricultural production systems. These specialized regimes for transgenic crops can either encourage or hinder the adoption of agricultural biotechnology as a sustainable intensive agriculture. Sustainable intensive agriculture offers hope for agronomic improvements for agricultural production, socio-economic betterment for farmers and environmental benefits for societies. Sustainable intensive agriculture offers particular hope for the poorest farmers of the world because agricultural biotechnology is a technology in the seed. Copyright © 2010 Elsevier B.V. All rights reserved.

  3. IFRS ADOPTION AND EARNINGS MANAGEMENT IN BRAZILIAN PUBLICLY TRADED COMPANIES

    Directory of Open Access Journals (Sweden)

    Roberto Midoguti Joia

    2014-03-01

    Full Text Available In 2007, Brazil adopted the International Financial Reporting Standards (IFRS. Studies involving publicly traded companies in different countries around the world indicate that these new standards tend to improve the information quality and make it more comparable and transparent. This study was aimed at verifying any changes in the earnings management levels after 2010 and whether this happened in function of the full adoption of the IFRS by the Brazilian publicly traded companies (except for financial institutions. The data were extracted from the three-monthly financial statements of the databases from Economática and the Brazilian Securities Commission for the period from 2006 till 2011. To achieve the research objectives, two tests were applied. The first showed that the average discretionary accruals, calculated through the Modified Jones Model, were lower after 2010. Next, the regression analysis was elaborated, using panel data with Newey-West’s correction. The results did not confirm the hypothesis that the adoption of the IFRS affected the earnings management level in the period under analysis, but showed that the size and indebtedness significantly explain the discretionary accruals, independently of the adoption of the IFRS. The results suggest that larger companies with a large proportion of own capital tend to produce higher quality reports, independently of the adoption of the IFRS.

  4. Publicly Traded Ed. Companies Are Rare

    Science.gov (United States)

    Flanigan, Robin L.

    2012-01-01

    K12 Inc., the nation's largest provider of online precollegiate education, was launched in 2000 and went public seven years later after raising about $140 million in revenue. Like other companies, it moved from being privately held to being publicly traded to raise more money quickly, increase brand awareness, and accelerate business goals. The…

  5. Polish Security Printing Works in the system of public and economic security

    OpenAIRE

    Remigiusz Lewandowski

    2013-01-01

    The article raises the issue of placing PWPW in the system of economic and public security. Two particular categories of security connected with PWPW business activity, i.e. identification and transactional security, have been defined and discussed in the article. The most essential factors affecting the above security categories as well as relations between identification/transactional security and economic/public security. The article indicates that PWPW plays an important role in the state...

  6. Relative Pricing of Publicly Traded U.S. Electric Utility Companies

    Science.gov (United States)

    Jewczyn, Nicholas Stephen

    In the financial turmoil of 2008, U.S. firms reported debt-ratios that differed from the debt-ratios calculated from balance sheets. The problem is that investors bought common stock expecting initial investment return and lost money when companies delisted. The purpose of this quantitative study was to determine sample securities pricing with the application of synthetic assets and debt accrued. Addressed in the research questions was whether those securities were (a) underpriced compared with return-on-assets (ROA), (b) overpriced compared with ROA, (c) a debt-ratio higher than 60% and also overpriced, (d) underpriced with a synthetic asset added, or (e) related by relative pricing to variant pricing and market capitalization. The study's base theory was Pan's efficient market hypothesis (EMH) of security price prediction of market prices versus model prices. The data from the financial statements of 16 publicly traded U.S. electric utility companies were analyzed via correlations and multiple regression analyses to determine securities pricing and suitability. The findings from the analyses of the sample's variables of market price, book value, market-to-book, and study constructed variables from those variable data were statistically significant. The alternate hypotheses were accepted for all 5 research questions since the analytical operationalization of the hypothetical constructs led to significant relationships. Results suggest that the use of more pricing determinants in securities evaluation may lead to investors losing less money and earning the expected returns for a more efficient capital market, leading to a stronger economy and macroeconomic stability.

  7. Supply Chain Security: U.S. Customs and Border Protection has Enhanced its Partnership with Import Trade Sectors by Challenges Remain in Verifying Security Practices

    National Research Council Canada - National Science Library

    Caldwell, Stephen L; Fossett, Christine A; Conrad, Christopher; Berbsteub, Amy; Berry, Fredrick; Camarillo, Yecenia; Cook, Frances; David, Katherine; Dye, Wendy; Gibson, Nkenge

    2008-01-01

    .... For example, between March 2005 and November 2007, CBP established requirements for C-TPAT members in nine trade sectors to meet minimum security criteria for their specific trade sector, including...

  8. Market Reactions to Publicly Announced Privacy and Security Breaches Suffered by Companies Listed on the United States Stock Exchanges: A Comparative Empirical Investigation

    Science.gov (United States)

    Coronado, Adolfo S.

    2012-01-01

    Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.…

  9. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... members of national securities exchanges. 240.19c-3 Section 240.19c-3 Commodity and Securities Exchanges... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of each national securities exchange shall provide as follows: (a) No rule, stated policy or practice of...

  10. 77 FR 14734 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-03-13

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... proposed agenda of a meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The... innovation in the environmental technology sector. Background: The ETTAC is mandated by Public Law 103-392...

  11. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  12. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  13. 17 CFR 240.3a12-8 - Exemption for designated foreign government securities for purposes of futures trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for designated foreign government securities for purposes of futures trading. 240.3a12-8 Section 240.3a12-8 Commodity and... trading. (a) When used in this Rule, the following terms shall have the meaning indicated: (1) The term...

  14. Do Managers Face a Performance Trade-off?

    DEFF Research Database (Denmark)

    Mikkelsen, Maria Falk

    2017-01-01

    equity, accountability, and procedural justice. However, our knowledge of whether such trade-offs exist is scarce. Using an administrative 10-year panel data set of Danish public schools and principals, this paper analyzes trade-offs between production performance (measured by student performance...... and student pass rate) and process performance (measured by equity, accountability, and procedural justice). Results show no evidence of trade-offs. In contrast, principals who succeed in raising student performance generally also succeed in securing high pass rates, high equity, high accountability, and high...... procedural justice. These results suggest that managers who are able to secure high performance on one dimension of performance will likely also be high performing on other performance dimensions....

  15. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    Energy Technology Data Exchange (ETDEWEB)

    Koech, H K [Program Manager CBP/DHS Office Number 363-6109 Cell Number 0722-774-912, Office Location: Ground Floor U.S. Embassy Nairobi (Kenya)

    2010-07-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  16. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Koech, H.K.

    2010-01-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  17. A tainted trade? Moral ambivalence and legitimation work in the private security industry.

    Science.gov (United States)

    Thumala, Angélica; Goold, Benjamin; Loader, Ian

    2011-06-01

    The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. © London School of Economics and Political Science 2011.

  18. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  19. Commentary: Moving towards policy coherence in trade and health.

    Science.gov (United States)

    Walls, Helen; Baker, Phillip; Smith, Richard

    2015-11-01

    International trade has brought economic benefits to many countries, but the association of trade and investment liberalisation with poor health outcomes concerns the public health community. The need to secure more 'healthy' trade is a recognised priority, especially as countries move from global to regional/bilateral trade agreements - with greater public health risks. However, a transition towards 'healthier trade' may be hindered by worldview differences between the trade and health communities. There is a tendency for health actors to perceive trade as a threat to population health, and for trade actors to view health as a constraint to trade objectives of reducing barriers to cross-border commercial flows and economic growth. Unless such differing worldviews can be aligned, finding ways forward for addressing public health in trade policy is likely to be difficult. Moving forward will involve understanding the values and drivers of the respective groups, and developing solutions palatable to their various interests. Given the power imbalances between the two areas, it is likely that the health community will have to make the first moves in this respect. This article outlines the key issues involved and suggests areas where such moves have been, and may be made.

  20. 77 FR 59690 - Titan Resources International, Corp.; Order of Suspension of Trading

    Science.gov (United States)

    2012-09-28

    ... a lack of current and accurate information concerning the securities of Titan Resources... concerning Titan's business operations and financial condition. The Commission is of the opinion that the public interest and the protection of investors require a suspension of trading in the securities of...

  1. The nature of the derivative market transactions traded in the Johannesburg securities exchange

    Directory of Open Access Journals (Sweden)

    Tankiso Moloi

    2014-10-01

    Full Text Available The main objective of the study was to assess and understand the nature of derivative products traded in the Johannesburg Securities Exchange (JSE by analysing daily transactions consisting of deals and contracts concluded, as well as notional values of derivatives traded in the review period. Analysed data found that the South African derivative market continues to grow and evolve with the consistent introduction of new derivative products such as the “can do” derivatives, IDX derivatives that are now being traded at the JSE. The evolvement and growth is confirmed by the fact that the total derivative deals in the JSE has also grown by 16.6% (CAGR from 2006. The study further found that the equity index remains the largest derivative for both options and futures

  2. 77 FR 34127 - Notice of Open Public Hearing

    Science.gov (United States)

    2012-06-08

    ... trade and economic relationship with China. The June 14 hearing is aimed at sharpening our understanding... U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION Notice of Open Public Hearing AGENCY: U.S.-China Economic and Security Review Commission. ACTION: Notice of open public hearing--June 14, 2012...

  3. Discerning The Motivational Basis For Trade Unionism In Public And ...

    African Journals Online (AJOL)

    Discerning The Motivational Basis For Trade Unionism In Public And Private ... private businesses are very clear to the actors of industrial relations; those of their ... selfish interests; unions in the public sector ought to function as uplift unions, ...

  4. Exploring public perceptions of energy security risks in the UK

    International Nuclear Information System (INIS)

    Demski, Christina; Poortinga, Wouter; Pidgeon, Nick

    2014-01-01

    Along with climate change and affordability, concerns about energy security are key drivers behind proposals for major energy system change in the UK and numerous other countries. Unlike climate change we know very little about how the public thinks and feels about this aspect of sustainability and energy policy. Beyond engaging critically with conceptual and theoretical discussions, empirical data from two surveys (Cardiff postal survey, N=520; online UK survey, N=499) using a ten item energy security scale are presented and discussed. Here we show that aspects of energy security are certainly of concern to the UK public, with particularly high concern around dependence on fossil fuels/imports and relatively lower expressed concern for actual disruption of energy supply. However public concerns around energy security are only emerging, and likely to change depending on the context in which it is discussed (e.g. in comparison to climate change). In addition, findings from public interviews are used to further contextualise the survey findings, showing unfamiliarity among the UK public with regards to the term “energy security”. We discuss implications, and further work that would be useful for understanding public perceptions in more depth. - highlights: • Exploring public views on energy security using a 10 item scale. • Concerns over energy security is relatively high but susceptible to framing. • Patterns of concern for different energy security aspects examined. • The term energy security is unfamiliar, only an emerging concern among UK publics. • Further discussion on the meanings and implications of these perceptions

  5. Predicting Social Security numbers from public data

    OpenAIRE

    Acquisti, Alessandro; Gross, Ralph

    2009-01-01

    Information about an individual's place and date of birth can be exploited to predict his or her Social Security number (SSN). Using only publicly available information, we observed a correlation between individuals' SSNs and their birth data and found that for younger cohorts the correlation allows statistical inference of private SSNs. The inferences are made possible by the public availability of the Social Security Administration's Death Master File and the widespread accessibility of per...

  6. On the security of SSL/TLS-enabled applications

    OpenAIRE

    Das, Manik Lal; Samdaria, Navkar

    2014-01-01

    SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality. A large number of electronic commerce applications, such as stock trading, banking, shopping, and gaming rely on the security strength of the SSL/TLS protocol. In recent times, a potential threat, known as main-in-the-middle (MITM) attack, has been exploited by attackers of...

  7. Draft Public Health Statement on the U.S.-Central American Free Trade Agreement (CAFTA).

    Science.gov (United States)

    2004-01-01

    The U.S. is rapidly negotiating a raft of new regional and bilateral trade agreements. The most recent agreement, with Central America, [was to] come before Congress for a vote as soon as late May. There is growing concern that international trade agreements threaten health care and the health of communities. . . . The Draft Public Health Statement on the U.S.-Central American Free Trade Agreement (CAFTA), developed by CPATH which planned a campaign around the issues, analyzes key provisions from the perspective of public health and suggests reframing the trade debate in terms of health.

  8. The significance of interconnector counter-trading in a security constrained electricity market

    International Nuclear Information System (INIS)

    Higgins, P.; Li, K.; Devlin, J.; Foley, A.M.

    2015-01-01

    Throughout the European Union there is an increasing amount of wind generation being dispatched-down due to the binding of power system operating constraints from high levels of wind generation. This paper examines the impact a system non-synchronous penetration limit has on the dispatch-down of wind and quantifies the significance of interconnector counter-trading to the priority dispatching of wind power. A fully coupled economic dispatch and security constrained unit commitment model of the Single Electricity Market of the Republic of Ireland and Northern Ireland and the British Electricity Trading and Transmission Arrangement was used in this study. The key finding was interconnector counter-trading reduces the impact the system non-synchronous penetration limit has on the dispatch-down of wind. The capability to counter-trade on the interconnectors and an increase in system non-synchronous penetration limit from 50% to 55% reduces the dispatch-down of wind by 311 GW h and decreases total electricity payments to the consumer by €1.72/MW h. In terms of the European Union electricity market integration, the results show the importance of developing individual electricity markets that allow system operators to counter-trade on interconnectors to ensure the priority dispatch of the increasing levels of wind generation. - Highlights: • Interconnector counter-trading reduces the system marginal price in the SEM. • Dispatch-down of wind power is reduced due to interconnector counter-trading. • A 5% increase in the SNSP limit can reduce wind power dispatched-down by 50%. • An increase in the SNSP limit and installed wind capacity reduces the SMP.

  9. Fortress America: The Aesthetics of Homeland Security in the Public Realm

    Science.gov (United States)

    2017-09-01

    matured and evolved as a profession and is now an integral part of all urban design. UK citizens benefit from aesthetical public spaces where security...only can homeland security architecture restrict access to public spaces, it might not actually make the public safer. The indirect costs of poorly...change. Until public agencies hold homeland security architecture projects to the same public benefit requirements as other projects, the hostile

  10. Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity

    DEFF Research Database (Denmark)

    Asharov, Gilad; Orlandi, Claudio

    2012-01-01

    We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...... constant probability ε. The idea behind the model is that the fear of being caught cheating will be enough of a deterrent to prevent any cheating attempt. However, in the basic covert security model, the honest parties are not able to persuade any third party (say, a judge) that a cheating occurred. We...... propose (and formally define) an extension of the model where, when an honest party detects cheating, it also receives a certificate that can be published and used to persuade other parties, without revealing any information about the honest party’s input. In addition, malicious parties cannot create fake...

  11. Opportunities for public aquariums to increase the sustainability of the aquatic animal trade.

    Science.gov (United States)

    Tlusty, Michael F; Rhyne, Andrew L; Kaufman, Les; Hutchins, Michael; Reid, Gordon McGregor; Andrews, Chris; Boyle, Paul; Hemdal, Jay; McGilvray, Frazer; Dowd, Scott

    2013-01-01

    The global aquatic pet trade encompasses a wide diversity of freshwater and marine organisms. While relying on a continual supply of healthy, vibrant aquatic animals, few sustainability initiatives exist within this sector. Public aquariums overlap this industry by acquiring many of the same species through the same sources. End users are also similar, as many aquarium visitors are home aquarists. Here we posit that this overlap with the pet trade gives aquariums significant opportunity to increase the sustainability of the trade in aquarium fishes and invertebrates. Improving the sustainability ethos and practices of the aquatic pet trade can carry a conservation benefit in terms of less waste, and protection of intact functioning ecosystems, at the same time as maintaining its economic and educational benefits and impacts. The relationship would also move forward the goal of public aquariums to advance aquatic conservation in a broad sense. For example, many public aquariums in North America have been instrumental in working with the seafood industry to enact positive change toward increased sustainability. The actions include being good consumers themselves, providing technical knowledge, and providing educational and outreach opportunities. These same opportunities exist for public aquariums to partner with the ornamental fish trade, which will serve to improve business, create new, more ethical and more dependable sources of aquatic animals for public aquariums, and perhaps most important, possibly transform the home aquarium industry from a threat, into a positive force for aquatic conservation. © 2012 Wiley Periodicals, Inc.

  12. Do Managers Trade on Public or Private Information? : Evidence from Fundamental Valuations

    NARCIS (Netherlands)

    D. Veenman (David)

    2012-01-01

    textabstractUsing accounting-based (residual income) valuations, this study examines the extent to which abnormal returns after insider share trades are explained by private information versus mispricing of public information. For a sample of insider trades in the Netherlands (1999- 2008), I find

  13. The governance of publicly traded limited liability companies

    NARCIS (Netherlands)

    Gomtsyan, S.

    The limited liability company is not only a widespread business form for non-listed firms but also is used by listed companies. There were 20 publicly traded Delaware LLCs in September 2013. Given the policy of the Delaware legislators and courts to give a maximum effect to the principle of freedom

  14. Trade liberalization and the diet transition: a public health response.

    Science.gov (United States)

    Rayner, Geof; Hawkes, Corinna; Lang, Tim; Bello, Walden

    2006-12-01

    Trade liberalization remains at the forefront of debates around globalization, particularly around the impact on agriculture and food. These debates, which often focus on how poorer countries can 'trade their way' out of poverty, pay limited attention to dietary health, especially in the light of the WHO's Global Strategy for Diet, Physical Activity and Health (2004), which warned that future health burdens will be increasingly determined by diet-related chronic diseases. This article examines the diet transition as the absent factor within debates on liberalizing trade and commerce. We describe the evolution of trade agreements, noting those relevant to food. We review the association between trade liberalization and changes in the global dietary and disease profile. We illustrate some of the complex linkages between trade liberalization and the 'diet transition', illustrated by factors such as foreign direct investment, supermarketization and cultural change. Finally, we offer three scenarios for change, suggesting the need for more effective 'food governance' and engagement by public health advocates in policy making in the food and agriculture arena.

  15. Do Managers Trade on Public or Private Information? Evidence from Fundamental Valuations

    NARCIS (Netherlands)

    Veenman, D.

    2013-01-01

    Using accounting-based (residual income) valuations, this study examines the extent to which abnormal returns after insider share trades are explained by private information versus mispricing of public information. For a sample of insider trades in the Netherlands (1999–2008), I find that managers'

  16. 76 FR 33803 - Order of Suspension of Trading

    Science.gov (United States)

    2011-06-09

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading June 7, 2011... trading in the securities of the above-listed companies. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...

  17. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  18. Public perspectives on nuclear security. US national security surveys, 1993--1997

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  19. The Role of the Press in Public Security

    Directory of Open Access Journals (Sweden)

    Robson Sávio Reis Souza

    2007-06-01

    Full Text Available The sensational increase in violent criminality in recent years has placed the question of public security on the social agenda. Formerly a matter restricted to a few actors, now the topic of public security has become the center of discussion in an affl icted society in the midst of a notorious increase in violence and criminality. The result of the referendum on the prohibition of the sale of fi rearms and ammunition amplifi ed an obvious popular clamor demanding consistent, lasting and clear measures in the combating and prevention of crime. The media, perceiving the importance of this historic moment (and mainly the power to vocalize this demand of the middle class – their major consumer – has deepened the discussion on this issue, organizing in an increasingly more constant way coverage of public security.

  20. 40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.

    Science.gov (United States)

    2010-07-01

    ... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...

  1. 78 FR 47813 - In the Matter of Bergamo Acquisition Corp.; Order of Suspension of Trading

    Science.gov (United States)

    2013-08-06

    ... there is a lack of current and accurate information concerning the securities of Bergamo Acquisition... Bergamo's business operations and financial condition. The Commission is of the opinion that the public interest and the protection of investors require a suspension of trading in the securities of Bergamo...

  2. Securing military information systems on public infrastructure

    CSIR Research Space (South Africa)

    Botha, P

    2015-03-01

    Full Text Available to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared...

  3. 17 CFR 13.6 - Promulgation of rules; publication.

    Science.gov (United States)

    2010-04-01

    ...; publication. 13.6 Section 13.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PUBLIC RULEMAKING PROCEDURES § 13.6 Promulgation of rules; publication. After consideration of all relevant matters... also be made in the Federal Register if a proposal is subsequently withdrawn. The required publication...

  4. Are Entrepreneur-Led Companies Better? Evidence from Publicly Traded U.S. Companies: 1998-2010

    Directory of Open Access Journals (Sweden)

    Joel M. Shulman

    2010-12-01

    Full Text Available Do U.S. publicly-traded companies led by entrepreneurs perform better than nonentrepreneur-led U.S. public companies? Our data suggests they do. We analyze monthly stock returns of U.S. publicly traded companies over the time period 1998-2010 and find compelling evidence demonstrating that irrespective of market capitalization and time period, companies led by U.S. entrepreneurs provide better stock performance than several stock market indices primarily comprised of non-entrepreneur-led U.S. companies.

  5. The modern way of trading with options such derivative securities

    Directory of Open Access Journals (Sweden)

    Dragosavac Miloš

    2013-01-01

    Full Text Available Participants in the financial markets today are faced with a number of financial risks. This raises the question, what measures and instruments should be used, to minimize the risks to the lowest extent possible. One form of protection options are. Options are derivative securities, namely financial derivatives, which can be used to protect against the risks associated with trading. The reason for the earnings at risk. It is usually used to hedge price risk, which is the word of possession and the right to sell the right to purchase certain assets at a predetermined fixed price that applies to a specific date in the future. In this way a protection against adverse price changes in the future. As their name implies, is a selection of options, where the owner decides whether the option will be exercised or not. That choice is not free, because in case of insurance premiums paid by commission from potential financial risk. Many of the securities issued by the company include the option.

  6. 77 FR 20445 - eMax Worldwide, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-04-04

    ... Trading April 2, 2012. It appears to the Securities and Exchange Commission that the public interest and... shareholders of record. eMax Worldwide, Inc. is quoted on OTC Markets Group Inc. under the ticker EMXC. The Commission is of the opinion that the public interest and the protection of investors require a suspension of...

  7. Secure public cloud platform for medical images sharing.

    Science.gov (United States)

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  8. 31 CFR 357.10 - Laws governing a Treasury book-entry security, TRADES, and security interests or entitlements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Laws governing a Treasury book-entry... PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY TREASURY BONDS, NOTES AND BILLS HELD IN LEGACY TREASURY DIRECT Treasury/Reserve Automated Debt Entry System (TRADES) § 357.10 Laws governing a Treasury book...

  9. Surveying Public Attitudes of Security Sector Reforms in the Arab ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The notion that the security sector's primary responsibility is to protect and preserve autocratic Arab regimes is widely discredited today. ... of public opinion in security sector reform by providing evidence-based information on public perceptions, and in so doing, encouraging civilian oversight and transparency in the sector.

  10. Greenhouse gas credits trade versus biomass trade – weighing (Workshop Summary)

    NARCIS (Netherlands)

    Junginger, H.M.; Faaij, A.P.C.; Robertson, K.; Woes-Gallasch, S.; Schlamadinger, B.

    2006-01-01

    A workshop entitled ‘Greenhouse gas credits trade versus biomass trade – weighing the benefits’, jointly organised by IEA Bioenergy Tasks 38 (GHG Balances of Biomass and Bioenergy Systems) and 40 (Sustainable International Bioenergy Trade: Securing Supply and Demand), and ENOVA, took place in

  11. Supplemental Security Income Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The SSI Public-Use Microdata File contains an extract of data fields from SSA's Supplemental Security Record file and consists of a 5 percent random, representative...

  12. Trade policy and public health.

    Science.gov (United States)

    Friel, Sharon; Hattersley, Libby; Townsend, Ruth

    2015-03-18

    Twenty-first-century trade policy is complex and affects society and population health in direct and indirect ways. Without doubt, trade policy influences the distribution of power, money, and resources between and within countries, which in turn affects the natural environment; people's daily living conditions; and the local availability, quality, affordability, and desirability of products (e.g., food, tobacco, alcohol, and health care); it also affects individuals' enjoyment of the highest attainable standard of health. In this article, we provide an overview of the modern global trade environment, illustrate the pathways between trade and health, and explore the emerging twenty-first-century trade policy landscape and its implications for health and health equity. We conclude with a call for more interdisciplinary research that embraces complexity theory and systems science as well as the political economy of health and that includes monitoring and evaluation of the impact of trade agreements on health.

  13. New government to make social security cutbacks

    NARCIS (Netherlands)

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  14. Trade Agreements PTI

    Data.gov (United States)

    Department of Homeland Security — The objective of the Trade Agreements PTI is to advance CBP’s mission by working with internal and external stakeholders to facilitate legitimate trade and address...

  15. Public Health Crisis in War and Conflict - Health Security in Aggregate.

    Science.gov (United States)

    Quinn, John; Zelený, Tomáš; Subramaniam, Rammika; Bencko, Vladimír

    2017-03-01

    Public health status of populations is multifactorial and besides other factors it is linked to war and conflict. Public health crisis can erupt when states go to war or are invaded; health security may be reduced for affected populations. This study reviews in aggregate multiple indices of human security, human development and legitimacy of the state in order to describe a predictable global health portrait. Paradigm shift of large global powers to that non-state actors and proxies impact regional influence through scaled conflict and present major global health challenges for policy makers. Small scale conflict with large scale violence threatens health security for at-risk populations. The paper concludes that health security is directly proportional to state security. Copyright© by the National Institute of Public Health, Prague 2017

  16. Unbelievable security : Matching AES using public key systems

    NARCIS (Netherlands)

    Lenstra, A.K.; Boyd, C.

    2001-01-01

    The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching public key sizes for RSA and the ElGamal family of protocols. For the latter both traditional multiplicative groups of finite

  17. 17 CFR 240.12d2-1 - Suspension of trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Suspension of trading. 240... Securities Exchange Act of 1934 Suspension of Trading, Withdrawal, and Striking from Listing and Registration § 240.12d2-1 Suspension of trading. (a) A national securities exchange may suspend from trading a...

  18. 77 FR 56697 - Technology and Trading Roundtable

    Science.gov (United States)

    2012-09-13

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67802; File No. 4-652] Technology and Trading... Trading: Promoting Stability in Today's Markets'' to discuss ways to promote stability in markets that... Trading and Markets, Securities and Exchange Commission, 100 F Street NE., Washington, DC 20549-7010. By...

  19. The Challenges Facing the Multilateral Trading System in Addressing Global Public Policy Objectives

    Directory of Open Access Journals (Sweden)

    Christophe Bellmann

    2013-02-01

    Full Text Available Despite a record-breaking 14.5 per cent increase in world merchandise exports, the effects of the financial crisis and global recession are still hampering faster economic recovery. Relatively high oil prices combined with persistent unemployment and measures designed to reduce budget deficits have undermined short-term growth prospects. While South–South trade continues to explode, trade imbalances – i.e. the gap between exports and imports – widened in 2010 compared to 2009 (though smaller than pre-crisis levels. Meanwhile, trade negotiations under the Doha Round have reached an impasse, generating uncertainties about the future of the World Trade Organization (WTO as a negotiating forum. Under these circumstances, should the system rethink its decision-making process founded upon the predominance of member states, the principle of consensus and the notion of single undertaking, as some critics have suggested? And, if so, how could such a reform agenda be initiated at the WTO? Moreover, beyond the negotiating function of the WTO, the paralysis of the system also raises urgent questions about the ability of the system to respond to pressing challenges of our times, such as trade and climate change, or food security and price volatility.

  20. DOE contractor trade network: a decade of experience in training resource exchange

    International Nuclear Information System (INIS)

    Croll, P.; Weseman, M.

    1989-01-01

    Training Resources and Data Exchange (TRADE) refers to a series of activities designed to increase communication and exchanges of ideas, information, and resources among US Department of Energy contractor operated facilities in the field of training and human resource development. TRADE activities are planned and implemented by the DOE Contractor TRADE Executive Committee. TRADE objectives are accomplished through conference workshops, publications, and special interest groups. TRADE special interest groups include the following: computer-based training, emergency preparedness, industrial hygiene training, human resource issues, radiation protection training, safeguards and security training. The authors discuss how TRADE has evolved to meet changing contractor needs to improve human performance over the last 10 years. TRADE currently has working agreements to share training information with INPO, the Federal Laboratories Consortium, and the National Registry of Radiation Protection Technologists

  1. 17 CFR 166.2 - Authorization to trade.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Authorization to trade. 166.2 Section 166.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION CUSTOMER PROTECTION RULES § 166.2 Authorization to trade. No futures commission merchant, introducing broker or any of their...

  2. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  3. The controversy over free trade: the gap between economists and the general public

    OpenAIRE

    Cletus C. Coughlin

    2002-01-01

    Despite economists’ nearly universal support of free trade, the general public in the United States has serious reservations about it. In this article, Cletus C. Coughlin examines the reasons for this difference of opinion and the primary suggestions for bridging this gap.> Economists stress that free trade allows and, in fact, forces a nation to maximize the (net) value of the goods and services produced within its borders. Similarly, free trade allows consumers to maximize the net benefits ...

  4. The trend toward free trade areas: economic consequences and policy implications for the United States

    OpenAIRE

    All, William H., IV

    1992-01-01

    Approved for public release; distribution is unlimited Because America's economy relies to a significant degree on export markets and external sources of raw materials, the health of the international trading system is critical to the national security of the United States. This thesis demonstrates that the organization on which America has relied for the management of the international trading system since the 1950s, the General Agreement on Tariffs and Trade (GATT), is failing to effect...

  5. The relevance of security analyst opinions for investment decisions

    NARCIS (Netherlands)

    Gerritsen, D.F.

    2014-01-01

    Security analysts analyze information regarding publicly traded companies after which they publish their opinion regarding these companies’ stocks. In this dissertation the published opinions of two different types of analysts are analyzed. Technical analysts derive a recommendation to buy, hold, or

  6. Security, at what cost? A stated preference approach toward understanding individuals' privacy and civil liberties trade-offs regarding security measures

    NARCIS (Netherlands)

    Robinson, N.; Potoglou, D.

    2010-01-01

    In the presently heightened security environment there are a number of examples of policy that must strike a delicate balance between strengthening security without jeopardising public liberties and personal privacy. The introduction of national identity cards and biometric passports, the expansion

  7. Development of Competitive Gas Trading in Continental Europe

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-07-01

    In this publication the IEA examines the history of major gas markets' development in OECD Europe, and explores the possible expansion of trading through the mechanism of different hubs across the region. Lessons learned from North American markets on the benefits of regulatory convergence and investor-friendly legal framework are an important part of the analysis. Competitive trading based on transparent, non-discriminatory rules in a flexible and integrated European gas market will lead to more efficiency, timely investment, and greater market resilience, therefore ensuring more security for both customers and suppliers in the long term.

  8. 17 CFR 242.301 - Requirements for alternative trading systems.

    Science.gov (United States)

    2010-04-01

    ... trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... FUTURES Regulation Ats-Alternative Trading Systems § 242.301 Requirements for alternative trading systems. (a) Scope of section. An alternative trading system shall comply with the requirements in paragraph...

  9. The development of renewable energies and supply security: A trade-off analysis

    International Nuclear Information System (INIS)

    Röpke, Luise

    2013-01-01

    This paper analyzes the effects of the green transformation on the German electricity sector with respect to the energy-political triangle. It focuses on how the development of renewable energies will affect security of electricity supply. In a cost–benefit analysis, the value of supply security is compared with its costs of provision. More specifically, the benefits of maintaining the present quality of electricity supply are the avoided social damages from electricity outages and are compared with the respective investment costs in the low- and medium-voltage distribution grid. It is shown that the transformation process towards a green and decentralized production structure will be costly for society, even though the costs can be reduced by different measures. - Highlights: • The effects of the transformation on the German electricity sector are analyzed. • The paper focuses on the trade-off between green energies and supply security. • The benefits of maintaining supply quality are compared with the investment costs. • The costs of maintaining supply quality by far exceed the induced welfare gains. • A strong focus on renewable energies endangers different energy-political goals

  10. US public perspectives on security

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale [Univ. of Oklahoma, Norman, OK (United States); Jenkins-Smith, Hank C. [Univ. of Oklahoma, Norman, OK (United States); Silva, Carol L. [Univ. of Oklahoma, Norman, OK (United States)

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  11. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting... Analysis Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th...

  12. The Battle to Secure Our Public Access Computers

    Science.gov (United States)

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  13. 17 CFR 155.4 - Trading standards for introducing brokers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for introducing brokers. 155.4 Section 155.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.4 Trading standards for introducing brokers. (a) Each introducing broker...

  14. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  15. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide

    International Nuclear Information System (INIS)

    2012-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  16. 17 CFR 155.2 - Trading standards for floor brokers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for floor brokers. 155.2 Section 155.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.2 Trading standards for floor brokers. Each contract market shall adopt and submit...

  17. Securities and Exchange Commission Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-12-20

    ... Flexibility Analysis Required: Yes Agency Contact: Alicia Goldin, Division of Trading and Markets, Securities...: Alicia Goldin, Division of Trading and Markets, Securities and Exchange Commission, 100 F Street NE... Flexibility Analysis Required: Yes Agency Contact: Alicia Goldin, Division of Trading and Markets, Securities...

  18. 17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.

    Science.gov (United States)

    2010-04-01

    ... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...

  19. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    Science.gov (United States)

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  20. 77 FR 10004 - Nikron Technologies, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-02-21

    ... of Trading February 16, 2012. It appears to the Securities and Exchange Commission that there is a... trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed company is...

  1. Management of information security risks in a federal public institution: a case study

    Directory of Open Access Journals (Sweden)

    Jackson Gomes Soares Souza

    2016-11-01

    Full Text Available Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T. managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and their implementation aiming greater control of information security risks and opportunities related to information technology security.

  2. 77 FR 26056 - LocatePlus Holdings Corporation; Order of Suspension of Trading

    Science.gov (United States)

    2012-05-02

    ... Suspension of Trading April 30, 2012. It appears to the Securities and Exchange Commission that there is a... trading in the securities of the above-listed company, and any equity securities of any entity purporting..., that trading in the securities of the above-listed company, and any equity securities of any entity...

  3. 17 CFR 240.12f-3 - Termination or suspension of unlisted trading privileges.

    Science.gov (United States)

    2010-04-01

    ... unlisted trading privileges. 240.12f-3 Section 240.12f-3 Commodity and Securities Exchanges SECURITIES AND... Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-3 Termination or suspension of unlisted trading privileges. (a) The issuer of any security for which unlisted trading privileges...

  4. 75 FR 68636 - 8000, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2010-11-08

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] 8000, Inc.; Order of Suspension of Trading... and the protection of investors require a suspension of trading in the securities of 8000, Inc. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  5. 77 FR 26796 - HydroGenetics, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-05-07

    ... Trading May 2, 2012. It appears to the Securities and Exchange Commission that there is a lack of current... require a suspension of trading in the securities of HydroGenetics. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of HydroGenetics is...

  6. 17 CFR 230.139a - Publications by brokers or dealers distributing asset-backed securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Publications by brokers or... Publications by brokers or dealers distributing asset-backed securities. The publication or distribution by a broker or dealer of information, an opinion or a recommendation with respect to asset-backed securities...

  7. Examination of the effects of public spending and trade policy on real exchange rate in Cameroon

    Directory of Open Access Journals (Sweden)

    Victalice Ngimanang ACHAMOH

    2015-11-01

    Full Text Available The study adopts the inter-temporal model of Rodríguez (1989 and Edward (1989 extended in Elbadawi and Soto (1997 to empirically examine the effect of public expenditure and trade openness on the real exchange rate using Cameroon data from 1977 to 2010. After exploring some issues on exchange rate and reviewing the relevant literature, the study employs residual based-cointegration technique. All the variables were stationary at level form or first differences. Public spending significantly appreciates the real exchange likewise the trade openness variable in the longrun. The results of the study suggests that appreciation of real exchange rate could be prevented by contracting public spending or adopting restrictive trade measures especially in the long run.

  8. 77 FR 16113 - Asiamart, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-03-19

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Asiamart, Inc., Order of Suspension of Trading... and the protection of investors require a suspension of trading in the securities of the above-listed... trading in the securities of the above-listed company is suspended for the period from 9:30 a.m. EDT on...

  9. 78 FR 44185 - RVPlus, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-07-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] RVPlus, Inc.; Order of Suspension of Trading... and the protection of investors require a suspension of trading in the securities of the above-listed... trading in the securities of the above-listed company is suspended for the period from 9:30 a.m. EDT, on...

  10. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau, Federal Communications...

  11. 17 CFR 240.11a-1 - Regulation of floor trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Regulation of floor trading... Securities Exchange Act of 1934 Adoption of Floor Trading Regulation (rule 11a-1) § 240.11a-1 Regulation of floor trading. (a) No member of a national securities exchange, while on the floor of such exchange...

  12. 17 CFR 155.3 - Trading standards for futures commission merchants.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for futures commission merchants. 155.3 Section 155.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.3 Trading standards for futures commission merchants. (a) Each futures...

  13. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal..., Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445...

  14. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal.... Postal Service Mail to Jeffery Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security...

  15. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  16. Acceptance, control of and trade in irradiated food

    International Nuclear Information System (INIS)

    1989-01-01

    Proceedings of an International Conference on the Acceptance, Control of and Trade in Irradiated Food jointly organized by the Food and Agriculture Organization of the United Nations, the World Health Organization, the International Atomic Energy Agency and the International Trade Centre-UNCTAD/GATT and held in Geneva, 12-16 December 1988. The Conference was prompted by the lack of acceptance by some governments, which do not see a need for the application of food irradiation technology in their own countries, and as a consequence may hamper its use in other countries where its application could significantly improve consumer health and nutrition, as well as national economic and trading potential. This publication contains discussions on the key issues of the wholesomeness of irradiated food, the contribution of this technology to public health, food security and international trade, the control of the process to ensure its correct application for consumer protection, and the acceptance of irradiated food by industry and consumers. The proceedings include the International Document on Food Irradiation, highlighting the major issues related to the acceptance of irradiated food by consumers, governmental and intergovernmental activities, the control of the process, and trade. A number of Member States formally expressed their views on this International Document, expressing either endorsement or reservation, and their statements are included in these proceedings. Refs, fig and tabs

  17. 77 FR 58203 - Freedom Environmental Services, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-09-19

    ... Suspension of Trading September 17, 2012. It appears to the Securities and Exchange Commission that there is... require a suspension of trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the...

  18. 75 FR 36128 - Green Energy Resources, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2010-06-24

    ... Suspension of Trading June 22, 2010. It appears to the Securities and Exchange Commission that there is a... a suspension of trading in the securities of Green Energy. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...

  19. The Role of Latin America’s Land and Water Resources for Global Food Security: Environmental Trade-Offs of Future Food Production Pathways

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621

  20. 77 FR 13294 - Announcing Approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure...

    Science.gov (United States)

    2012-03-06

    ...-02] Announcing Approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure... approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure Hash Standard (SHS... Federal Information Processing Standard (FIPS) Publication 180-4, Secure Hash Standard (SHS). FIPS 180-4...

  1. 49 CFR 387.303 - Security for the protection of the public: Minimum limits.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Security for the protection of the public: Minimum... Insurance for Motor Carriers and Property Brokers § 387.303 Security for the protection of the public... convenience of the user, the revised text is set forth as follows: § 387.303 Security for the protection of...

  2. Satisfying the demand for financial information in public traded companies

    DEFF Research Database (Denmark)

    Holm, Claus

    A public traded company which wishes to comply with IAS standards and stock exchange requirements for full public disclosure of relevant information faces a major communication task. The Investor Relation policy of such a company has to satisfy a demand for financial information which seems...... line focus to the disclosure of cash flow surrogates like EBITA and EBITDA. Overall, the findings suggest a communication strategy intended to satisfy the demand from the professional analysts. However, the shear number of different key figures and financial ratios identified in the study suggest...

  3. Security Price Informativeness with Delegated Traders

    OpenAIRE

    Gary Gorton; Ping He; Lixin Huang

    2010-01-01

    Trade in securities markets is conducted by agents acting for principals, using "mark-to-market" contracts whereby performance is assessed using security market prices. We endogenize contract choices, information production, informed trading, and security price informativeness. But there is a contract externality. Prices are informative only because other principals induce their agents to trade based on privately produced information. The agent-traders then have an incentive to coordinate and...

  4. Predicting financial distress in publicly-traded companies

    Directory of Open Access Journals (Sweden)

    Felipe Fontaine Rezende

    2017-07-01

    Full Text Available ABSTRACT Several models for forecasting bankruptcy have been developed over the years, one of the reasons for which is the important part it plays in decision-making. However, forecasting a company’s bankruptcy leaves a very short time for stakeholders to change the situation. It is in this context that this paper arises in order to develop a model for predicting financial distress, which is identified as a step prior to bankruptcy. The predictive model uses the logistic regression technique with panel data and a sample of Brazilian publicly-traded companies with shares listed on the São Paulo Stock, Commodities, and Futures Exchange between 2001 and 2014. As well as financial variables, the final model includes market expectations (macroeconomic and sector variables. These variables are statistically tested and the hypothesis is confirmed that they improve the accuracy of the model. The research identified the existence of financial distress in 96% of the companies that went bankrupt. In addition, the relationship between the phenomena of bankruptcy and financial distress is verified, using financial and macroeconomic explanatory variables. The results demonstrate that most (83% of the explanatory variables in the model for predicting bankruptcy are also present in the model for predicting the phenomenon of financial distress. The expected gross domestic product variables and the quick ratio, asset turnover, and net equity over total liabilities financial variables are statistically significant in predicting both phenomena. With this evidence, the study suggests the use of the concept of financial distress as a stage prior to bankruptcy and provides a model for predicting financial distress with 89% accuracy when applied to publicly-traded companies in Brazil in the period examined.

  5. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory..., Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW., Room..., Public Safety and Homeland Security Bureau. [FR Doc. 2011-4398 Filed 2-25-11; 8:45 am] BILLING CODE 6712...

  6. Health security as a public health concept: a critical analysis.

    Science.gov (United States)

    Aldis, William

    2008-11-01

    There is growing acceptance of the concept of health security. However, there are various and incompatible definitions, incomplete elaboration of the concept of health security in public health operational terms, and insufficient reconciliation of the health security concept with community-based primary health care. More important, there are major differences in understanding and use of the concept in different settings. Policymakers in industrialized countries emphasize protection of their populations especially against external threats, for example terrorism and pandemics; while health workers and policymakers in developing countries and within the United Nations system understand the term in a broader public health context. Indeed, the concept is used inconsistently within the UN agencies themselves, for example the World Health Organization's restrictive use of the term 'global health security'. Divergent understandings of 'health security' by WHO's member states, coupled with fears of hidden national security agendas, are leading to a breakdown of mechanisms for global cooperation such as the International Health Regulations. Some developing countries are beginning to doubt that internationally shared health surveillance data is used in their best interests. Resolution of these incompatible understandings is a global priority.

  7. 78 FR 45996 - Duoyuan Printing, Inc.; Order of Suspension: of Trading

    Science.gov (United States)

    2013-07-30

    ...: of Trading July 26, 2013. It appears to the Securities and Exchange Commission that there is a lack... require a suspension of trading in securities of Duoyuan Printing, Inc. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in Duoyuan Printing, Inc. is...

  8. 76 FR 67528 - Curatech Industries, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2011-11-01

    ... of Trading October 28, 2011. It appears to the Securities and Exchange Commission that there is a... protection of investors require a suspension of trading in the securities of the company listed above. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  9. Re-envisioning global agricultural trade: time for a paradigm shift to ensure food security and population health in low-income countries.

    Science.gov (United States)

    Pirkle, Catherine M; Poliquin, Hélène; Sia, Drissa; Kouakou, Kouassi Joseph; Sagna, Tani

    2015-03-01

    In this commentary, we use examples from West Africa to highlight how the liberalization of global agricultural trade exacerbates population health inequalities by threatening the livelihoods and food security of communities in low-income settings. We highlight the exploitative nature of trade agreements with West African countries demonstrating how these agreements disincentivize local agricultural investment and take jobs away from small-scale farmers. Further, we link agricultural trade liberalization to increased food insecurity, malnutrition, and exposure to environmental contaminants. Finally, we propose a paradigm shift that advocates for food sovereignty and the right to food. © The Author(s) 2014.

  10. 78 FR 35351 - Polar Petroleum Corp.; Order of Suspension of Trading

    Science.gov (United States)

    2013-06-12

    ... Trading June 10, 2013. It appears to the Securities and Exchange Commission that there is a lack of... the protection of investors require a suspension of trading in the securities of the above-listed... trading in the securities of the above-listed company is suspended for the period from 9:30 a.m. EDT on...

  11. Multilateral trade liberalization and public goods provision in a North-South trade model with nonhomothetic preferences

    OpenAIRE

    Stibora, J.J.; Vaal, A. de

    2012-01-01

    Under nonhomothetic preferences developing countries are less likely to gain from multilateral trade liberalization than developed countries. This paper shows that this relative disadvantage for developing countries changes when the effects on public good provision are taken into account. The impact it has depends on the strength of their comparative advantage in export markets. We show that a strong (weak) comparative advantage in export markets mitigates (reinforces) the relative disadvanta...

  12. TTI Phase 2 Institutional Support: Kenya Institute for Public Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... public expenditure management, food security, tourism, regional integration and trade, private-sector development, education, poverty, infrastructure, service ... internal goals and targets are met and to assess the impact of KIPPRA's work

  13. 77 FR 5865 - China Agro-Technology Holdings Ltd.; Order of Suspension of Trading

    Science.gov (United States)

    2012-02-06

    ... Suspension of Trading February 2, 2012. It appears to the Securities and Exchange Commission that there is a... trading in the securities of China Agro-Technology Holdings Ltd. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of China Agro...

  14. 77 FR 36305 - Stream Communications Network & Media, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-06-18

    ....; Order of Suspension of Trading June 14, 2012. It appears to the Securities and Exchange Commission that... a suspension of trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the security of the above...

  15. 77 FR 58424 - China Mobile Media Technology, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-09-20

    ... Suspension of Trading September 18, 2012. It appears to the Securities and Exchange Commission that there is... trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed company is...

  16. Blockchain-based Public Key Infrastructure for Inter-Domain Secure Routing

    OpenAIRE

    de la Rocha Gómez-Arevalillo , Alfonso; Papadimitratos , Panos

    2017-01-01

    International audience; A gamut of secure inter-domain routing protocols has been proposed in the literature. They use traditional PGP-like and centralized Public Key Infrastructures for trust management. In this paper, we propose our alternative approach for managing security associations, Secure Blockchain Trust Management (SBTM), a trust management system that instantiates a blockchain-based PKI for the operation of securerouting protocols. A main motivation for SBTM is to facilitate gradu...

  17. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  18. Palestinian Security Sector Reform : the View of the Public | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    PSR will consult with various stakeholders - the Ministry of the Interior, the security services, the judiciary, members of Parliament, human rights organizations and international donors - in extensive surveys of the public's perception of the security sector in all its dimensions, including capacity, mission, performance, service ...

  19. Physicians and Insider Trading.

    Science.gov (United States)

    Kesselheim, Aaron S; Sinha, Michael S; Joffe, Steven

    2015-12-01

    Although insider trading is illegal, recent high-profile cases have involved physicians and scientists who are part of corporate governance or who have access to information about clinical trials of investigational products. Insider trading occurs when a person in possession of information that might affect the share price of a company's stock uses that information to buy or sell securities--or supplies that information to others who buy or sell--when the person is expected to keep such information confidential. The input that physicians and scientists provide to business leaders can serve legitimate social functions, but insider trading threatens to undermine any positive outcomes of these relationships. We review insider-trading rules and consider approaches to securities fraud in the health care field. Given the magnitude of the potential financial rewards, the ease of concealing illegal conduct, and the absence of identifiable victims, the temptation for physicians and scientists to engage in insider trading will always be present. Minimizing the occurrence of insider trading will require robust education, strictly enforced contractual provisions, and selective prohibitions against high-risk conduct, such as participation in expert consulting networks and online physician forums, by those individuals with access to valuable inside information.

  20. 78 FR 15402 - Xytos, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-03-11

    ... SECURITIES AND EXCHANGE COMMISSION [ File No. 500-1] Xytos, Inc.; Order of Suspension of Trading... financial conditions and business operations, and because of potentially manipulative conduct in the trading... investors require a suspension of trading in the securities of the above-listed company. Therefore, it is...

  1. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  2. Trade, Development, and the Political Economy of Public Standards

    OpenAIRE

    Swinnen, Johan F.M.; Vandemoortele, Thijs

    2009-01-01

    This paper presents a political economy model of public standards in an open economy model. We use the model to derive the political optimum and to analyze different factors that have an influence on this political equilibrium. The paper discusses how the level of development influences the political equilibrium. We also analyze the relation between trade and the political equilibrium and compare this political outcome with the social optimum to identify under which cases ‘under-standardizati...

  3. 77 FR 10004 - C$ cMoney, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-02-21

    ... Trading February 16, 2012. It appears to the Securities and Exchange Commission that there is a lack of... protection of investors require a suspension of trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  4. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  5. Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations

    Directory of Open Access Journals (Sweden)

    Myeonggil Choi

    2015-08-01

    Full Text Available Cloud computing has made it possible for private companies to make rapid changes in their computing environments. However, in the public sector, security issues hinder institutions from adopting cloud computing. To solve these security challenges, in this paper, we propose a methodology for information security management, which quantitatively classifies the importance of information in cloud systems in the public sector. In this study, we adopt a Delphi approach to establish the classification criteria of the proposed methodology in an objective and systematic manner. Further, through a case study of a public corporation, we try to validate the usefulness of the proposed methodology. The results of this study will help public institutions to consider introducing cloud computing and to manage cloud systems effectively and securely.

  6. Corporate Governance Provisions, Family Involvement, and Firm Performance in Publicly Traded Family Firms

    Directory of Open Access Journals (Sweden)

    Esra Memili

    2015-07-01

    Full Text Available This study examines the moderation effects of corporate governance provisions on the link between family involvement (i.e., family ownership and family management in publicly-traded firms and firm performance by drawing upon agency theory, with a focus on principal-principal agency issues, and the extant family governance literature. We develop and test the hypotheses on 386 of the S&P 500 firms longitudinally. Findings support the hypotheses suggesting the moderation effects of the use of provisions (a protecting controlling owners in terms of their sustainability of controlling status, and (b protecting management legally on the inverted U-shaped relationship between family ownership and firm performance. We also found support for the moderation effects of provisions (c protecting controlling owners in terms of their voting rights, (d protecting noncontrolling owners, and (e protecting management monetarily on the inverted U-shaped relationship between family management and firm performance. By this, our study provides empirical support for the principal-principal agency perspective on the corporate governance in publicly-traded family firms. As such, it suggests new avenues of research for both the corporate governance literature, as well as for the theory of the family firm. Our study also offers insights to policy directed toward monitoring the actions of large shareholders such as family and enhancing the overall shareholder value in publicly-traded family firms.

  7. Derivatives Trading and Negative Voting

    OpenAIRE

    Spamann, Holger

    2012-01-01

    This paper exposits a model of parallel trading of corporate securities (shares, bonds) and derivatives in which a large trader can sometimes profitably acquire securities with their corporate control rights for the sole purpose of reducing the corporations value and gaining on a net short position created through off-setting derivatives. At other times, the large trader profitably takes a net long position. The large trader requires no private information beyond its own trades. The problem i...

  8. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  9. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  10. The problem of using trade secrets in economic relations

    Directory of Open Access Journals (Sweden)

    А. О. Олефір

    2015-05-01

    Full Text Available Problem setting. In a market economy and increased competition between enterprises become increasingly important concepts such as business information, trade secrets, know-how, confidential information, the information with restricted access. Given the fact that only one patent protection is unable to meet the needs of researchers, in addition to formal public protection and secured legal means we would like to pay attention at private legal measures, particular, the mode of trade secrets. Recent research and publications analysis. Different aspects of the protection of trade secrets were investigated by specialists such as G. Androschuk, J. Berzhye, I. Davydov, O. Davydyuk, D. Zadyhaylo, P. Kraynov, G. Nikiforov, S. Nikiforov, V. Rubanov, E. Solovyov, L. Hoffman, V. Chaplygin, A. Cherniavsky and others. However, at present there is a lack of comprehensive research of this legal phenomenon, equally useful for innovators and businesses that actively protect corporate security. Paper objective. This article is planned to determine the legal characteristics, structural elements and mechanisms by which the use of trade secrets in business have a positive impact on innovation development and corporate security entities. Paper main body. On the basis of requirements of Art. 505 Civil Code of Ukraine and art. 39 of the TRIPS Agreement we formulated commercial information signs under which it receives legal protection as an object of intellectual property: (1 privacy (real or potential in the sense that it is as a whole or in a precise combination of aggregate and its components are not generally known or available to persons in the circles that normally deal with such information; (2 commercial value (not purely industrial or industrial, due to its secrecy; this information is unknown to others, which is a commercial interest; (3 the lawful holder of the information provides active special measures (technical, organizational, legal to preserve secrecy

  11. 76 FR 58774 - Trade Mission to Southeast Asia in Conjunction With Trade Winds-Asia

    Science.gov (United States)

    2011-09-22

    ... trade mission stop in either: Malaysia (Kuala Lumpur) or Indonesia (Jakarta). Each trade mission stop... cross section of industries with growth potential in Singapore, Vietnam, Thailand, Malaysia and... equipment, safety and security equipment, automotive parts and service equipment, and logistics and...

  12. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY... Fullano, Associate Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission...

  13. 78 FR 3044 - Exchange Traded Spreads Trust, et al.; Notice of Application

    Science.gov (United States)

    2013-01-15

    ... the series to deposit securities into, and receive securities from, the series in connection with the... securities (``Equity Funds'') or fixed income securities (``Fixed Income Funds'') traded in the U.S. or non-U... Equity Funds''), Fixed Income Funds that invest in fixed income securities traded in the U.S. market...

  14. Determinants of corporate cash holdings: Evidence from Portuguese publicly traded firms

    Directory of Open Access Journals (Sweden)

    Fernandes, Filipa

    2017-05-01

    Full Text Available This paper investigates the determinants of cash holdings of publicly traded Portuguese firms. We find that such firms hold less cash than similar companies operating in countries where both shareholders and creditors’ rights are more tightly protected by the law. In addition, our regression results suggest that leverage, other liquid assets, and firm growth are negatively correlated with our sample firms’ cash holdings whereas long-term debt and financial distress are positively correlated. Our findings cannot be reconciled with just one of the existent theories (trade-off, pecking order and free cashflow theory, and emphasize the importance of a country’s legal, institutional, and economic environment for explaining firms’ cash holdings decisions.

  15. Digital Trade Infrastructures: A Framework for Analysis

    Directory of Open Access Journals (Sweden)

    Boriana Boriana

    2018-04-01

    Full Text Available In global supply chains, information about transactions resides in fragmented pockets within business and government systems. The lack of reliable, accurate and complete information makes it hard to detect risks (such as safety, security, compliance and commercial risks and at the same time makes international trade inefficient. The introduction of digital infrastructures that transcend organizational and system domains is driven by the prospect of reducing the fragmentation of information, thereby enabling improved security and efficiency in the trading process. This article develops a digital trade infrastructure framework through an empirically grounded analysis of four digital infrastructures in the trade domain, using the conceptual lens of digital infrastructure.

  16. Multilateral, regional and bilateral energy trade governance

    Energy Technology Data Exchange (ETDEWEB)

    Leal-Arcas, Rafael; Grasso, Costantino; Rios, Juan Alemany (Queen Mary Univ. of London (United Kingdom))

    2014-12-01

    The current international energy trade governance system is fragmented and multi-layered. Streamlining it for greater legal cohesiveness and international political and economic cooperation would promote global energy security. The current article explores three levels of energy trade governance: multilateral, regional and bilateral. Most energy-rich countries are part of the multilateral trading system, which is institutionalized by the World Trade Organization (WTO). The article analyzes the multilateral energy trade governance system by focusing on the WTO and energy transportation issues. Regionally, the article focuses on five major regional agreements and their energy-related aspects and examines the various causes that explain the proliferation of regional trade agreements, their compatibility with WTO law, and then provides several examples of regional energy trade governance throughout the world. When it comes to bilateral energy trade governance, this article only addresses the European Union’s (EU) bilateral energy trade relations. The article explores ways in which gaps could be filled and overlaps eliminated whilst remaining true to the high-level normative framework, concentrating on those measures that would enhance EU energy security.

  17. 17 CFR 242.303 - Record preservation requirements for alternative trading systems.

    Science.gov (United States)

    2010-04-01

    ... requirements for alternative trading systems. 242.303 Section 242.303 Commodity and Securities Exchanges... REQUIREMENTS FOR SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.303 Record preservation requirements for alternative trading systems. (a) To comply with the condition set forth in paragraph (b)(9) of...

  18. 17 CFR 37.4 - Election to trade excluded and exempt commodities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Election to trade excluded and exempt commodities. 37.4 Section 37.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION EXECUTION FACILITIES § 37.4 Election to trade excluded and exempt...

  19. Public Security in Brazil: What has been Done About the Homicides?

    Directory of Open Access Journals (Sweden)

    Ana Carolina de Morais Colombaroli

    2016-10-01

    Full Text Available The situation experienced in Brazil can be called "homicide epidemic": in 2014, a rate of 29.1 homicides per 100,000 inhabitants has been reached, an impressively high rate, compared to the world average of 6.9 homicides. The State has shown itself ineffective in face of the deterioration of public security conditions in the country. This paper seeks to verify the evolution of homicide rates in Brazil; analyze the responses given by the State to this increase in crime by verifying the (ineffectiveness of public security policies in reducing homicides; and present public policy strategies in order to reduce violence.

  20. Human Security and Energy Security: A Sustainable Energy System as a Public Good

    NARCIS (Netherlands)

    Karlsson-Vinkhuyzen, S.I.S.E.; Jollands, N.

    2013-01-01

    This chapter is dedicated to the concept of human security and its link to energy and energy governance, particularly global energy governance. Through this focus emerges the need to look at the links between the concept of public goods and energy. Our starting argument is that conventional notions

  1. 78 FR 20960 - Face Up Entertainment Group, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-04-08

    ... Suspension of Trading April 4, 2013. It appears to the Securities and Exchange Commission that there is a... business operations, and trading in its securities. Face Up is a Florida corporation based in Valley Stream... interest and the protection of investors require a suspension of trading in the securities of the above...

  2. MANAGERIAL ACCOUNTING AND PRICING FOR SALE OF GOODS AND PRODUCTS IN TRADE AND PUBLIC CATERING

    Directory of Open Access Journals (Sweden)

    TUHARI Tudor

    2017-06-01

    Full Text Available The most relevant problems of accounting and control in the sphere of commodity exchange are the reliable determination of the cost of mass goods and products during their storage and sale, as well as the operational orientation in pricing, taking into account the demand and supply in the interests of obtaining the necessary profit at an appropriate level of profitability. In the case of the sum stock accounting method for the goods in the retail trade and public catering, the especially important element of the accounting is the process of formation of retail sales prices and calculation of production cost of sales and profit of the enterprise. The article mainly focuses on the method of determining the retail sales prices for goods and products in the area of trade and public catering, respectively, through the use of trade mark-ups in percentage terms in relation not to the purchase, but to retail sales prices including VAT. Determining the cost of sales and its accounting is recommended to adjust only at the end of the month based on the calculation of the average percentage of trade mark-up (margin.

  3. 77 FR 52633 - Public Safety and Homeland Security Bureau Seeks Comment on Post-Reconfiguration 800 MHz Band...

    Science.gov (United States)

    2012-08-30

    ... border. The Public Safety and Homeland Security Bureau (Bureau), by this action, affords interested... INFORMATION CONTACT: Brian Marenco, Policy and Licensing Division, Public Safety and Homeland Security Bureau... 2007, the Commission delegated authority to Public Safety and Homeland Security Bureau to propose and...

  4. Smart trade logistics - Compliance as an opportunity

    NARCIS (Netherlands)

    Zomer, G.R.

    2011-01-01

    Facilitation of trade logistics aims at simplification and harmonization of border procedures and related documentation. This is an accelerator for global trade and economic growth and therefore a priority in global trade policy. Trends in logistics and supply chain security and innovations in

  5. Effects of cross-border power trade between Laos and Thailand: Energy security and environmental implications

    International Nuclear Information System (INIS)

    Watcharejyothin, Mayurachat; Shrestha, Ram M.

    2009-01-01

    This paper analyzed the effects of hydropower development in Laos and power trade between Laos and Thailand on economy wide, energy resource mix, power generation capacity mix, energy system cost, environment, as well as, energy security. A MARKAL-based model for an integrated energy system of Laos and Thailand was developed to assess the effects of energy resource development and trade to meet the national energy demands of the two countries. Two national MARKAL-based energy system models of Laos and Thailand were formulated for the study. The results show that 80% exploitation of water resource in Laos would induce power trade between the countries. The integrated energy system cost is found to decrease marginally but it would mitigate the CO 2 emission by 2% when compared with the base case. Thailand is expected to gain benefit from the increased level of power imported from Laos in terms of the lower energy system cost, better environmental quality and, greater diversification of energy sources. As compared to the base case, Laos would become the net energy exporter, earn significant export revenue, and improve the increase in revenue of energy export per increase in total energy system cost from the maximum exploitation of hydropower resource.

  6. Virtual-optical information security system based on public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  7. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  8. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

  9. Publicity in secured transactions law: Towards a European public notice filing system for non-possessory security rights in movable assets?

    NARCIS (Netherlands)

    Hamwijk, D.J.Y.

    2014-01-01

    There is a growing call to introduce a European public notice filing system for security rights in movable goods comparable to the notice filing system of Art. 9 UCC. A proposal to this effect has been adopted in Book IX DCFR, which represents a comprehensive framework of rules for proprietary

  10. 77 FR 52766 - Technology and Trading Roundtable

    Science.gov (United States)

    2012-08-30

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67725; File No. 4-652] Technology and Trading... ``Technology and Trading: Promoting Stability in Today's Markets'' to discuss ways to promote stability in..., implement, and manage complex and inter-connected trading technologies. The roundtable discussion will be...

  11. A General Construction of IND-CCA2 Secure Public Key Encryption

    DEFF Research Database (Denmark)

    Kiltz, Eike; Malone-Lee, John

    2003-01-01

    We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction....

  12. Measuring the Information Content of Stock Trades.

    OpenAIRE

    Hasbrouck, Joel

    1991-01-01

    This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE issues suggest a trade's full price impact arrives only with a protracted lag; the impact is a positive and concave function of the trade size; large trades cause the spread to widen; trades occurring in ...

  13. BENEFITS AND DRAWBACKS OF ONLINE TRADING VERSUS TRADITIONAL TRADING. EDUCATIONAL FACTORS IN ONLINE TRADING

    Directory of Open Access Journals (Sweden)

    Petric (Iancu Ioana Ancuta

    2015-07-01

    Full Text Available In terms of marketing, online trading is a new distribution channel and trading platforms are products of Investment and Financial Services Companies. Internet shortens the connection between the investor and the products they wish to purchase (shares, futures, CFDs, government securities, bonds, etc., and in some cases it no longer needs a security broker. Increasing use of the Internet and increasing competitiveness between Investment and Financial Services Companies do the latter, to seek new distribution channels to specific products. The purpose of this paper is to examine to what extent the investor education level affects the decision to move from traditional trading to online trading and the benefits and disadvantages of these types of transactions. To whom should the Investment and Financial Services Companies guide their marketing campaign to attract more investors for online platforms? The work presented is part of a larger project that will be part of author thesis, studying other factors that influence the decision to move from traditional to online trading: cost factor, time factor, psychological and social attributes of investors, yield portfolios and technological capacities of Investment and Financial Services Companies. Starting from the idea that with the increase of experience in stock investments the investors will want to make their own decisions, Investment and Financial Services Companies should provide new products. Compared to competitors, an Investment and Financial Services Company must innovate, and information technology currently offers the tools for innovation facilities. At the same time, the existence and development of the Internet has made the transaction without assistance or with minimal human intervention possible (Voss, 2000. The difference is in the knowledge about stock market, the speed the transaction orders arrive in the stock market, direct access to multiple markets, transaction costs and the level

  14. The WHO/WTO study on trade and public health: a critical assessment.

    Science.gov (United States)

    Howse, Robert

    2004-04-01

    This article provides a brief critical examination of a 2002 report jointly issued by the World Health Organization and the World Trade Organization on WTO law and public health. The author argues that the report is in many respects misleading as to the content of WTO law, as interpreted by the Appellate Body of the WTO, its final court. In particular, the WHO/WTO report systematically understates or underestimates the margins of regulatory autonomy that WTO member states have to make regulations that protect public health.

  15. Official report to the government 2000:13. Electronic trading and business management in the oil- and gas industry. Consequences and possibilities for the Norwegian oil- and gas industry

    International Nuclear Information System (INIS)

    2001-01-01

    This report includes (1) a discussion of the development of electronic trading in general, (2) the development of electronic trading in the oil- and gas industry and (3) the role of the authorities in electronic trading and business management. It is realized that electronic trading and business management will quickly and profoundly change the trading among companies. The petroleum industry is expected to be among the leading industries in using electronic trading and many of the work processes that now characterize this sector will soon change. A number of public measures are already in effect to facilitate the use of electronic trading and the use of the Internet. Special attention has been given to legal issues and security aspects in trading over the Internet. No special need is seen for public measures with regard to standardization

  16. Water security in South Africa: perceptions on public expectations ...

    African Journals Online (AJOL)

    Water security in South Africa: perceptions on public expectations and municipal ... will in government, a need to restore citizen trust in government intention and capability ... services, and a failure to up-scale existing water re-use technology.

  17. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its fourth meeting on...

  18. Domains of State-Owned, Privately Held, and Publicly Traded Firms in International Competition.

    Science.gov (United States)

    Mascarenhas, Briance

    1989-01-01

    Hypotheses relating ownership to domain differences among state-owned, publicly traded, and privately held firms in international competition were examined in a controlled field study of the offshore drilling industry. Ownership explained selected differences in domestic market dominance, international presence, and customer orientation, even…

  19. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its third meeting on October...

  20. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Security, Reliability, and Interoperability Council (CSRIC III) scheduled for December 5, 2012, at Federal...

  1. American security perspectives: public views on energy, environment, nuclear weapons and terrorism: 2008

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from matching national surveys of the US general public on US energy and environmental security administered by telephone and Internet in mid-2008. Key areas of investigation include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alter-native sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include evolving perspectives on global climate change and relationships among environmental issues and potential policy options. We also report findings from an Internet survey of the general public conducted in mid-2008 that investigates assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism.

  2. Structure and evolution of the global seafood trade network

    Science.gov (United States)

    Gephart, Jessica A.; Pace, Michael L.

    2015-12-01

    The food production system is increasingly global and seafood is among the most highly traded commodities. Global trade can improve food security by providing access to a greater variety of foods, increasing wealth, buffering against local supply shocks, and benefit the environment by increasing overall use efficiency for some resources. However, global trade can also expose countries to external supply shocks and degrade the environment by increasing resource demand and loosening feedbacks between consumers and the impacts of food production. As a result, changes in global food trade can have important implications for both food security and the environmental impacts of production. Measurements of globalization and the environmental impacts of food production require data on both total trade and the origin and destination of traded goods (the network structure). While the global trade network of agricultural and livestock products has previously been studied, seafood products have been excluded. This study describes the structure and evolution of the global seafood trade network, including metrics quantifying the globalization of seafood, shifts in bilateral trade flows, changes in centrality and comparisons of seafood to agricultural and industrial trade networks. From 1994 to 2012 the number of countries trading in the network remained relatively constant, while the number of trade partnerships increased by over 65%. Over this same period, the total quantity of seafood traded increased by 58% and the value increased 85% in real terms. These changes signify the increasing globalization of seafood products. Additionally, the trade patterns in the network indicate: increased influence of Thailand and China, strengthened intraregional trade, and increased exports from South America and Asia. In addition to characterizing these network changes, this study identifies data needs in order to connect seafood trade with environmental impacts and food security outcomes.

  3. 78 FR 29779 - Labor Affairs Council of the United States-Colombia Trade Promotion Agreement; Notice of Public...

    Science.gov (United States)

    2013-05-21

    ... Trade Promotion Agreement; Notice of Public Session Meeting AGENCY: International Labor Affairs Bureau... Labor Affairs Bureau (ILAB) of the U.S. Department of Labor gives notice of the public session of the meeting of the Labor Affairs Council (``Council'' or ``LAC''). The LAC public session has been rescheduled...

  4. Integrating Local Public Health Agencies into the Homeland Security Community

    National Research Council Canada - National Science Library

    Reed, Patricia D

    2007-01-01

    After more than seven years of funding through The Centers for Disease Control and Prevention, local public health agencies have made inconsistent progress in fulfilling their Homeland Security objectives...

  5. Essays on investor behavior and trading activity

    OpenAIRE

    Kyröläinen, P. (Petri)

    2007-01-01

    Abstract This thesis investigates a set of equity market phenomena associated with investors' trading activity, using a comprehensive Finnish Central Securities Depository (FCSD) database that records practically all trades by Finnish investors. This database enables us to classify a large number of heterogeneous investors using both economic and institutional characteristics. The first essay classifies investors by trading activity. It analyzes trading styles of active and passive inv...

  6. Enhancing U.S. National Security: The Case for Hemispheric Free Trade

    Science.gov (United States)

    1992-04-15

    and trade and relations with the hemisphere. Part III takes a closer look at the President’s free trade proposal, examining the pros and cons . In Part...objectives? We turn to this question next. FREE TRADE AREAS: PROS AND CONS A free trade area (FTA) can be said to expand economic well- being if it...Riahts Concerns Those who oppose hemispheric free trade on human rights grounds argue that free trade will engender sweatshop conditions in the lower

  7. A Study of Customer Satisfaction on Online Trading System Application of Securities Company in Indonesia Using Servqual

    Directory of Open Access Journals (Sweden)

    Hery Hery

    2015-05-01

    Full Text Available The purpose of this study is to measure the service  quality of online trading system implemented by PT  KDB  Daewoo  Securities  Indonesia.  The study is  a part of the company  efforts to provide  the best solution  services. The study  is performed   to determine the influence of service quality  factors on the customer satisfaction by means of ServQual  method. The method takes  into account  five  independent  variables,  namely, reliability (X1 ,  responsiveness  (X2 ,  assurance  (X3 , empathy (X4 , and tangibility (X5 . Meanwhile,  the cus- tomer satisfaction is considered as the dependent variable (Y . The population of of the study  is all 67 900 online traders at the company and the sample size is 265 traders. The data are collected via questionnaires and interviews. From the study results, we conclude that the five variables have  significant  influence  on the customer  satisfaction on the online trading system application   at PT KDB Daewoo Securities Indonesia. To  improve  the customer satisfaction, the company  should prioritize the quality- related factors,  and expand  and upgrade  the existing facilities and infrastructures.

  8. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  9. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  10. The Anatomy of Digital Trade Infrastructures

    DEFF Research Database (Denmark)

    Rukanova, Boriana; Zinner Henriksen, Helle; Henningsson, Stefan

    2017-01-01

    In global supply chains information about transactions resides in fragmented pockets within business and government systems. The introduction of digital trade infrastructures (DTI) that transcend organizational and systems domains is driven by the prospect of reducing this information fragmentation......, thereby enabling improved security and efficiency in trade process. To understand the problem at hand and build cumulative knowledge about its resolution a way to conceptualize the different digital trade infrastructure initiatives is needed. This paper develops the Digital Trade Infrastructure Framework...

  11. Polling and public opinion: a Canadian perspective

    National Research Council Canada - National Science Library

    Butler, Peter Marshall

    2007-01-01

    ..., advertising, and government policy. Using such controversial issues such as free trade, health care, same-sex marriage, and national security, Butler argues that popular opinion on such hot-button topics as these can be guided and changed according to how polls are interpreted for and presented to the public. As well as analysing the impact of po...

  12. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  13. 17 CFR 155.6 - Trading standards for the transaction of business on registered derivatives transaction execution...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for the transaction of business on registered derivatives transaction execution facilities. 155.6 Section 155.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.6 Trading...

  14. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  15. Regulating different trading venues: The European experience based on MiFID

    DEFF Research Database (Denmark)

    Clausen, Nis Jul; Sørensen, Karsten Engsig

    2012-01-01

    a legal analysis of the changes in trading pattern for securities that had accured sind the implementation of MiFID in 2007......a legal analysis of the changes in trading pattern for securities that had accured sind the implementation of MiFID in 2007...

  16. Security in Brazilian Universities: Compared Prospects of Public Institutions

    Directory of Open Access Journals (Sweden)

    Christiane de Holanda Camilo

    2016-12-01

    Full Text Available This article is a presentation of preliminary results of the data collected in the "Research Project Violence, Conflict and Crime: Subsidies for the Formulation of UFG Security Policy" held between 2014-2015. The objective is to analyze policies to prevent violence in universities. The methodology used was an exploratory and documental research and are based public information available on institutional websites. The five universities surveyed were: UFSC, USP, UFMT, UFMG and UNILA. The results allowed certain approximation and divergence on the concepts of security on campuses, as the statistical record and the presence of military police at the university.

  17. 27 CFR 19.966 - Security.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.966 Section 19.966 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF... and Security § 19.966 Security. Proprietors shall provide security adequate to deter the unauthorized...

  18. 12 CFR 335.241 - Unlisted trading.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Unlisted trading. 335.241 Section 335.241 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY SECURITIES OF NONMEMBER INSURED BANKS § 335.241 Unlisted trading. The provisions of the applicable and...

  19. One Health, One World—The Intersecting Legal Regimes of Trade, Climate Change, Food Security, Humanitarian Crises, and Migration

    OpenAIRE

    Garcia, Kelli K.; Gostin, Lawrence O.

    2012-01-01

    Today’s global health challenges require a multi-sectoral approach in which health is a fundamental value within global governance and international law. “One Health, One World” provides a unified, harmonious vision of global health governance that supports the wellbeing of humans and animals living in a clean and temperate environment. This article focuses on five legal regimes—trade law, food security law, environmental law, humanitarian law, and refugee law—that play a pivotal role in infl...

  20. 78 FR 60191 - United States-Colombia Trade Promotion Agreement

    Science.gov (United States)

    2013-10-01

    ... Trade Promotion Agreement AGENCY: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States- Colombia Trade Promotion... States-Colombia Trade Promotion Agreement (``CTPA'' or ``Agreement''), and on June 28, 2007, the Parties...

  1. 77 FR 64031 - United States-Peru Trade Promotion Agreement

    Science.gov (United States)

    2012-10-18

    ... Trade Promotion Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States-Peru Trade Promotion Agreement... other customs-related provisions of the United States-Peru Trade Promotion Agreement (PTPA). Please...

  2. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  3. 17 CFR 240.12f-1 - Applications for permission to reinstate unlisted trading privileges.

    Science.gov (United States)

    2010-04-01

    ... reinstate unlisted trading privileges. 240.12f-1 Section 240.12f-1 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-1 Applications for permission to reinstate unlisted trading privileges. (a) An application to reinstate unlisted...

  4. Feeding humanity through global food trade

    Science.gov (United States)

    D'Odorico, Paolo; Carr, Joel A.; Laio, Francesco; Ridolfi, Luca; Vandoni, Stefano

    2014-09-01

    The recent intensification of international trade has led to a globalization of food commodities and to an increased disconnection between human populations and the land and water resources that support them through crop and livestock production. Several countries are not self-sufficient and depend on imports from other regions. Despite the recognized importance of the role of trade in global and regional food security, the societal reliance on domestic production and international trade remains poorly quantified. Here we investigate the global patterns of food trade and evaluate the dependency of food security on imports. We investigate the relationship existing between the trade of food calories and the virtual transfer of water used for their production. We show how the amount of food calories traded in the international market has more than doubled between 1986 and 2009, while the number of links in the trade network has increased by more than 50%. Likewise, global food production has increased by more than 50% in the same period, providing an amount of food that is overall sufficient to support the global population at a rate of 2700-3000 kcal per person per day. About 23% of the food produced for human consumption is traded internationally. The water use efficiency of food trade (i.e., food calories produced per unit volume of water used) has declined in the last few decades. The water use efficiency of food production overall increases with the countries' affluence; this trend is likely due to the use of more advanced technology.

  5. One Health, One World—The Intersecting Legal Regimes of Trade, Climate Change, Food Security, Humanitarian Crises, and Migration

    Directory of Open Access Journals (Sweden)

    Kelli K. Garcia

    2012-04-01

    Full Text Available Today’s global health challenges require a multi-sectoral approach in which health is a fundamental value within global governance and international law. “One Health, One World” provides a unified, harmonious vision of global health governance that supports the wellbeing of humans and animals living in a clean and temperate environment. This article focuses on five legal regimes—trade law, food security law, environmental law, humanitarian law, and refugee law—that play a pivotal role in influencing health outcomes and are integral to achieving the One Health, One World vision. International trade, for example, opens markets not only to life-saving products such as vaccines, medicines, and medical equipment, but also to life-threatening products such as tobacco and asbestos. If strengthened and enforced, environmental law can decrease air and water pollution, major causes of death and disability. World hunger has been exacerbated by the global economic crisis and climate change, increasing the urgency for international law to enhance food security. Humanitarian law must similarly be strengthened to protect civilians adequately as the nature of warfare continues to change. Refugee law plays a pivotal role in protecting the health of deeply vulnerable people who lack food, shelter, and social stability. Higher standards and more effective compliance are necessary for international law to realize its full potential to safeguard the world's population.

  6. Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jong Min Kim

    2016-01-01

    Full Text Available Basic security of data transmission in battery-powered wireless sensor networks (WSNs is typically achieved by symmetric-key encryption, which uses little energy; but solar-powered WSNs sometimes have sufficient energy to achieve a higher level of security through public-key encryption. However, if energy input and usage are not balanced, nodes may black out. By switching between symmetric-key and public-key encryption, based on an energy threshold, the level of security can be traded off against the urgency of energy-saving. This policy can also reduce the amount of energy used by some nodes in a WSN, since data encrypted using a public-key is simply relayed by intermediate nodes, whereas data encrypted using a symmetric-key must be decrypted and reencrypted in every node on its path. Through a simulation, we compared the use of either symmetric-key or public-key encryption alone with our scheme, which was shown to be more secure, to use energy more effectively, and to reduce the occurrence of node blackouts.

  7. Public views on multiple dimensions of security: nuclear weapons, terrorism, energy, and the environment: 2007

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  8. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  9. The impact of later trading hours for Australian public houses (hotels) on levels of violence.

    Science.gov (United States)

    Chikritzhs, Tanya; Stockwell, Tim

    2002-09-01

    To examine the impact of later trading hours for licensed hotels (Australian public houses are usually known as "hotels") in Perth, Western Australia, on levels of violent assault on or near these premises. Data on assault offenses reported to police between July 1, 1991, and June 30, 1997, were examined to identify those offenses that occurred on or close to hotels. During this period, 45 (24%) of the 188 hotels meeting study criteria were granted an extended trading permit for 1AM closing ("ETP hotels"), whereas the rest continued to close at midnight ("non-ETP hotels"). A time-series analysis employing linear regression was used to test whether there was a relationship between the introduction of extended trading and monthly rates of assaults associated with ETP hotels, while controlling for the general trend in assault rates among normally trading hotels. Possible confounders and other variables of interest (e.g., levels of alcohol purchases) were also examined. After controlling for the general trend in assaults occurring throughout Perth hotels, there was a significant increase in monthly assault rates for hotels with late trading following the introduction of extended trading permits. This relationship was largely accounted for by higher volumes of high alcohol content beer, wine and distilled spirits purchased by late trading hotels. Late trading was associated with both increased violence in and around Perth hotels and increased levels of alcohol consumption during the study period. It is suggested that greater numbers of patrons and increased levels of intoxication contributed to the observed increase in violence and that systematic planning and evaluation of late trading licenses is required.

  10. 76 FR 65365 - United States-OMAN Free Trade Agreement

    Science.gov (United States)

    2011-10-21

    ... Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... other customs-related provisions of the United States--Oman Free Trade Agreement entered into by the... the U.S.-Oman Free Trade Agreement (``OFTA'' or ``Agreement''). The provisions of the OFTA were...

  11. 78 FR 32356 - United States-Korea Free Trade Agreement

    Science.gov (United States)

    2013-05-30

    ...-Korea Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... treatment and other customs-related provisions of the United States-Korea Free Trade Agreement entered into...-Korea Free Trade Agreement (hereinafter ``UKFTA'' or the ``Agreement''). On December 3, 2010, the United...

  12. Maritime Security – The Need for a Global Agreement

    OpenAIRE

    Dinos Stasinopoulos

    2003-01-01

    This note reviews US maritime security measures, outlines work carried out by international organisations and then frames maritime security within the wider context of maritime trade. Finally, it suggests the development of a Global Agreement linking security and other maritime trade-related issues. The initiative for such an agreement should be undertaken by the EU only if current International Maritime Organisation (IMO) efforts fail to produce a maritime security framework with binding req...

  13. Trade and investment rules for energy

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-09-15

    Rules that govern energy trade is an issue that has generated increasing concern everywhere, from the standpoint of both the security of supply for consumers and security of demand for suppliers. This concern reflects the importance of rules that comprehensively address the needs from supply and demand point of view and integrate the international fabric of energy trade. The GATT and the WTO Agreement define trans-border movement of energy but leave many aspects unclear, particularly as efforts accelerate to control carbon emissions. This timely report by a WEC Task Force of experts with legal standing in the energy business identifies the most pressing issues relating to energy trade and suggests actions and measures which, if implemented, would provide clarity and answer many questions. More importantly, these measures would strengthen the WTO and coming rounds of negotiations.

  14. Reserves and Trade Jointly Determine Exposure to Food Supply Shocks

    Science.gov (United States)

    Marchand, Philippe; Carr, Joel A.; Dell'Angelo, Jampel; Fader, Marianela; Gephart, Jessica A.; Kummu, Matti; Magliocca, Nicholas; Porkka, Miina; Puma, Michael J.; Zak, Ratajczak

    2016-01-01

    While a growing proportion of global food consumption is obtained through international trade, there is an ongoing debate on whether this increased reliance on trade benefits or hinders food security, and specifically, the ability of global food systems to absorb shocks due to local or regional losses of production. This paper introduces a model that simulates the short-term response to a food supply shock originating in a single country, which is partly absorbed through decreases in domestic reserves and consumption, and partly transmitted through the adjustment of trade flows. By applying the model to publicly-available data for the cereals commodity group over a 17 year period, we find that differential outcomes of supply shocks simulated through this time period are driven not only by the intensification of trade, but as importantly by changes in the distribution of reserves. Our analysis also identifies countries where trade dependency may accentuate the risk of food shortages from foreign production shocks; such risk could be reduced by increasing domestic reserves or importing food from a diversity of suppliers that possess their own reserves. This simulation-based model provides a framework to study the short-term, nonlinear and out-of-equilibrium response of trade networks to supply shocks, and could be applied to specific scenarios of environmental or economic perturbations.

  15. Public security and peace building operations in post-armed conflict periods

    OpenAIRE

    Aguilar, Sérgio Luiz Cruz

    2012-01-01

    The article shows how contemporary peace operations conducted bythe United Nations (UN) to manage and/or resolve armed conflicts have dealt withthe issue of public security. As part of the effort to establish a lasting peace in theseterritories, the activities of the Organization include the security sector reform andthe structuring of a democratic police force as part of a broader process of peacebuilding. Based on specialized literature on the subject, UN documents and personalobservations,...

  16. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  17. Design and Implementation of Corporate Actions on a Decentralized Securities Depository

    OpenAIRE

    Hedin, Jonas

    2017-01-01

    Trading securities is a process that requires multiple trusted intermediaries to ensure that the trade is done correctly. The securities industry is therefore very slow and expensive; the central securities depository (CSD) being one of the main contributors to the disruption. In an effort to fix this, financial institutions has recently started looking into the blockchain technology; the innovation behind the cryptocurrency Bitcoin. Bitcoin is a digital currency that can be traded peer-to-pe...

  18. 19 CFR 148.53 - Exemption for tools of trade.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Exemption for tools of trade. 148.53 Section 148.53 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... tools of trade. (a) Exemption. Professional books, implements, instruments, or tools of trade...

  19. 17 CFR 4.32 - Trading on a Registered Derivatives Transaction Execution Facility for Non-Institutional Customers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading on a Registered Derivatives Transaction Execution Facility for Non-Institutional Customers. 4.32 Section 4.32 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION COMMODITY POOL OPERATORS AND COMMODITY TRADING...

  20. Economic growth: trade, public finance, and the paradox of thrift

    OpenAIRE

    John Smithin

    2014-01-01

    The classical argument for free trade stressed the possibilities of economic growth by exploiting the gains from trade. A trade surplus per se was not the main objective; presumably the argument was that trade would be balanced at the new higher growth rate. Moreover, the arguments for free trade were made against the background of an assumed hard peg (the gold standard) which would enforce balance of payments equilibrium. This means that contemporary free trade agreements (FTAs), with floati...

  1. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  2. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  3. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  4. 76 FR 77776 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-12-14

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  5. 76 FR 51001 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-08-17

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  6. 77 FR 58356 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-09-20

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  7. 78 FR 4834 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-01-23

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  8. A security model for saas in cloud computing

    International Nuclear Information System (INIS)

    Abbas, R.; Farooq, A.

    2016-01-01

    Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. It has many service modes like Software as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS). In SaaS model, service providers install and activate the applications in cloud and cloud customers access the software from cloud. So, the user does not have the need to purchase and install a particular software on his/her machine. While using SaaS model, there are multiple security issues and problems like Data security, Data breaches, Network security, Authentication and authorization, Data integrity, Availability, Web application security and Backup which are faced by users. Many researchers minimize these security problems by putting in hard work. A large work has been done to resolve these problems but there are a lot of issues that persist and need to overcome. In this research work, we have developed a security model that improves the security of data according to the desire of the End-user. The proposed model for different data security options can be helpful to increase the data security through which trade-off between functionalities can be optimized for private and public data. (author)

  9. Nuclear Security in Action at Malaysian Borders

    International Nuclear Information System (INIS)

    Dahlstrom Danielle

    2013-01-01

    ''For Malaysia, trade has to be a transparent'', explained Raja Adnan, the Director General of the Malaysian Atomic Energy Licensing Board (AELB). ''Goods are imported and exported, not just between two countries, but are in transit between several countries. Nuclear security measures help to guarantee open trade and makes sure that everyone is trading responsibly,'' emphasized Adnan. Officials from AELB prepare for a joint Indonesian-Malaysian exercise in effective border control by reviewing their national standard operating procedures (SOPs) on nuclear security, which were developed in close coordination with the IAEA

  10. 78 FR 33882 - Order of Suspension of Trading

    Science.gov (United States)

    2013-06-05

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading June 3, 2013... Wi-Tron, Inc. Zone Mining Ltd. It appears to the Securities and Exchange Commission that there is a... Commission that there is a lack of current and accurate information concerning the securities of Zone Mining...

  11. 76 FR 26247 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-05-06

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401 Constitution Ave, NW...

  12. 78 FR 46921 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-08-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Hinman, Office of Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053...

  13. Energy and the NAFTA [North American Free Trade Agreement

    International Nuclear Information System (INIS)

    Plourde, A.

    1993-01-01

    A review is presented of the implications of the North American Free Trade Agreement (NAFTA) for the energy industry. This agreement expands the coverage accorded to energy in the Canada-US Free Trade Agreement (FTA), and is of limited significance with respect to Canada-US relations, but is quite important to these two countries' energy trade with Mexico. With respect to Canada-US trade, the most important departure from the FTA is that NAFTA tends to ensure a greater degree of respect for the terms of negotiated contracts, in particular by requiring the parties to make efforts to secure compliance with the national treatment provisions of the NAFTA by subfederal regulatory entities. Mexico's constitution severely restricts foreign participation in the activities of its energy industries, including basic petrochemicals. While NAFTA accomodates these restrictions, Canadian and US companies will have opportunities to bid on contracts for goods and services and construction in the Mexican energy sector on an equal footing with their Mexican counterparts. NAFTA also provides expanded opportunities for foreign investment and control in electricity generation for own-use, cogeneration and public service purposes. The parties are explicitly allowed to extend activity incentives to their respective oil and gas industries. 9 refs

  14. Liquidity Risk, Speculative Trade, and the Optimal Latency of Financial Markets

    OpenAIRE

    Fricke, Daniel; Gerig, Austin

    2014-01-01

    Garbade and Silber (1979) demonstrate that an asset will be liquid if it has (1) low price volatility and (2) a large number of public investors who trade it. Although these results match nicely with common notions of liquidity, one key element is missing: liquidity also depends on (3) an asset s correlation with other securities. For example, if an illiquid asset is highly correlated with a liquid asset, then speculators will naturally step in and make it liquid . In this paper, we update Ga...

  15. Security of public key encryption technique based on multiple chaotic systems

    International Nuclear Information System (INIS)

    Wang Kai; Pei Wenjiang; Zou Liuhua; Cheung Yiuming; He Zhenya

    2006-01-01

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP) m , where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications

  16. FINANCING POLICIES OF CROATIAN PUBLICLY LISTED FIRMS

    Directory of Open Access Journals (Sweden)

    Mihaela Grubisic Seba

    2013-06-01

    Full Text Available Croatia is a typical bank-based transition economy whose capital market has been primarily used for secondary trading purposes since its re-establishment in 1990s. Except for a couple of exceptions, public offers of shares and corporate bonds have been rather rate. Private offerings of shares and short-term debt have been more frequent. However, due to secondary debt market illiquidity, the debt issues are signed up and either held until maturity or renewal, or they are traded exclusively between the institutional investors.This paper provides evidence from the field on financing preferences of Croatian public companies regarding seasoned equity and corporate debt issuance. It questiones why public offerings of corporate securities in non-financial sector after initial, mostly mandatory shares’ listing have been rare and whether making decisions on securities’ offers depend on other financial instruments’ sufficiency, costs of issunace or previous experience of companies in collecting funds in the capital market.

  17. Virtual water trade: an assessment of water use efficiency in the international food trade

    Directory of Open Access Journals (Sweden)

    H. Yang

    2006-01-01

    Full Text Available Amid an increasing water scarcity in many parts of the world, virtual water trade as both a policy instrument and practical means to balance the local, national and global water budget has received much attention in recent years. Building upon the knowledge of virtual water accounting in the literature, this study assesses the efficiency of water use embodied in the international food trade from the perspectives of exporting and importing countries and at the global and country levels. The investigation reveals that the virtual water flows primarily from countries of high crop water productivity to countries of low crop water productivity, generating a global saving in water use. Meanwhile, the total virtual water trade is dominated by green virtual water, which constitutes a low opportunity cost of water use as opposed to blue virtual water. A sensitivity analysis, however, suggests high uncertainties in the virtual water accounting and the estimation of the scale of water saving. The study also raises awareness of the limited effect of water scarcity on the global virtual water trade and the negative implications of the global water saving for the water use efficiency and food security in importing countries and the environment in exporting countries. The analysis shows the complexity in evaluating the efficiency gains in the international virtual water trade. The findings of the study, nevertheless, call for a greater emphasis on rainfed agriculture to improve the global food security and environmental sustainability.

  18. 7 CFR 1901.506 - Book-entry procedure for FmHA or its successor agency under Public Law 103-354 securities...

    Science.gov (United States)

    2010-01-01

    ... under Public Law 103-354 securities-issuance and redemption of certificate by Reserve bank. 1901.506... applied to such FmHA or its successor agency under Public Law 103-354 securities, the Reserve bank is... successor agency under Public Law 103-354 securities. (3) A Reserve bank as fiscal agent of the United...

  19. 17 CFR 4.14 - Exemption from registration as a commodity trading advisor.

    Science.gov (United States)

    2010-04-01

    ... a commodity trading advisor. 4.14 Section 4.14 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION COMMODITY POOL OPERATORS AND COMMODITY TRADING ADVISORS General Provisions, Definitions and Exemptions § 4.14 Exemption from registration as a commodity trading advisor. This section is...

  20. Perlindungan Hukum Dalam Transaksi Margin Trading Dan Short Sales Di Pasar Modal

    OpenAIRE

    Kiandi, Ferry

    2015-01-01

    In the world of capital markets, there are many facilities offered by the securities, among other things, are margin trading and short selling. Margin trading is one of the facilities provided by the brokerage firm to investors. In margin trading, securuties (effects) purchase transactions made by the customers are financed by securities companies. So the investor can make the transaction exceeding the amount of money he has. In this facility, investors do not have to return th...

  1. Trade and health: how World Trade Organization (WTO) law affects alcohol and public health.

    Science.gov (United States)

    Baumberg, Ben; Anderson, Peter

    2008-12-01

    The alcohol field is becoming more aware of the consequences of world trade law for alcohol policies. However, there is a need for greater clarity about the different effects of trade on alcohol-related harm. A comprehensive review of all literature on alcohol and world trade [including World Trade Organization (WTO) disputes on alcohol], supported by a more selective review of other relevant cases, academic reports and the grey literature on trade and health. The burden of WTO law on alcohol policies depends upon the type of policy in question. Purely protectionist policies are likely to be struck down, which may lead to increases in alcohol-related harm. Partly protectionist and partly health-motivated policies are also at risk of being struck down. However, purely health-motivated policies are likely to be defended by the WTO-and to the extent that policy makers misunderstand this, they are needlessly avoiding effective ways of reducing alcohol-related harm. WTO agreements contain genuine and substantial risks to alcohol policies, and various ways of minimizing future risks are suggested. However, the 'chilling effect' of mistakenly overestimating these constraints should be avoided. Health policy makers should decide on which policies to pursue based primarily on considerations of effectiveness, ethics and politics rather than legality. As long as any effect of these policies on trade is minimized, they are overwhelmingly likely to win any challenges at the WTO.

  2. 15 CFR 2008.18 - Information Security Oversight Committee.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  3. Trade Policy Preferences and the Factor Content of Trade

    DEFF Research Database (Denmark)

    Jäkel, Ina Charlotte; Smolka, Marcel

    demonstrate that the factor price changes induced by trade policy are negatively correlated with the factor content of free trade (and therefore factor abundance). Using large-scale international survey data, we test whether these predicted distributional effects are reflected in the trade policy preferences...... of workers with different labor market skills. In order to isolate the effects of factor abundance from other skill-related confounding factors, we employ a within-skill-group estimator that exploits the cross-country variation in the factor content of free trade. In line with theory, the data show......This paper provides a theoretical and empirical analysis of public opinion towards free trade, investigating cleavages both between and within countries. We study the distributional effects of trade policy in a neoclassical economy with not just two, but many input factors in production. We...

  4. Return to work after renal transplantation: a study of the Brazilian Public Social Security System.

    Science.gov (United States)

    Messias, Alexandre Augusto; Reichelt, Angela J; Dos Santos, Edson F; Albuquerque, Galton C; Kramer, José S P; Hirakata, Vania N; Garcia, Valter D

    2014-12-15

    Return to work is an objective parameter used worldwide to evaluate the success of organ transplantation and is especially feasible after renal transplantation. This study sought to describe the frequency of return to work after renal transplantation and related characteristics. Retrospective cohort of 511 isolated kidney transplant recipients was recruited from a Brazilian referral center from January 2005 to December 2009; all were matched to the public social security database to determine inclusion and benefit awards, as well as the rate of resumption of contributions to the public social security system, a surrogate marker of work rehabilitation. Characteristics associated with work return were analyzed. No social security records were found for 28 subjects. The remaining 483 subjects had a mean age of 45±13 years; 62% were male; 401 (83%) received some public social security benefit; 298 were paying dues and could, therefore, receive temporary or permanent disability benefits. Of these, 78 subjects made social security payments after transplantation, resulting in a work return rate of 26% (95% confidence interval, 21-32). Younger age, living donor graft, and chronic glomerulonephritis were significantly associated with return to work. In Brazil, most renal transplant recipients are on social security benefits, but only a small proportion return to work after surgery. Clinical characteristics may help define work resumption trends.

  5. Single-shot secure quantum network coding on butterfly network with free public communication

    Science.gov (United States)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  6. BASES OF PUBLIC POLICY FORMATION DIRECTED AT ENSURING BUDGET SECURITY

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2015-03-01

    Full Text Available In the article the priorities and public policies that can improve the safety level of the budget of Ukraine have been grounded. Attention on the problems of imbalance and deficiency trends accumulation of public debt has been focused. The detailed analysis of the budget deficit of the European community to further research the main problems of fiscal security has been carried out. The formation of the concept of budget policy should include long-term and medium-term priorities of the state priorities areas have been concluded. Budget policy on public debt must deal with interrelated issues of debt bondage and effective use of public credit, promote economic growth with respect safe level and structure of public debt have been emphasized by author. Debt policy as part of fiscal policy under certain conditions can be a powerful tool to intensify investment and innovation processes in society, promote economic and social development. The reorientation of fiscal policy to address current problems through debt and use it as the basis of investment and innovation development provides an effective public debt management is designed to reduce state budget expenditures on its servicing and repayment, optimizing the scope and structure of debt according to economic growth. The role of debt policy in modern terms increases is clearly subordinate to and consistent with long-term goals and priorities of fiscal policy. There is an urgent development and implementation of effective mechanisms for investing borrowed resources, increasing the efficiency of public investment, including the improvement of organizational, financial, legal and controls. Strategically budget security guarantees only competitive economy, which can be constructed only by recovery and accelerated development of promising sectors of the national economy in the presence of a balanced budget policy. Now there is a tendency to implement only measures to stabilize the political and socio

  7. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Science.gov (United States)

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  8. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  9. On the security of SSL/TLS-enabled applications

    Directory of Open Access Journals (Sweden)

    Manik Lal Das

    2014-01-01

    Full Text Available SSL/TLS (Secure Socket Layer/Transport Layer Security-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality. A large number of electronic commerce applications, such as stock trading, banking, shopping, and gaming rely on the security strength of the SSL/TLS protocol. In recent times, a potential threat, known as main-in-the-middle (MITM attack, has been exploited by attackers of SSL/TLS-enabled web applications, particularly when naive users want to connect to an SSL/TLS-enabled web server. In this paper, we discuss about the MITM threat to SSL/TLS-enabled web applications. We review the existing space of solutions to counter the MITM attack on SSL/TLS-enabled applications, and then, we provide an effective solution which can resist the MITM attack on SSL/TLS-enabled applications. The proposed solution uses a soft-token based approach for user authentication on top of the SSL/TLS’s security features. We show that the proposed solution is secure, efficient and user friendly in comparison to other similar approaches.

  10. 78 FR 77200 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel AFFAIR; Invitation for Public...

    Science.gov (United States)

    2013-12-20

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD-2013-0151] Requested Administrative Waiver of the Coastwise Trade Laws: Vessel AFFAIR; Invitation for Public Comments AGENCY: Maritime... AFFAIR is: Intended Commercial Use of Vessel: ``Charter Fishing (sport) & sightseeing tours.'' Geographic...

  11. Engineering Trade-off Considerations Regarding Design-for-Security, Design-for-Verification, and Design-for-Test

    Science.gov (United States)

    Berg, Melanie; Label, Kenneth

    2018-01-01

    The United States government has identified that application specific integrated circuit (ASIC) and field programmable gate array (FPGA) hardware are at risk from a variety of adversary attacks. This finding affects system security and trust. Consequently, processes are being developed for system mitigation and countermeasure application. The scope of this tutorial pertains to potential vulnerabilities and countermeasures within the ASIC/FPGA design cycle. The presentation demonstrates how design practices can affect the risk for the adversary to: change circuitry, steal intellectual property, and listen to data operations. An important portion of the design cycle is assuring the design is working as specified or as expected. This is accomplished by exhaustive testing of the target design. Alternatively, it has been shown that well established schemes for test coverage enhancement (design-for-verification (DFV) and design-for-test (DFT)) can create conduits for adversary accessibility. As a result, it is essential to perform a trade between robust test coverage versus reliable design implementation. The goal of this tutorial is to explain the evolution of design practices; review adversary accessibility points due to DFV and DFT circuitry insertion (back door circuitry); and to describe common engineering trade-off considerations for test versus adversary threats.

  12. 76 FR 54196 - Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee

    Science.gov (United States)

    2011-08-31

    ... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: In accordance with the Secure Rural Schools and Community Self Determination Act of 2000 (Pub. L. 106-393), [as...

  13. The Fair Trade Balance: New Challenges after 25 years of Fair Trade

    NARCIS (Netherlands)

    Ruben, R.

    2012-01-01

    During the last 25 years Fair Trade (FT) experienced substantial growth, but competition from private labels is increasingly challenging the policy foundations of the FT business model. While direct welfare effects of FT for farmers are rather modest, security of delivery contracts and pre-financing

  14. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Science.gov (United States)

    2010-01-01

    ... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.4 Criteria...

  15. Global trade and health: key linkages and future challenges.

    Science.gov (United States)

    Bettcher, D W; Yach, D; Guindon, G E

    2000-01-01

    Globalization of trade, marketing and investment has important implications for public health, both negative and positive. This article considers the implications of the single package of World Trade Organization (WTO) agreements for public health research and policy, focusing on three themes: commodities, intellectual property rights, and health services. The main aims of the analysis are as follows: to identify how trade issues are associated with the transnationalization of health risks and possible benefits; to identify key areas of research; and to suggest policy-relevant advice and interventions on trade and health issues. The next wave of international trade law will need to take more account of global public health issues. However, to become more engaged in global trade debates, the public health community must gain an understanding of the health effects of global trade agreements. It must also ensure that its own facts are correct, so that public health is not blindly used for political ends, such as justifying unwarranted economic protectionism. "Healthy trade" policies, based on firm empirical evidence and designed to improve health status, are an important step towards reaching a more sustainable form of trade liberalization.

  16. Dynamic Trading with Predictable Returns and Transaction Costs

    DEFF Research Database (Denmark)

    Gârleanu, Nicolae; Heje Pedersen, Lasse

    2013-01-01

    We derive a closed-form optimal dynamic portfolio policy when trading is costly and security returns are predictable by signals with different mean-reversion speeds. The optimal strategy is characterized by two principles: (1) aim in front of the target, and (2) trade partially toward the current...

  17. E-invoicing in EU public procurement as a tool for cross border trade barriers elimination

    Directory of Open Access Journals (Sweden)

    Oleksandr TSARUK

    2015-12-01

    Full Text Available Public Procurement of goods and services always was one of the principal element of e-procurements because it effects economic growth, describes governments' public services and national competitiveness, level of human capital growth in a long run. Furthermore, researching EU policy on e-procurements demands to observe legislature essence and technological models of e-procurement solutions because none of which has not been developed as the universal one yet. Basic European agreements on public procurements and trade, combining with the currently used public procurement models, force to develop a commonly used framework for all EU countries. Monitoring of EU e-procurement system as model for implementation at Eastern partnerships countries was also suggested.

  18. Malaysia: Political, Security, Economic, and Trade Issues Considered

    National Research Council Canada - National Science Library

    Vaughn, Bruce; Martin, Michael

    2007-01-01

    This report discusses key aspects of the U.S.-Malaysia relationship, including economics and trade, counterterrorism cooperation, defense ties, and Malaysia's external posture as it affects Amen can interests...

  19. Trade union policy and nuclear power

    International Nuclear Information System (INIS)

    Elliot, D.

    1981-01-01

    The subject is discussed under the headings: introduction; energy policy; the beginning of doubt; SERA's role [SERA = Socialist Environment and Resources Association]; the 1980 nuclear debate [within the trade union movement]; the 1981 nuclear debate [within the trade union movement]; the issues reviewed (supply and demand; safety and employment; security); review of policy trends; conclusions. Appendix: a review of union policy statements. (U.K.)

  20. 78 FR 13752 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SPIRIT; Invitation for Public...

    Science.gov (United States)

    2013-02-28

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD-2013 0013] Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SPIRIT; Invitation for Public Comments AGENCY: Maritime... . SUPPLEMENTARY INFORMATION: As described by the applicant the intended service of the vessel SPIRIT is: Intended...

  1. 77 FR 22631 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SPIRIT; Invitation for Public...

    Science.gov (United States)

    2012-04-16

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD 2012 0049] Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SPIRIT; Invitation for Public Comments AGENCY: Maritime... . SUPPLEMENTARY INFORMATION: As described by the applicant the intended service of the vessel SPIRIT is: Intended...

  2. Evolution of gas markets and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Mitrova, Tatiana

    2007-07-01

    Questions of energy security and international gas trade became indissolubly connected during the last years. Paradoxically during the evolution of natural gas markets concerns about security issues in gas trade are only growing at the same time as transaction costs. Market participants have developed several mechanisms of adaptation (vertical integration, mutual penetration of capital and long-term contracts) which should be regarded not as a market failure but as an essential part of energy security guarantees at the moment. Further gas market evolution will demand more unified institutional framework to decrease threats to energy security and transaction costs. But this framework should be a result of mutual compromise of all market participants. (auth)

  3. Volatilities, Traded Volumes, and Price Increments in Derivative Securities

    Science.gov (United States)

    Kim, Kyungsik; Lim, Gyuchang; Kim, Soo Yong; Scalas, Enrico

    2007-03-01

    We apply the detrended fluctuation analysis (DFA) to the statistics of the Korean treasury bond (KTB) futures from which the logarithmic increments, volatilities, and traded volumes are estimated over a specific time lag. For our case, the logarithmic increment of futures prices has no long-memory property, while the volatility and the traded volume exhibit the existence of long-memory property. To analyze and calculate whether the volatility clustering is due to the inherent higher-order correlation not detected by applying directly the DFA to logarithmic increments of the KTB futures, it is of importance to shuffle the original tick data of futures prices and to generate the geometric Brownian random walk with the same mean and standard deviation. It is really shown from comparing the three tick data that the higher-order correlation inherent in logarithmic increments makes the volatility clustering. Particularly, the result of the DFA on volatilities and traded volumes may be supported the hypothesis of price changes.

  4. 77 FR 17086 - U.S. Customs and Border Protection 2012 West Coast Trade Symposium: “Transforming Trade for a...

    Science.gov (United States)

    2012-03-23

    ... Protection 2012 West Coast Trade Symposium: ``Transforming Trade for a Stronger Economy'' AGENCY: U.S... been changed to ``Transforming Trade for a Stronger Economy''; and to inform the public that the fees... from 8:30 a.m. until 4 p.m.; and that registration will open to the public on or about March 20, 2012...

  5. An analysis of Indonesia’s information security index: a case study in a public university

    Science.gov (United States)

    Yustanti, W.; Qoiriah, A.; Bisma, R.; Prihanto, A.

    2018-01-01

    Ministry of Communication and Informatics of the Republic of Indonesia has issued the regulation number 4-2016 about Information Security Management System (ISMS) for all kind organizations. Public university as a government institution must apply this standard to assure its level of information security has complied ISO 27001:2013. This research is a preliminary study to evaluate the readiness of university IT services (case study in a public university) meets the requirement of ISO 27001:2013 using the Indonesia’s Information Security Index (IISI). There are six parameters used to measure the level of information security, these are the ICT role, governance, risk management, framework, asset management and technology. Each parameter consists of serial questions which must be answered and convert to a numeric value. The result shows the level of readiness and maturity to apply ISO 27001 standard.

  6. Dynamic Trading with Predictable Returns and Transaction Costs

    DEFF Research Database (Denmark)

    Garleanu, Nicolae; Heje Pedersen, Lasse

    We derive a closed-form optimal dynamic portfolio policy when trading is costly and security returns are predictable by signals with dierent mean-reversion speeds.The optimal strategy is characterized by two principles: 1) aim in front of the target and 2) trade partially towards the current aim...

  7. The new PR of states: How nation branding practices affect the security function of public diplomacy

    DEFF Research Database (Denmark)

    Rasmussen, Rasmus Kjærgaard; Merkelsen, Henrik

    2012-01-01

    This paper investigates how the role of public relations practice in public diplomacy is undergoing a transformation as a consequence of the influence from nation branding. A case study of the Danish government's response to the so-called Cartoon Crisis illustrates how the threat from international...... a domestic audience. In the public diplomacy efforts towards transnational publics the link to national security will completely disappear whereby the public relations of states is transformed to the marketing of states....... terrorism to national security initially served as a catalyst for new public diplomacy initiatives. But as the initiatives were implemented within a framework of nation branding the focus on risk reduction became subjected to a marketing logic and a new focus on economic objectives took over. The paper...

  8. 78 FR 16875 - Request of the U.S. Intellectual Property Enforcement Coordinator for Public Comments...

    Science.gov (United States)

    2013-03-19

    ... public. SUMMARY: The theft of trade secrets from U.S. corporations can impact national security... companies or foreign governments to gain an unfair commercial advantage over U.S. companies. We need to... information of a confidential nature, such as sensitive personal information or proprietary business...

  9. BASIC CONCEPTS OF TAX SECURITY AS PART OF THE FINANCIAL SECURITY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Sergiy Golikov

    2016-11-01

    Full Text Available The purpose of the paper is to examine the essence of the term «tax security», its fundamental characteristics, such as threats, risks, interests and protection, defined how the state could provide them. The paper analyses economic, social and legal nature of the term. Key indicators of tax security of Ukraine identified and analyzed. In addition, the paper studies an integrated approach of tax security threats. In case of a big amount of threats, they divided to four main sources of threats: the state of the national economy, the state of the public finances, social features of the society and institutional environment. For each source, there have been identified and analyzed the most important factors of threats of tax security of Ukraine. Methodology. The survey based on an analysis of existing studies of Ukrainian and foreign scientists about the essence and nature of "tax security" for the last 10 years. In addition, to determine the essence and the concept, goals and objectives, methods and principles of the economic nature of the tax security, main risks, threats, expectations and results of efficient tax security identified. To build an integrated approach it is necessary to analyse all existing and potential factors of threats. There data used from reports of the State Statistics Service of Ukraine, Ministry of Economic Development and Trade of Ukraine, PWC and World Bank. Results of the survey showed that tax security is such a condition of tax security, when the process of harmonization of taxation provided under effective management of risks and threats that arise in tax area, by taking the necessary measures by the executive bodies to meet the interests of the state, society and taxpayers (business entities, organizations, people. Integrated approach of threats analysis of tax security shows that the most dangerous threats are those that are associated with poor economic development, considerable socio-economic stratification of

  10. 78 FR 21909 - Environmental Technologies Trade Advisory Committee; Public Meeting

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference....S. exports of environmental technologies, goods, services, and products. The ETTAC was originally...

  11. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  12. WHAT COMES NEXT? A GLOBAL TRADE WAR OR THE RENEGOTIATION OF US TRADE AGREEMENTS?

    Directory of Open Access Journals (Sweden)

    Virginia Câmpeanu

    2018-04-01

    Full Text Available In March 2018, the US President announced additional tariffs on steel and aluminum imports to be applied to all exporters in the US market. The main reason behind these protectionist measures is the threat to national security caused by the US balance of trade, as reflected by annual losses of hundreds of billions of dollars. Strengthening of the US steel and aluminum industries, job creation and, hence, the consolidation of the US economy appear to be among the benefits of the new tariffs. This article aims to analyze US trade and issues related to the major trading partners, as well as the new protectionist measures initiated by president Trump, alongside the domestic and international responses. Finally, the article highlights the immediate and foreseeable consequences of these measures and concludes that rather than triggering a global trade war, the Trump administration is preparing the means to exert pressure to renegotiate the US trade agreements.

  13. 76 FR 66912 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference... expand U.S. exports of environmental technologies, goods, services, and products. The ETTAC was...

  14. 77 FR 35941 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-06-15

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... promotion programs; and issues related to innovation in the environmental technology sector. Background: The...

  15. 77 FR 6064 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-02-07

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference... administration of programs to expand U.S. exports of environmental technologies, goods, services, and products...

  16. Securities Operations: Update on Actions Taken to Address Day Trading Concerns

    National Research Council Canada - National Science Library

    2001-01-01

    .... In particular there was concern that broker-dealers promoting day trading as a strategy (day trading firms) sometimes used questionable advertising to attract customers without fully disclosing or by downplaying the risks involved...

  17. Security for Show? The Militarisation of Public Space in Light of the 2016 Rio Olympic Games

    Directory of Open Access Journals (Sweden)

    Veronica F. Azzi

    Full Text Available Abstract This article aims to analyse the increasing militarisation of public space in the Brazilian city of Rio de Janeiro, particularly on the eve of the 2016 Olympics. To this end, I briefly discuss how the concept of militarisation has been historically approached in the International Relations literature, namely within the security field. In the first section, I address the nature of the domestic security challenges Brazil faces as a developing country. In the second section, I show that the public security challenge of organised crime in Rio was securitised and confronted by increasing militarisation over the years as a result of a specific model of neo-liberal social control carried out by the country. I then analyse Brazil’s Olympics security scheme carried out in order to portray Rio as a safe city to the world. In the last section, I highlight the contradictions between accounts on the collapse in domestic security vis-à-vis official government statements to the international media to assure that ‘nothing would go wrong’ during the mega sports event. The idea is to show how the militarisation of public security, rather than mere governmental efforts to signal stability to the international community during the Olympics, is a trend likely to outlast the event that implies not only, but mainly, the perpetuation of insecurity.

  18. 78 FR 21911 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... review the role of the U.S. government in supporting the early adoption of environmental technologies and...

  19. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    Science.gov (United States)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  20. 17 CFR 270.32a-2 - Exemption for initial period from vote of security holders on independent public accountant for...

    Science.gov (United States)

    2010-04-01

    ... from vote of security holders on independent public accountant for certain registered separate accounts... from vote of security holders on independent public accountant for certain registered separate accounts... 32(a) of the Act that selection of an independent public accountant shall have been submitted for...

  1. Effect of the International Agreement on Government Procurement and the Government Procurement Chapter of the North American Free Trade Agreement on public contracting opportunities

    OpenAIRE

    Heldreth, Steven E.

    1994-01-01

    Approved for public release, distribution unlimited This paper explores the specific legal content of the 1979 and 1993 Agreements on Government Procurement as well as the North American Free Trade Agreement's Chapter Ten (Government Procurement). One chapter addresses the use of free trade agreements, associated problems, and how the agreements have been applied to the public sector. The content of each of the primary documents is an...

  2. Ad hoc public disclosure obligations of public companies on the capital market

    Directory of Open Access Journals (Sweden)

    Marjanski Vladimir

    2012-01-01

    Full Text Available The author gives a comprehensive analysis of the obligations of public companies regarding the provision of periodical (ad hoc information to the public on the capital market. Ad hoc disclosure is to achieve a number of aims. It is one of the devices to secure the market's functional abilities. By means of regularly fulfilling this obligation, the market is provided with all the relevant information necessary to form adequate prices of market materials - i.e. securities and other financial instruments (the function of market protection. Investors are thus being able to aptly respond to modified circumstances and deliver investment decisions whether to buy or sell market materials the price of which are being changed (the function of investor protection. Due to the fact that the duty of ad hoc disclosure encompasses the obligation to reveal insider information directly affecting the emitter, ad hoc disclosure serves as a preventive measure, i.e. as a protection against illicit trade with insider information (the function of prevention against the abuse of insider information.

  3. 77 FR 16048 - U.S. Customs and Border Protection 2012 West Coast Trade Symposium: “Harmonizing Trade for a...

    Science.gov (United States)

    2012-03-19

    ... Advisor for Trade and Public Relations, Office of Trade Relations. [FR Doc. 2012-6589 Filed 3-16-12; 8:45... relating to the agency's role in international trade initiatives and programs. This year marks our twelfth year hosting trade symposia. Members of the international trade and transportation communities and...

  4. Interactions: trade policy and healthcare reform after Chaoulli v. Quebec: is it time for Canada to acknowledge the fragile boundary between health and trade policies and strengthen the separation between private and public health insurance?

    Science.gov (United States)

    Crawford, Mark

    2006-01-01

    The insulation of Canada's healthcare system from trade treaty obligations is crucial to the legitimacy of Canada's trade policy. Legal analysis has suggested, however, that competitive and for-profit delivery of the kind contemplated by the Kirby Report and some provinces may make healthcare more vulnerable to challenges under NAFTA and GATS. The Government of Canada has tried to counter this interpretation by stressing the importance of public financing as the principal criterion for exemption of healthcare from trade treaties, but now the potential for private financing of essential medical services indicated by the Supreme Court's decision in Chaoulli v. Quebec has made that line of argument look risky as well. It is apparent that Canada failed to anticipate the possible interactions of domestic, international and constitutional law when it made commitments in the area of private health insurance at the WTO in 1997. Accordingly, the time has come to acknowledge the fragility of the boundary between health and trade policies, to take the risks and costs associated with trade treaty obligations fully into account when undertaking healthcare reform and to strengthen the separation between private and public health insurance.

  5. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Science.gov (United States)

    2010-10-01

    ... checks by public transportation agency or railroad carrier. 1570.13 Section 1570.13 Transportation Other... regarding security background checks by public transportation agency or railroad carrier. (a) Scope. This... employee of a public transportation agency or a contractor or subcontractor of a public transportation...

  6. 78 FR 70097 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel BEE; Invitation for Public...

    Science.gov (United States)

    2013-11-22

    ... Administrative Waiver of the Coastwise Trade Laws: Vessel BEE; Invitation for Public Comments AGENCY: Maritime... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER....gov . SUPPLEMENTARY INFORMATION: As described by the applicant the intended service of the vessel BEE...

  7. 36 CFR 13.1504 - Customary trade.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Customary trade. 13.1504 Section 13.1504 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR... trade. In addition to the exchange of furs for cash, “customary trade” in Kobuk Valley National Park...

  8. 75 FR 21597 - Business Development Trade Mission to Baghdad, Iraq

    Science.gov (United States)

    2010-04-26

    ... large projects relating to construction, highways, railways, telecommunications, and security and... DEPARTMENT OF COMMERCE International Trade Administration Business Development Trade Mission to... October 2010* and has been created to assist U.S. firms find business partners and sell equipment and...

  9. The analysis of the public support, results, and the research field structure of the Czech security R

    Directory of Open Access Journals (Sweden)

    Faťun Martin

    2017-07-01

    Full Text Available The article is devoted to an analysis of the public support and results of the security oriented R&D in Czechia in the years 2011–2015. The aim is to provide a knowledge base for active participation of users of results and existing and potential beneficiaries of public support in the development of the system and programs of the security research after 2017. The introductory part of the text describes the national environment of the security R&D, and the methodology of the data analysis of projects and programs and the bibliometric analyses of results of the security research. The analysis is focused in particular upon the distribution of the public funding, and the results obtained in R&D programs financed by the Ministry of the interior (MoI. The existing overlaps between R&D activities sponsored by MoI and by other governmental bodies are also examined.

  10. 78 FR 50481 - Request for Public Comments Regarding the National Trade Estimate Report on Foreign Trade Barriers

    Science.gov (United States)

    2013-08-19

    ... barriers to U.S. exports of goods, services, and U.S. foreign direct investment for inclusion in the NTE... affecting U.S. exports of goods and services, U.S. foreign direct investment, and protection of intellectual... National Trade Estimate Report on Foreign Trade Barriers AGENCY: Office of the United States Trade...

  11. Redefining interrelationship between nuclear safety, nuclear security and safeguards

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2011-01-01

    Since the beginning of this century, the so-called 3Ss (Nuclear Safety, Nuclear Security and Safeguards) have become major regulatory areas for peaceful uses of nuclear energy. The importance of the 3Ss is now emphasized to countries which are newly introducing nuclear power generation. However, as role models for those newcomers, existing nuclear power countries are also required to strengthen their regulatory infrastructure for the 3Ss. In order to rationalize the allocation of regulatory resources, interrelationship of the 3Ss should be investigated. From the viewpoint of the number of the parties concerned in regulation, nuclear security is peculiar with having 'aggressors' as the third party. From the viewpoint of final goal of regulation, nuclear security in general and safeguards share the goal of preventing non-peaceful uses of nuclear energy, though the goal of anti-sabotage within nuclear security is rather similar to nuclear safety. As often recognized, safeguards are representative of various policy tools for nuclear non-proliferation. Strictly speaking, it is not safeguards as a policy tool but nuclear non-proliferation as a policy purpose that should be parallel to other policy purposes (nuclear safety and nuclear security). That suggests 'SSN' which stands for Safety, Security and Non-proliferation is a better abbreviation rather than 3Ss. Safeguards as a policy tool should be enumerated along with nuclear safety regulation, nuclear security measures and trade controls on nuclear-related items. Trade controls have been playing an important role for nuclear non-proliferation. These policy tools can be called 'SSST' in which Trade controls are also emphasized along with Safety regulation, Security measures and Safeguards. Recently, it becomes quite difficult to clearly demarcate these policy tools. As nuclear security concept is expanding, the denotation of nuclear security measures is also expanding. Nuclear security measures are more and more

  12. Bank regulatory Capital Buffer and Liquidity: Evidence from US and European Publicly Traded Banks

    OpenAIRE

    Distinguin , Isabelle; Roulet , Caroline; Tarazi , Amine

    2012-01-01

    The theory of financial intermediation highlights various channels through which capital and liquidity are interrelated. Using a simultaneous equations framework, we investigate the relationship between bank regulatory capital buffer and liquidity for European and U.S. publicly traded commercial banks. Previous research studying the determinants of bank capital buffer has neglected the role of liquidity. On the whole, we find that banks do not strengthen their regulatory capital buffer when t...

  13. 77 FR 75223 - Spencer Pharmaceutical Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-12-19

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Spencer Pharmaceutical Inc.; Order of Suspension of Trading December 17, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Spencer Pharmaceutical Inc...

  14. Learning from the blackouts. Transmission system security in competitive electricity markets

    Energy Technology Data Exchange (ETDEWEB)

    none

    2005-07-01

    Electricity market reform has fundamentally changed the environment for maintaining reliable and secure power supplies. Growing inter-regional trade has placed new demands on transmission systems, creating a more integrated and dynamic network environment with new real-time challenges for reliable and secure transmission system operation. Despite these fundamental changes, system operating rules and practices remain largely unchanged. The major blackouts of 2003 and 2004 raised searching questions about the appropriateness of these arrangements. Management of system security needs to be transformed to maintain reliable electricity services in this more dynamic operating environment. These challenges raise fundamental issues for policymakers. This publication presents case studies drawn from recent large-scale blackouts in Europe, North America, and Australia. It concludes that a comprehensive, integrated policy response is required to avoid preventable large-scale blackouts in the future.

  15. Corporate reporting, security regulation and trading on the Kuwaiti stock exchange (KSE – institutional implications for research

    Directory of Open Access Journals (Sweden)

    Eiman A. Algharaballi

    2012-06-01

    Full Text Available The regulation of equities trading in Kuwait over the period from 1983 to 2011 is documented in this paper. An eclectic approach has resulted in overlapping responsibilities for the three main regulatory and supervisory bodies. Regulation appears to be responsive to market crises. As a result, regulations have tended to change with market conditions. Kuwaiti accounting and auditing requirements are also reviewed. The institutional setting in Kuwait has a number of implications for capital market-based research. Informational inefficiency precludes research that relies on the assumption that security price reflects firm value. Other features (including the profit requirement, lock-up restrictions and the two auditor rule provide opportunities for capital market research in Kuwait.

  16. DETERMINATION OF CYBER SECURITY AWARENESS OF PUBLIC EMPLOYEES AND CONSCIOUSNESS-RISING SUGGESTIONS

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2016-07-01

    Full Text Available The aim of this study is to measure Turkish government employees’ awareness of cyber security and cyber space elements. Participants were 71 Turkish public employees working for various ministries. Both qualitative and quantitative research methods were used to get the most detailed information from the participants. A survey was administered to cyber security officers in chosen state institutions. For qualitative research, open-ended questions were administered to the participants. Reliability and validity issues were established for both surveys. Results show that employees have enough information about cyber security and cyber warfare. Findings clearly suggests that cyber defense policy should be planned in coordination with other state institutions and experiences should be shared. In order to create feasible and realistic cyber security policy at institutional level, experts at cyber security must be trained, hired and help must be requested from specialized individuals and institutions. This study recommends that rapid reaction teams (RRT should be established to take care of cyber systems, to react against cyber breaches in time, to alert staff for cyber-attacks in order to establish effective recovery.

  17. A Market Analysis of Publications, Trade Conferences, and Key Events for Fleet Readiness Center Southwest

    Science.gov (United States)

    2007-12-01

    Win and Keep Big Customers. Austin: Bard Press, 2005. Kotler , Philip and Kevin Lane Keller. Marketing Management. Upper Saddle River, NJ...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT A Market Analysis of Publications, Trade Conferences...AGENCY USE ONLY (Leave blank) 2. REPORT DATE December 2007 3. REPORT TYPE AND DATES COVERED MBA Professional Report 4. TITLE AND SUBTITLE: A Market

  18. 19 CFR 176.11 - Transmission of records to Court of International Trade.

    Science.gov (United States)

    2010-04-01

    ... SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) PROCEEDINGS IN THE COURT OF INTERNATIONAL TRADE Transmission of Records § 176.11 Transmission of records to Court of International Trade. Upon receipt of service of a summons in an action initiated in the Court of International Trade the following items shall...

  19. 27 CFR 18.19 - Security.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...

  20. Pushing the boundaries of the social: private agri-food standards and the governance of Fair Trade in European public procurement

    OpenAIRE

    Fisher, Eleanor; Sheppard, Hannah

    2013-01-01

    The article explores how fair trade and associated private agri-food standards are incorporated into public procurement in Europe. Procurement law is underpinned by principles of equity, non-discrimination and transparency; one consequence is that legal obstacles exist to fair trade being privileged within procurement practice. These obstacles have pragmatic dimensions, concerning whether and how procurement can be used to fulfil wider social policy objectives or to incorporate private standa...

  1. Trade issues and area-wide pest management

    International Nuclear Information System (INIS)

    Griffin, Robert L.

    2000-01-01

    Food security and economic security are unarguably desirable objectives for all nations - indeed for the world. Equally important is the sustainability of designs that achieve these objectives without disadvantaging others or damaging the environment. Considering area-wide pest management in the context of these interrelated global policy forces is essential to fully understand its role in both the protection of plant resources and in facilitation of trade. The case for food security begins with the realisation that there are currently about 800 million people in the world who are suffering from malnutrition due to lack of food. The World Food Summit, convened in November 1996, urgently called for coordinated world-wide action to ensure 'food for all'. A key strategy for realising this goal is reducing losses due to plant pests. In this light, area-wide pest management can be viewed as a valuable addition to the toolbox of pest management strategies. It can also be one of the most sustainable and cost-effective options to consider for pest management. However, just as the problem of world hunger is not solved by a single farmer, area-wide pest management cannot be successful at the individual level. It requires commitment and cooperation to make it feasible - the same type of commitment and cooperation that was expressed at the World Food Summit. Where economic security is concerned, one need not look far to see a world of growing economic integration and widening circles of development. As the World Trade Organisation celebrates the 50th anniversary of the rules-based trading system which began with the GATT after World War II, it is clear that globalisation and the liberalisation of trade have become permanent fixtures in international policy formulation and are integral to the economic security of all nations. Now, more than ever before, the world's prosperity rests on maintaining an open international economy based on commonly agreed rules. The significance of

  2. 78 FR 32696 - Jupiter Enterprises, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2013-05-31

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Jupiter Enterprises, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Jupiter Enterprises, Inc. because it has not...

  3. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  4. Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

    Directory of Open Access Journals (Sweden)

    Shuai Han

    2017-01-01

    Full Text Available KDM[F]-CCA security of public-key encryption (PKE ensures the privacy of key-dependent messages f(sk which are closely related to the secret key sk, where f∈F, even if the adversary is allowed to make decryption queries. In this paper, we study the design of KDM-CCA secure PKE. To this end, we develop a new primitive named Auxiliary-Input Authenticated Encryption (AIAE. For AIAE, we introduce two related-key attack (RKA security notions, including IND-RKA and weak-INT-RKA. We present a generic construction of AIAE from tag-based hash proof system (HPS and one-time secure authenticated encryption (AE and give an instantiation of AIAE under the Decisional Diffie-Hellman (DDH assumption. Using AIAE as an essential building block, we give two constructions of efficient KDM-CCA secure PKE based on the DDH and the Decisional Composite Residuosity (DCR assumptions. Specifically, (i our first PKE construction is the first one achieving KDM[Faff]-CCA security for the set of affine functions and compactness of ciphertexts simultaneously. (ii Our second PKE construction is the first one achieving KDM[Fpolyd]-CCA security for the set of polynomial functions and almost compactness of ciphertexts simultaneously. Our PKE constructions are very efficient; in particular, they are pairing-free and NIZK-free.

  5. SYMMETRIC ENCRYPTION USING PRE-SHARED PUBLIC PARAMETERS FOR A SECURE TFTP PROTOCOL

    Directory of Open Access Journals (Sweden)

    N. N. MOHAMED

    2017-01-01

    Full Text Available Advances in the communication technology of embedded systems have led to the situation where nowadays almost all systems should implement security for data safety. Trivial File Transfer Protocol (TFTP has advantages for use in embedded systems due to its speed and simplicity, however without security mechanisms, it is vulnerable to various attacks. As an example, during upgrading of Wireless Access Points (WAPs, attackers can access the information and modify it, and then install malicious code to interrupt the system. This work proposes security implementation of Diffie Hellman Key Exchange in TFTP by pre-sharing public parameters that enable two parties to achieve same secret key without the risk of Man-In-The-Middle (MITM attacks. The implementation is integrated with compression and encryption methods to significantly reduce computational requirements in TFTP communication.

  6. African Regional Integration: Implications for Food Security

    NARCIS (Netherlands)

    Dijk, van M.

    2011-01-01

    This report looks at the African regional trade, regional integration agreements (RIAs) and the implications for food security. An overview is presented on the present state of African regional integration and the determinants of regional trade in agriculture and food commodities. In particular the

  7. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    sacrificed at the altar of soldiers' constitutional rights to form and join trade unions .... includes a rights-based culture, a rise in individualism, a change in the acceptance of ... military leadership with the military unions that poses the greatest threat to civil– ... 10 European Organisation of Military Associations, available at ...

  8. Balancing ecosystem services with energy and food security - Assessing trade-offs from reservoir operation and irrigation investments in Kenya's Tana Basin

    Science.gov (United States)

    Hurford, A. P.; Harou, J. J.

    2014-08-01

    Competition for water between key economic sectors and the environment means agreeing allocations is challenging. Managing releases from the three major dams in Kenya's Tana River basin with its 4.4 million inhabitants, 567 MW of installed hydropower capacity, 33 000 ha of irrigation and ecologically important wetlands and forests is a pertinent example. This research seeks firstly to identify and help decision-makers visualise reservoir management strategies which result in the best possible (Pareto-optimal) allocation of benefits between sectors. Secondly, it seeks to show how trade-offs between achievable benefits shift with the implementation of proposed new rice, cotton and biofuel irrigation projects. To approximate the Pareto-optimal trade-offs we link a water resources management simulation model to a multi-criteria search algorithm. The decisions or "levers" of the management problem are volume-dependent release rules for the three major dams and extent of investment in new irrigation schemes. These decisions are optimised for eight objectives covering the provision of water supply and irrigation, energy generation and maintenance of ecosystem services. Trade-off plots allow decision-makers to assess multi-reservoir rule-sets and irrigation investment options by visualising their impacts on different beneficiaries. Results quantify how economic gains from proposed irrigation schemes trade-off against the disturbance of ecosystems and local livelihoods that depend on them. Full implementation of the proposed schemes is shown to come at a high environmental and social cost. The clarity and comprehensiveness of "best-case" trade-off analysis is a useful vantage point from which to tackle the interdependence and complexity of "water-energy-food nexus" resource security issues.

  9. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  10. 75 FR 11842 - Export Trade Certificate of Review

    Science.gov (United States)

    2010-03-12

    ..., licensing of Technology Rights and provision of Export Trade Facilitation Services, EFS International... already generally available to the trade or public. 2. EFS International will comply with requests made by... DEPARTMENT OF COMMERCE International Trade Administration [Application No. 10-00002] Export Trade...

  11. SECURITY BREACH IN TRADING SYSTEM-COUNTERMEASURE USING IPTRACEBACK

    OpenAIRE

    M. P. Rajakumar; V. Shanthi

    2014-01-01

    Recently, economic scenario is often facing security breach that has heavy impact on the financial soundness of a company particularly, stock prices on firms. The utmost consequence being the whole business comes to a standstill. From the estimates attributed by the financial sector, it has been inferred that the loss incurred on virus and worms attack is said to have the greatest impact that hampers the prosperity of a business entity. Thus, security strategies attempt on revolving around th...

  12. The Creation of an Energy Security Society as a Way to Decrease Securitization Levels between the European Union and Russia in Energy Trade

    Directory of Open Access Journals (Sweden)

    Olga Khrushcheva

    2011-05-01

    Full Text Available The energy trade between the European Union and Russia is securitized due to a combination of factors. First, there are securitizing agents within the European Union. Second, the domestic consolidation of the energy sector under governmental control, the Gazprom monopoly on transportation networks linking Central Asian gas with European markets and the state imposed-limits on foreign direct investment may also raise concerns in the European Union. Finally, Russia is also securitizing the energy sphere by claiming that the EU is trying to impose its values on Russia (for example through the Energy Charter Treaty, which contradicts Russian interests. This article combines securitization theory and the English School of thought and argues that the creation of an Energy Security Society could help de-securitize energy trade between the European Union and Russia.

  13. Threats to financial system security

    Energy Technology Data Exchange (ETDEWEB)

    McGovern, D.E.

    1997-06-01

    The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

  14. Implementation of the Internet of Things on Public Security

    Science.gov (United States)

    Lu, Kesheng; Li, Xichun

    The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players. The public security as one of the key players is going to make real-time communications will be possible not only by humans but also by things at anytime and from anywhere. This research will present the advent of the Internet of Things to create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities.

  15. 17 CFR 41.24 - Rule amendments to security futures products.

    Science.gov (United States)

    2010-04-01

    ... rule amendment relating to a security futures product if the registered derivatives transaction... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Rule amendments to security futures products. 41.24 Section 41.24 Commodity and Securities Exchanges COMMODITY FUTURES TRADING...

  16. Redefining interrelationship between nuclear safety, nuclear security and safeguards

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2012-01-01

    Since the beginning of this century, the so-called 3Ss (Nuclear Safety, Nuclear Security and Safeguards) have become major regulatory areas for peaceful uses of nuclear energy. In order to rationalize the allocation of regulatory resources, interrelationship of the 3Ss should be investigated. From the viewpoint of the number of the parties concerned in regulation, nuclear security is peculiar with having “aggressors” as the third party. From the viewpoint of final goal of regulation, nuclear security in general and safeguards share the goal of preventing non-peaceful uses of nuclear energy, though the goal of anti-sabotage within nuclear security is rather similar to nuclear safety. As often recognized, safeguards are representative of various policy tools for nuclear non-proliferation. Strictly speaking, it is not safeguards as a policy tool but nuclear non-proliferation as a policy purpose that should be parallel to other policy purposes (nuclear safety and nuclear security). That suggests “SSN” which stands for Safety, Security and Non-proliferation is a better abbreviation rather than 3Ss. Safeguards as a policy tool should be enumerated along with nuclear safety regulation, nuclear security measures and trade controls on nuclear-related items. Trade controls have been playing an important role for nuclear non-proliferation. These policy tools can be called “SSST” in which Trade controls are also emphasized along with Safety regulation, Security measures and Safeguards. (author)

  17. 78 FR 71021 - Life Stem Genetics Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-11-27

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Life Stem Genetics Inc.; Order of Suspension of Trading November 25, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Life Stem Genetics Inc. because...

  18. 75 FR 8156 - Electronic Game Card, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2010-02-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Electronic Game Card, Inc.; Order of Suspension of Trading February 19, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Electronic Game Card, Inc...

  19. 78 FR 32696 - China Properties Developments, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-05-31

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Properties Developments, Inc.; Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Properties Developments, Inc...

  20. 77 FR 73509 - Emerging World Pharma, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-12-10

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Emerging World Pharma, Inc.; Order of Suspension of Trading December 6, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Emerging World Pharma, Inc...

  1. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  2. Trade Secrets in Life Science and Pharmaceutical Companies

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M.; Cai, Yu

    2015-01-01

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through “improper means” is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today’s interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees’ careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. PMID:25414378

  3. Trade secrets in life science and pharmaceutical companies.

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M; Cai, Yu

    2014-11-20

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through "improper means" is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today's interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees' careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.

  4. Trade Openness and Domestic Water Use

    Science.gov (United States)

    Dang, Qian; Konar, Megan

    2018-01-01

    We contribute to the debate over globalization and the environment by asking, what is the impact of trade on national water use? To address this question, we employ econometric methods to quantify the causal relationship between trade openness and water use. Specifically, we use the instrumental variables methodology to evaluate the impact of trade openness on domestic water withdrawals in agriculture and industry. We find that trade openness does not have a significant impact on total or industrial water withdrawals. However, we show that one percentage point increase in trade openness leads to a 5.21% decrease in agricultural water withdrawals. We find that trade openness reduces water use in agriculture primarily through the intensive margin effect, by leading farmers to produce more with less water, such as through the adoption of technology. We do not find evidence for extensive margin or crop mix impacts on agricultural water withdrawals. Significantly, these results demonstrate that trade openness leads to less water use in agriculture. This finding has broad scientific and policy relevance as we endeavor to untangle causal relationships in the complex global food system and develop policies to achieve water and food security.

  5. Streamlining air import operations by trade facilitation measures

    Directory of Open Access Journals (Sweden)

    Yuri da Cunha Ferreira

    2017-12-01

    Full Text Available Global operations are subject to considerable uncertainties. Due to the Trade Facilitation Agreement that became effective in February 2017, the study of measures to streamline customs controls is urgent. This study aims to assess the impact of trade facilitation measures on import flows. An experimental study was performed in the largest cargo airport in South America through discrete-event simulation and design of experiments. Operation impacts of three trade facilitation measures are assessed on import flow by air. We shed light in the following trade facilitation measures: the use of X-ray equipment for physical inspection; increase of the number of qualified companies in the trade facilitation program; performance targets for customs officials. All trade facilitation measures used indicated potential to provide more predictability, cost savings, time reduction, and increase in security in international supply chain.

  6. Efficiency of Working Capital Management in the System of Financial Safety of Trade Enterprises

    Directory of Open Access Journals (Sweden)

    Krutova Anzhelika S.

    2016-08-01

    Full Text Available The article investigates theoretical and methodological and practical aspects of managing the financial security of enterprises of wholesale and retail trade in Ukraine, summarizes the scientific approaches to assessing enterprise financial security. There justified the influence of the level of efficiency of working capital management on improving the indicators of profitability of financial and economic activity, business activity; increasing financial sustainability and stability of development; ensuring an acceptable level of financial safety of trade enterprises. The main results of financial and economic activities of Ukrainian trade enterprises for the period 2010-2015 that influenced the level of their financial security are analyzed, the negative trends in the dynamics of receiving net profit, low profitability of sales and unprofitableness of using the current assets are highlighted. There revealed a significant disproportion in the structure of capital formation sources, high deficit of own financial resources, trend of financing the current assets entirely from borrowed funds, rapid growth of the level of credit interest rates. There performed an estimation of indicators of financial sustainability by means of the coefficient and aggregate approaches, which indicated the unstable and crisis financial condition of the majority of enterprises of wholesale and retail trade in Ukraine. There determined reserves of increasing financial security with the identification of the key components in the subsystems of financial security, criteria and indicators for an objective assessment of the financial status, taking into account the influence of the external environment, which will allow making sound management decisions regarding the analysis, prevention and neutralization of real and potential threats to trade enterprises.

  7. 78 FR 12127 - Vitaminspice Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-02-21

    ... periodic financial filings and in internet promotions concerning, among other things, the company's... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Vitaminspice Inc.; Order of Suspension of Trading February 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of...

  8. Global trends of acceptance and trade in irradiated foods

    Energy Technology Data Exchange (ETDEWEB)

    Matin, M A [Food and Environmental Protection Section, Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture, International Atomic Energy Agency, Vienna (Austria)

    2001-05-01

    Issues as relevant to wide scale application of food irradiation are presented in this paper to provide current status of the technology. Global development on key issues such as public acceptance, public health improvement, safety and wholesomeness, regulatory aspects, potential application of the technology to ease quarantine problems in the trade of food and agricultural commodities as a viable alternative to fumigation with methyl bromide have been presented. Irradiation ensures the hygienic quality of food and extends shelf-life. Many international organizations and respected regional/national bodies agree on the merits of the technique and valuable contribution that the process can offer to safeguard the food supply worldwide. Codex General Standard for irradiated food and the associated Code of Practice for operation of the irradiation facilities used for the treatment of foods adopted in 1983 forms the regulatory basis for commercial utilization of the processing technology. More than 40 countries of the world have Standards/Regulations to process one or more food products by the irradiation process. Efforts are underway to harmonise national regulations on food irradiation to remove obstacles for international trade of irradiated products. There is a rapid development on commercial application of food irradiation in the USA and elsewhere in the past few months. There are already several existing commercial irradiators available for treating food in the USA and many more are planned to be built. Such commercial food irradiation facilities are also in different stage of development in Brazil, India, Mexico, Thailand, People's Republic of China, Republic of Korea. Roles of irradiation ensuring food safety, contributing food security and facilitating trade are more and more recognized in developed and developing countries alike. (author)

  9. Global trends of acceptance and trade in irradiated foods

    International Nuclear Information System (INIS)

    Matin, M.A.

    2001-01-01

    Issues as relevant to wide scale application of food irradiation are presented in this paper to provide current status of the technology. Global development on key issues such as public acceptance, public health improvement, safety and wholesomeness, regulatory aspects, potential application of the technology to ease quarantine problems in the trade of food and agricultural commodities as a viable alternative to fumigation with methyl bromide have been presented. Irradiation ensures the hygienic quality of food and extends shelf-life. Many international organizations and respected regional/national bodies agree on the merits of the technique and valuable contribution that the process can offer to safeguard the food supply worldwide. Codex General Standard for irradiated food and the associated Code of Practice for operation of the irradiation facilities used for the treatment of foods adopted in 1983 forms the regulatory basis for commercial utilization of the processing technology. More than 40 countries of the world have Standards/Regulations to process one or more food products by the irradiation process. Efforts are underway to harmonise national regulations on food irradiation to remove obstacles for international trade of irradiated products. There is a rapid development on commercial application of food irradiation in the USA and elsewhere in the past few months. There are already several existing commercial irradiators available for treating food in the USA and many more are planned to be built. Such commercial food irradiation facilities are also in different stage of development in Brazil, India, Mexico, Thailand, People's Republic of China, Republic of Korea. Roles of irradiation ensuring food safety, contributing food security and facilitating trade are more and more recognized in developed and developing countries alike. (author)

  10. Challenges to the multilateral trading system and possible responses

    OpenAIRE

    Panagariya, Arvind

    2013-01-01

    This paper develops three major themes. First, the atmosphere of gloom around the multilateral trading system due to dim prospects of a successful conclusion of the Doha Round notwithstanding, global trade regime remains open and the institution in charge of it, the World Trade Organization, is in sound health. If anything, the Doha Round has been a victim of its own success: considerable de facto liberalization in agriculture has been achieved since the launch of the round. Second, to secure...

  11. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    Science.gov (United States)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  12. The conflict mitigating effects of trade in the India-Pakistan case

    NARCIS (Netherlands)

    D. Mamoon (Dawood); S.M. Murshed (Syed)

    2010-01-01

    textabstractAbstract We examine whether greater inter-state trade, democracy and reduced military spending lower belligerence between India and Pakistan, beginning with a theoretical model covering the opportunity costs of conflict in terms of trade losses and security spending, as well as the costs

  13. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    Science.gov (United States)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  14. 17 CFR 275.206(3)-3T - Temporary rule for principal trades with certain advisory clients.

    Science.gov (United States)

    2010-04-01

    ... trades with certain advisory clients. 275.206(3)-3T Section 275.206(3)-3T Commodity and Securities... 1940 § 275.206(3)-3T Temporary rule for principal trades with certain advisory clients. (a) An..., sells to or purchases from an advisory client any security if: (1) The investment adviser exercises no...

  15. The Political Economy of International Emissions Trading Scheme Choice

    DEFF Research Database (Denmark)

    Boom, Jan-Tjeerd; Svendsen, Jan Tinggard

    2000-01-01

    The Kyoto Protocol allows emission trade between the Annex B countries. We consider three schemes of emissions trading: government trading, permit trading and credit trading. The schemes are compared in a public choice setting focusing on group size and rent-seeking from interest groups. We find ...

  16. Automatic public access to documents and maps stored on and internal secure system.

    Science.gov (United States)

    Trench, James; Carter, Mary

    2013-04-01

    The Geological Survey of Ireland operates a Document Management System for providing documents and maps stored internally in high resolution and in a high level secure environment, to an external service where the documents are automatically presented in a lower resolution to members of the public. Security is devised through roles and Individual Users where role level and folder level can be set. The application is an electronic document/data management (EDM) system which has a Geographical Information System (GIS) component integrated to allow users to query an interactive map of Ireland for data that relates to a particular area of interest. The data stored in the database consists of Bedrock Field Sheets, Bedrock Notebooks, Bedrock Maps, Geophysical Surveys, Geotechnical Maps & Reports, Groundwater, GSI Publications, Marine, Mine Records, Mineral Localities, Open File, Quaternary and Unpublished Reports. The Konfig application Tool is both an internal and public facing application. It acts as a tool for high resolution data entry which are stored in a high resolution vault. The public facing application is a mirror of the internal application and differs only in that the application furnishes high resolution data into low resolution format which is stored in a low resolution vault thus, making the data web friendly to the end user for download.

  17. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  18. Fundamentals of IP and SoC security design, verification, and debug

    CERN Document Server

    Ray, Sandip; Sur-Kolay, Susmita

    2017-01-01

    This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on desi...

  19. 45 CFR 162.915 - Trading partner agreements.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Trading partner agreements. 162.915 Section 162... REQUIREMENTS ADMINISTRATIVE REQUIREMENTS General Provisions for Transactions § 162.915 Trading partner agreements. A covered entity must not enter into a trading partner agreement that would do any of the...

  20. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    Science.gov (United States)

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  1. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  2. Korean public's preference for supply security of oil and gas and the impact of protest bidders

    International Nuclear Information System (INIS)

    Kim, Jihyo; Kim, Jinsoo; Kim, Yoon Kyung

    2016-01-01

    The Korean governmental support for supply security of oil and gas via overseas exploration and production (E&P) projects are publicly criticized because of some poor projects lacking of economic feasibility, even though it should be expanded from a long-term perspective. Applying the contingent valuation, this study investigates the Korean public's preferences for governmental support for overseas oil and gas E&P projects. The result shows that the governmental support for overseas E&P projects rather decreases public utility. The primary reason behind this utility decrease is that some respondents protested to bid because of their resistance toward tax increase without guaranteeing the efficient government support. This result implies that simple tax increases for expansion of the governmental support may bring about public's strong opposition. In order to overcome this public opposition, this study suggests that it is necessary to arouse public understanding of the necessity of overseas oil and gas E&P projects. - Highlights: • We investigate the Korean public's preferences for an oil and gas supply security. • The respondents are willing to pay USD 0.017 per liter of gasoline or diesel. • Governmental support for overseas E&P projects decreases the public utility. • It is need to increase public understanding of overseas oil and gas E&P projects.

  3. Spirits Trade After Reform in 1863: To the Issue of Efficiency of State Regulation of Spirits Turnover in Terms of Free Trade

    Directory of Open Access Journals (Sweden)

    Natalia Ye. Goryushkina

    2015-12-01

    Full Text Available On the grounds of published and non-published archive materials the article estimates efficiency of state regulation of spirits turnover in terms of excise taxation period. It also states types of spirits trade, types of public houses, groups of people that have obtained the right for wholesale, retail and that of small amount tradeoff spirits. License gaining procedures are widely described as well. The author pays significant attention to the areas in cities and countryside, where the public houses should not have been opened as well as the individuals who were admitted to spirits trade; also he states events which influenced the sale of spirits. The requirements to interior of public houses, working hours, quality and volumes of trade are also specified. It is pointed out that the officials of excise tax board were to control the regulations of spirit trade, their authority extended to public houses control in 1885. The author comes to the conclusion that regulatory means of excise tax was efficient and by increasing and decreasing of license cost, complication and simplification of new public houses opening all together allowed to regulate the turnover of spirits in terms of free trade thus influencing the number, types, density, range and quality of spirits. However, there was distinct ambiguity in Ministry of Finance policy during the stated excise taxation period. On the one hand it limited free sale of spirits, eradicating public houses which were considered detrimental. On the other hand, the Ministry was set not to notice abuse in trade which gave the opportunity to gain greater benefits at public cost from spirits sales.

  4. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  5. International trade and investment law: a new framework for public health and the common good.

    Science.gov (United States)

    Delany, Louise; Signal, Louise; Thomson, George

    2018-05-08

    International trade and investment agreements can have positive outcomes, but also have negative consequences that affect global health and influence fundamental health determinants: poverty, inequality and the environment. This article proposes principles and strategies for designing future international law to attain health and common good objectives. Basic principles are needed for international trade and investment agreements that are consistent with the common good, public health, and human rights. These principles should reflect the importance of reducing inequalities, along with social and environmental sustainability. Economic growth should be recognised as a means to common good objectives, rather than an end in itself. Our favoured approach is both radical and comprehensive: we describe what this approach would include and outline the strategies for its implementation, the processes and capacity building necessary for its achievement, and related governance and corporate issues. The comprehensive approach includes significant changes to current models for trade and investment agreements, in particular (i) health, social and environmental objectives would be recognised as legitimate in their own right and implemented accordingly; (ii) changes to dispute-resolution processes, both state-to-state and investor-state; (iii) greater deference to international legal frameworks for health, environmental protection, and human rights; (iv) greater coherence across the international law framework; (v) limitations on investor privileges, and (vi) enforceable corporate responsibilities for contributing to health, environmental, human rights and other common good objectives. We also identify some limited changes that could be considered as an alternative to the proposed comprehensive approach. Future research is needed to develop a range of model treaties, and on the means by which such treaties and reforms might be achieved. Such research would focus also on

  6. 77 FR 76160 - New Generation Biofuels Holdings, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-12-26

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] New Generation Biofuels Holdings, Inc.; Order of Suspension of Trading December 21, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of New Generation Biofuels...

  7. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  8. U.S. International Trade: Trends and Forecasts

    Science.gov (United States)

    2008-11-26

    Agreements: Impact on U.S. Trade and Implications for U.S. Trade Policy, by William H. Cooper;CRS Report RL32371, Trade Remedies: A Primer, by Vivian C...initial public offering of the Blackstone Group, a U.S. private equity group. Morgan Stanley research estimates that such sovereign wealth funds could

  9. International trade agreements challenge tobacco and alcohol control policies.

    Science.gov (United States)

    Zeigler, Donald W

    2006-11-01

    This report reviews aspects of trade agreements that challenge tobacco and alcohol control policies. Trade agreements reduce barriers, increase competition, lower prices and promote consumption. Conversely, tobacco and alcohol control measures seek to reduce access and consumption, raise prices and restrict advertising and promotion in order to reduce health and social problems. However, under current and pending international agreements, negotiated by trade experts without public health input, governments and corporations may challenge these protections as constraints on trade. Advocates must recognise the inherent conflicts between free trade and public health and work to exclude alcohol and tobacco from trade agreements. The Framework Convention on Tobacco Control has potential to protect tobacco policies and serve as a model for alcohol control.

  10. Quantitative Safety and Security Analysis from a Communication Perspective

    Directory of Open Access Journals (Sweden)

    Boris Malinowsky

    2015-12-01

    Full Text Available This paper introduces and exemplifies a trade-off analysis of safety and security properties in distributed systems. The aim is to support analysis for real-time communication and authentication building blocks in a wireless communication scenario. By embedding an authentication scheme into a real-time communication protocol for safety-critical scenarios, we can rely on the protocol’s individual safety and security properties. The resulting communication protocol satisfies selected safety and security properties for deployment in safety-critical use-case scenarios with security requirements. We look at handover situations in a IEEE 802.11 wireless setup between mobile nodes and access points. The trade-offs involve application-layer data goodput, probability of completed handovers, and effect on usable protocol slots, to quantify the impact of security from a lower-layer communication perspective on the communication protocols. The results are obtained using the network simulator ns-3.

  11. 42 CFR 73.11 - Security.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  12. Opening of energy markets: consequences on the missions of public utility and of security of supplies in the domain of electric power and gas

    International Nuclear Information System (INIS)

    2001-01-01

    This conference was jointly organized by the International Energy Agency (IEA) and the French ministry of economy, finances, and industry (general direction of energy and raw materials, DGEMP). It was organized in 6 sessions dealing with: 1 - the public utility in the domain of energy: definition of the public utility missions, experience feedback about liberalized markets, public utility obligation and pricing regulation; 2 - the new US energy policy and the lessons learnt from the California crisis; 3 - the security of electric power supplies: concepts of security of supplies, opinion of operators, security of power supplies versus liberalization and investments; 4 - security of gas supplies: markets liberalization and investments, long-term contracts and security of supplies; 5 - debate: how to integrate the objectives of public utility and of security of supplies in a competing market; 6 - conclusions. This document brings together the available talks and transparencies presented at the conference. (J.S.)

  13. Determinants of Audit fees by Brazilian Companies Publicly Traded

    Directory of Open Access Journals (Sweden)

    Victor Placeres Borges

    2017-08-01

    Full Text Available The studies on the determinants of audit fees in Brazil became possible with the mandatory disclosure of audit expenses in 2009. Thus, the objective of this research was to identify the determinants of the fees paid by Brazilian publicly traded companies to independent auditors in 2010 to 2014. The analysis took place through regression with data arranged in panel. Size, performance, complexity, audit firm size, adoption of corporate governance practices, audit rotation, industry and litigation risks have all been found to have an impact on the fees. Therefore, the aspects that can be used by companies for the purpose of information management or that require more auditing timefor signaling points of greater risks are highlighted. In addition, understanding the determinants allows companies to plan future expenditures with audit fees and assists regulators and inspectors in defining and comparing key determinants of firms for identifying abnormal payments. These results complement the research in Brazil, Australia, Bangladesh, Norway, Bahrain, England, Jordan, Kuwait, USA, Malaysia, Nigeria, Abu Dhabi, Italy and Indonesia.

  14. 76 FR 61129 - BB Liquidation Inc., Order of Suspension of Trading

    Science.gov (United States)

    2011-10-03

    ... current and accurate information concerning the securities of BB Liquidation Inc. because of assertions in third-party press releases to investors concerning, among other things, the company's current financial... protection of investors require a suspension of trading in the securities of the company listed above...

  15. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  16. On the Conflict Mitigating Effects of Trade: The India-Pakistan Case

    OpenAIRE

    Mamoon, Dawood; S. Mansoob, Murshed

    2008-01-01

    We examine whether greater inter-state trade, democracy and reduced military spending lower belligerence between India and Pakistan. We begin with theoretical models covering the opportunity costs of conflict in terms of trade losses and security spending, as well as the costs of making concessions to rivals. Conflict between the two nations can be best understood in a multivariate framework where variables such as economic performance, integration with rest of the world, bilateral trade, mil...

  17. Clearing and settlement of exchange traded derivatives

    OpenAIRE

    John McPartland

    2009-01-01

    Derivatives are a class of financial instruments that derive their value from some underlying commodity, security, index, or other asset. Futures and options are common forms of derivatives. This article explains how clearing and settlement systems for exchange traded derivatives work.

  18. News framing and public support for a common foreign and security policy

    NARCIS (Netherlands)

    de Vreese, C.H.; Kandyla, A.

    2009-01-01

    Abstract A common EU foreign and security policy (CFSP) can be framed by elites and media as a risk or as an opportunity. This article examines the effects of framing in terms of ‘risk’ and ‘opportunity’ on public support. Moreover, we examine first whether the effect of framing CFSP as a ‘risk for

  19. Coordinated Border Management Through Digital Trade Infrastructures and Trans-National Government Cooperation : The FloraHolland Case

    NARCIS (Netherlands)

    Rukanova, B.D.; Huiden, Roel; Tan, Y.

    2017-01-01

    Digital infrastructures (DI) that support information exchange related to international trade processes (here referred to as Digital Trade Infrastructures (DTI)) have been seen as an instrument to help address the trade facilitation and security challenges. Data pipelines can be seen as an example

  20. Restrictions on European Union Citizens’ Freedom of Movement and Residence in the Country on Grounds of Public Policy, Public Security and Public Health

    Directory of Open Access Journals (Sweden)

    Junevičius Algis

    2016-02-01

    Full Text Available The free movement of persons is one of the most successful European Union projects, serving as a majorly important factor promoting the European integration processes. The adoption of the Treaty on the European Union and the creation of EU citizenship implemented significant changes: the status of EU citizens and their right to move and reside freely within the territory of the Member States can no longer be interpreted in the way it was before the adoption of the Treaty on the European Union. There are no requirements for EU citizens within the Treaty to pursue professional or independent activities or to work under an employment contract in order to access provided rights. However, the right of free movement is not unlimited. The administrations of the Member State governments are authorized to impose restictions on the free movement of citizens. In the light of these facts, this article examines exceptions in the field of free movement of persons and indentifies concepts of public policy, public security and public health. Special attention is given to so-called rule limitation of restrictions and to the mechanism of protection against expulsion from the country. The article concludes by saying that the institutions of Member State governments have the right to evaluate threats within the territory of the country and to decide on the content of public security by themselves. However, their discretion can not be used as an instrument to treat the conduct of other Member State citizens in a worse way than that of their own local citizens.

  1. Resource power and resource security: the politics of nonfuel minerals trade

    International Nuclear Information System (INIS)

    Kahn, O.E.

    1985-01-01

    The developed producers, Canada, Australia, and South Africa, and not the developing producers, are the power wielders and major tracers in nonfuel minerals. Specific circumstances allow producers to obtain compliant behavior from consumers. These include: exporter's market share, importer's degree of dependence, the material's being critical to importer's economy, and the trading system's condoning nonmarket goals. These (and other) criteria comprise an analytical device, the strategic trading relationship, which is used to demonstrate developed producer commodity power and developed consumer vulnerability. Consuming country governments rely on the private sector to deal with national enmeshment in strategic trading relationships. Japan excepted, OECD members fail either to address their continued access to nonfuel minerals, or their ability to survive supply disruption with minimum dislocation. Producer power is exemplified by Canada's threat and use of embargo to make her uranium customers tighten their nonproliferation policies. Structural power deters South Africa's ability to head off wholehearted economic pressure is the classic case

  2. Greasing the Wheels of Trade

    OpenAIRE

    Hendrik P. van Dalen; Aico P. van Vuuren

    2003-01-01

    This discussion paper resulted in a publication in 'De Economist' , 2005, 153(2), 139-165. How much does a nation spend on resources to 'grease the wheels of trade'? To examine this question the Dutch economy is used as an exemplary case as the Netherlands are known as a nation of traders. This image was derived in the seventeenth century from successes in long distance trade, shipping and financial innovations. Despite its historical background in trading the potential to 'truck and barter' ...

  3. 76 FR 37857 - Russell Exchange Traded Funds Trust, et al.; Notice of Application

    Science.gov (United States)

    2011-06-28

    ... replace any Deposit Security or Redemption Security that is a to-be-announced transaction (``TBA Transaction''). A TBA Transaction is a method of trading mortgage-backed securities. In a TBA Transaction, the... amount of substituted cash in the case of TBA Transactions will be equivalent to the value of the TBA...

  4. 77 FR 7131 - Addendum to Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-02-10

    ... DEPARTMENT OF COMMERCE International Trade Administration Addendum to Environmental Technologies... agenda of a meeting of the Environmental Technologies Trade Advisory Committee (ETTAC) will be changed to... & Environmental Industries, International Trade Administration, Room 4053, 1401 Constitution Avenue NW...

  5. Mechanisms for Limiting Trade Mark Rights to Further Competition and Free Speech

    DEFF Research Database (Denmark)

    Ramsey, Lisa P; Schovsbo, Jens Hemmingsen

    2013-01-01

    This article evaluates the different mechanisms that nations use to limit trade mark rights to promote competition, free speech, and other public interests. It shows how EU and US trade mark laws seem to be converging towards a similar model which includes both (1) specific statutory defenses...... of these mechanisms for limiting trade mark rights to better protect the public interest in trade mark disputes. Finally, a proposal for reform is suggested. It consists of three parts: (1) domestic legislatures should revise their trade mark statutes to add more mandatory and specific limitations on trade mark...... to trade mark violations and (2) trade mark doctrines which give courts flexibility to permit unauthorized uses of marks that further the legitimate interests of the accused infringer and the public. Such a development should be welcomed and the article urges other nations to consider adopting one or both...

  6. 77 FR 52753 - U.S. Customs and Border Protection 2012 East Coast Trade Symposium: “Expanding 21st Century...

    Science.gov (United States)

    2012-08-30

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border.... Customs and Border Protection, Department of Homeland Security (DHS). ACTION: Notice of trade symposium... Coast Trade Symposium will be held at the Renaissance DC Hotel, at 999 9th Street, NW., Washington, DC...

  7. Continuous Trading Dynamically Effectively Complete Market with Heterogeneous Beliefs

    DEFF Research Database (Denmark)

    Qin, Zhenjiang

    on the heterogeneous posterior variance of dividend throughout [0; T). The market populated with many time-additive exponential-utility investors is dynamically effectively complete, if investors are allowed to trade in only two long-lived securities continuously. The underlying mechanism is that these assumptions...... imply that the Pareto efficient individual consumption plans are measurable with respect to the aggregate consumption. Hence, I may not need a dynamically complete market to facilitate a Pareto efficient allocation of consumption, the securities only have to facilitate an allocation which is measurable...... a sufficient statistic for computation of the price of redundant dividend derivative and the equilibrium portfolios. The investors form their Pareto optimal trading strategies as if they intend to dynamically endogenously replicate the value of the dividend derivative....

  8. Interactions: Trade Policy and Healthcare Reform After Chaoulli v. Quebec: Is it time for Canada to acknowledge the fragile boundary between health and trade policies and strengthen the separation between private and public health insurance?

    OpenAIRE

    Crawford, Mark

    2006-01-01

    The insulation of Canada’s healthcare system from trade treaty obligations is crucial to the legitimacy of Canada’s trade policy. Legal analysis has suggested, however, that competitive and for-profit delivery of the kind contemplated by the Kirby Report and some provinces may make healthcare more vulnerable to challenges under NAFTA and GATS. The Government of Canada has tried to counter this interpretation by stressing the importance of public financing as the principal criterion for exempt...

  9. 77 FR 76854 - Temporary Rule Regarding Principal Trades With Certain Advisory Clients

    Science.gov (United States)

    2012-12-31

    ... 3235-AL28 Temporary Rule Regarding Principal Trades With Certain Advisory Clients AGENCY: Securities... transactions with certain of their advisory clients. The amendment extends the date on which rule 206(3)- 3T... releases used RIN 3235-AJ96. (See Temporary Rule Regarding Principal Trades with Certain Advisory Clients...

  10. Sports Venue Security: Public Policy Options for Sear 4-5 Events

    Science.gov (United States)

    2014-06-01

    team which commands the highest attendance is the world-renowned New York Yankees franchise . The Yankees games average 10,300 people per pre-season...spectator-patron buy -in to partner with the government and private sector for funding SEAR 4–5 venue security. As shown in Chapter III, the sports...now. Further, the sports ticket buying public has also accepted the purely for profit convenience fees already attached to sporting event ticket

  11. Quantitative Safety and Security Analysis from a Communication Perspective

    DEFF Research Database (Denmark)

    Malinowsky, Boris; Schwefel, Hans-Peter; Jung, Oliver

    2014-01-01

    This paper introduces and exemplifies a trade-off analysis of safety and security properties in distributed systems. The aim is to support analysis for real-time communication and authentication building blocks in a wireless communication scenario. By embedding an authentication scheme into a real...... at handover situations in a IEEE 802.11 wireless setup between mobile nodes and access points. The trade-offs involve application-layer data goodput, probability of completed handovers, and effect on usable protocol slots, to quantify the impact of security from a lower-layer communication perspective...

  12. Managing the Trade-Public Health Linkage in Defence of Trade Liberalisation and National Sovereignty: An Appraisal of United States-Measures Affecting the Production and Sale of Clove Cigarettes

    Directory of Open Access Journals (Sweden)

    Tapiwa Victor Warikandwa

    2014-11-01

    Full Text Available Under the legal framework of the World Trade Organisation (WTO, countries have great flexibility to unilaterally adopt environmental regulations that have effect within their territories only. However, the same discretion does not apply to measures that adversely affect imports or exports. An absence of clear guidelines on how to address some of the attendant issues poses challenges to the effectiveness of a trade-environment linkage. Not surprisingly, attempts to link the environment and trade have resulted in a number of jurisprudentially significant cases in which the WTO's Panel and Appellate Body have tried to address critical questions about the Organisation's capacity to address or manage legal or quasi-legal subjects falling outside the scope of its legal framework. In this regard the Panel and Appellate Body reports in the case of United States - Measures Affecting the Production and Sale of Clove Cigarettes (US-Clove Cigarettes have re-ignited the debate on the Organisation's existential challenge of balancing the rights of the sovereign to freely regulate matters pertaining to health or the environment within its domestic domain with the need to maintain the sanctity of the multilateral trade order. This article demonstrates that in the US-Clove Cigarettes case the WTO Panel and Appellate Body, whilst managing to successfully defend the integrity of WTO Member States' treaty commitments and the overarching importance of trade liberalisation within the organisation's policy foundations even in the context of public health-related regulations, failed to provide any substantive affirmation of the development-related challenges facing developing countries that are part of the WTO family.

  13. Emergence of trend trading and its effects in minority game

    Science.gov (United States)

    Liu, Xing-Hua; Liang, Xiao-Bei; Wang, Nai-Jing

    2006-09-01

    In this paper, we extended Minority Game (MG) by equipping agents with both value and trend strategies. In the new model, agents (we call them strong-adaptation agents) can autonomically select to act as trend trader or value trader when they game and learn in system. So the new model not only can reproduce stylized factors but also has the potential to investigate into the process of some problems of securities market. We investigated the dynamics of trend trading and its impacts on securities market based on the new model. Our research found that trend trading is inevitable when strong-adaptation agents make decisions by inductive reasoning. Trend trading (of strong-adaptation agents) is not irrational behavior but shows agent's strong-adaptation intelligence, because strong-adaptation agents can take advantage of the pure value agents when they game together in hybrid system. We also found that strong-adaptation agents do better in real environment. The results of our research are different with those of behavior finance researches.

  14. Efficient quantum secure communication with a publicly known key

    International Nuclear Information System (INIS)

    Li Chunyan; Li Xihan; Deng Fuguo; Zhou Hongyu

    2008-01-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently. (general)

  15. Veterinary education for global animal and public health, D.A. Walsh : book review

    Directory of Open Access Journals (Sweden)

    C.M.E. McCrindle

    2010-05-01

    Full Text Available This 28th annual volume published by the World Organisation for Animal Health (OIE, addresses the need for a global shift in the way veterinary students are taught veterinary public health (VPH. As well as taking the lead in prevention and control of animal diseases, the OIE develops health and welfare standards to promote food security and equitable international trade in animals and animal products.

  16. Designing a Secure Storage Repository for Sharing Scientific Datasets using Public Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Kumbhare, Alok [Univ. of Southern California, Los Angeles, CA (United States); Simmhan, Yogesth [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2011-11-14

    As Cloud platforms gain increasing traction among scientific and business communities for outsourcing storage, computing and content delivery, there is also growing concern about the associated loss of control over private data hosted in the Cloud. In this paper, we present an architecture for a secure data repository service designed on top of a public Cloud infrastructure to support multi-disciplinary scientific communities dealing with personal and human subject data, motivated by the smart power grid domain. Our repository model allows users to securely store and share their data in the Cloud without revealing the plain text to unauthorized users, the Cloud storage provider or the repository itself. The system masks file names, user permissions and access patterns while providing auditing capabilities with provable data updates.

  17. Trade union activity, cultural, public and political life of Krasnoyarsk Polytechnic Institute in the second half of 1950s–1980

    Directory of Open Access Journals (Sweden)

    Petrik Valeriy V.

    2016-01-01

    Full Text Available Basing on rich documentary, the article studies the activity of the trade union organization in Krasnoyarsk Polytechnic Institute and the impact the trade union had on the cultural, public and political life of the Institute in the second half of the 1950s-1980s. The activity is stated to be held in different forms and areas: amateur arts, propaganda, wall-newspaper and house magazine, vigilant groups, University of Culture, student club, lecturing agitation group, student construction brigades, department, groups and hostels competitions. The authors come to the conclusion that involving students and faculty members into cultural, public and political life added greatly to fostering the future engineers as it took them less time to adapt to the team-spirited workforce after graduating from the higher educational establishment. The article is intended for the people interested in history of higher education in Siberia and Russia.

  18. Trade in health services.

    Science.gov (United States)

    Chanda, Rupa

    2002-01-01

    In light of the increasing globalization of the health sector, this article examines ways in which health services can be traded, using the mode-wise characterization of trade defined in the General Agreement on Trade in Services. The trade modes include cross- border delivery of health services via physical and electronic means, and cross-border movement of consumers, professionals, and capital. An examination of the positive and negative implications of trade in health services for equity, efficiency, quality, and access to health care indicates that health services trade has brought mixed benefits and that there is a clear role for policy measures to mitigate the adverse consequences and facilitate the gains. Some policy measures and priority areas for action are outlined, including steps to address the "brain drain"; increasing investment in the health sector and prioritizing this investment better; and promoting linkages between private and public health care services to ensure equity. Data collection, measures, and studies on health services trade all need to be improved, to assess better the magnitude and potential implications of this trade. In this context, the potential costs and benefits of trade in health services are shaped by the underlying structural conditions and existing regulatory, policy, and infrastructure in the health sector. Thus, appropriate policies and safeguard measures are required to take advantage of globalization in health services. PMID:11953795

  19. Malaysia Economic Monitor, June 2016 : Leveraging Trade Agreements

    OpenAIRE

    World Bank

    2016-01-01

    The MEM is the World Bank's biannual flagship publication on Malaysia. It provides analysis of recent economic developments and the near-term outlook for Malaysia. Each publication also focuses on a special topic related to Malaysia's transformation into a high-income economy. Malaysia is at the forefront of a "new generation" of trade agreements that will shape trade and investment over t...

  20. Trade Facilitation Indicators and their Potential Impact on Trade Between the Countries of South-Eastern Europe

    Directory of Open Access Journals (Sweden)

    Toševska-Trpčevska Katerina

    2016-11-01

    Full Text Available In this paper we base our analysis on previous OECD findings and analysis of trade facilitation indicators for assessing relative economic and trade impact of specific trade facilitation measures for the countries of South-Eastern Europe. In the analysis we plan to include all CEFTA-2006 members, except Moldova, and other countries which are part of this region: Bulgaria, Romania and Greece. We plan to construct twelve trade facilitation indicators (TFIs that correspond to the main policy areas under negotiations at the WTO. The indicators are composed from seventy-eight variables, whose values are drawn from publicly available data. We plan to use these indicators in gravity model in order to estimate the impact of those policy areas on trade volumes between the countries of the region. The use of individual trade facilitation indicators should also enable countries to better assess which trade facilitation measures deserve priority.

  1. Text Messaging to Communicate With Public Health Audiences: How the HIPAA Security Rule Affects Practice

    Science.gov (United States)

    Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon

    2013-01-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902

  2. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  3. Non-state security governances and the implications for local-level citizenship in Danish semi-public city spaces

    DEFF Research Database (Denmark)

    Jensen, Thomas Søgaard

    directed at promoting peace and restoring the feel good factor - in public city space in Denmark. What precisely "security" is, what it should mean, and what should be done to guarantee it, has always been contested on an empirically level. The reason for this is that security often deals with social order......, being both the ontological condition of order, in the sense of absence of "real" and culturally constructed dangers, risks, and anxieties, and the political means to ensure this order. Based on a 5 month ethnographic field work among private security guards policing new kinds of public city spaces...... the globalisation and privatisation/commercialisation of security provision and how this development can be explained. Drawing on my own empirical data I hereafter argue that commercial security governance and local understandings of threats to (feelings of) security are not so much shaped by imaginaries...

  4. Renewable Energy Certificate and Perform, Achieve, Trade mechanisms to enhance the energy security for India

    International Nuclear Information System (INIS)

    Kumar, Rajesh; Agarwala, Arun

    2013-01-01

    The Renewable Energy Certificate and Perform Achieve Trade mechanisms in India are designed to target energy generation and saving, respectively, in line with Clean Development Mechanism implemented by United Nations Framework Convention on Climate Change. The Renewable Energy Certificate System is a voluntary regulation in India for renewable energy generators and is designed for effective implementation of inter-state transactions by introducing the Renewable Purchase Obligation regulation for consumers and a flexible trading platform for transactions across the country. Another initiative, the Perform Achieve Trade scheme, is an enhanced energy efficiency trading mechanism based on consumption targets that require large energy user sectors to improve efficiency by 1–2% per year. The Perform Achieve Trade programme has introduced mechanisms for the identification of industry sector, designated customer, specific energy consumption and target setting. The Perform Achieve Trade design issues are in test phase in the first cycle of the scheme which will run from 2012 to 2015. This paper discusses key design issues about boundary and target setting for Renewable Energy Certificate and Perform Achieve Trade energy saving certificate (ESCert) A data sharing and trading mechanism for Perform Achieve Trade is also proposed for review and coordination among regulator, designated consumers and traders in the market. - Highlights: ► Renewable Energy Certificate’ and ‘Perform Achieve Trade’ are energy certification programmes. ► REC and PAT programme implementation and the institutional network work are presented. ► The trading and communication network propose for possible linkage between REC, PAT and CDM. ► Independent associations in parallel with CERC and BEE are redefined for two tier review of scheme

  5. 17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.

    Science.gov (United States)

    2010-04-01

    ... in misappropriation insider trading cases. 240.10b5-2 Section 240.10b5-2 Commodity and Securities... Devices and Contrivances § 240.10b5-2 Duties of trust or confidence in misappropriation insider trading... of insider trading under Section 10(b) of the Act and Rule 10b-5. The law of insider trading is...

  6. The Free Trade Agreement and the Mexican health sector.

    Science.gov (United States)

    Laurell, A C; Ortega, M E

    1992-01-01

    This article presents a discussion of the probable implications for the Mexican health sector of the Free Trade Agreement (FTA) between the United States, Canada, and Mexico. The authors argue that the FTA should be seen as part of neoliberal policies adopted by the Mexican government in 1983 that are based on large-scale privatization and deregulation of labor relations. In this general context the health sector, which traditionally has been dominated by public institutions, is undergoing a deep restructuring. The main trends are the decapitalization of the public sector and a selective process of privatization that tends to constitute the private health sector in a field of capital accumulation. The FTA is likely to force a change in Mexican health legislation, which includes health services in the public social security system and recognizes the right to health, and to accelerate selective privatization. The U.S. insurance industry and hospital corporations are interested in promoting these changes in order to gain access to the Mexican market, estimated at 20 to 25 million persons. This would lead to further deterioration of the public institutions, increasing inequalities in health and strengthening the private sector. The historical trend toward the integration of a National Health Service in Mexico would be interrupted in favor of formation of a dual private-public system.

  7. 27 CFR 25.105 - Release of collateral security.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Release of collateral security. 25.105 Section 25.105 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... of Bonds Or Consents of Surety § 25.105 Release of collateral security. Bonds, notes, and other...

  8. The internet trade of counterfeit spirits in Russia - an emerging problem undermining alcohol, public health and youth protection policies?

    Science.gov (United States)

    Neufeld, Maria; Lachenmeier, Dirk W; Walch, Stephan G; Rehm, Jürgen

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia.

  9. The Next Generation Information Infrastructure for International Trade

    DEFF Research Database (Denmark)

    Henningsson, Stefan; Gal, Uri; Bjørn-Andersen, Niels

    2011-01-01

    that are in control of their business. Trusted traders are entitled to trade facilitations, faster border crossing, and fewer physical inspections. To enable the use of trusted traders, changes are required to the information infrastructure (II) of international trade. This article complements existing works on e......-Government interoperability by a theoretically driven approach with theoretical development of the II concept and how II can be modified as additional focus. Following the principles of IS design research, this paper presents a design proposition for the II of international trade. Using theories of II development and change......Regulators and actors in international trade are facing a difficult challenge of increasing control and security while at the same time lowering the administrative burden for traders. As a tentative response, the European Commission has introduced the concept of “trusted traders”: certified traders...

  10. 17 CFR 140.91 - Delegation of authority to the Director of the Division of Trading and Markets.

    Science.gov (United States)

    2010-04-01

    ... Director of the Division of Trading and Markets. 140.91 Section 140.91 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ORGANIZATION, FUNCTIONS, AND PROCEDURES OF THE COMMISSION Functions § 140.91 Delegation of authority to the Director of the Division of Trading and Markets. (a) The...

  11. 15 CFR 60.1 - Public information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Public information. 60.1 Section 60.1 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade BUREAU OF THE CENSUS, DEPARTMENT OF COMMERCE PUBLIC INFORMATION § 60.1 Public information. The rules and procedures regarding...

  12. "Trade policy, not morals or health policy": the US Trade Representative, tobacco companies and market liberalization in Thailand.

    Science.gov (United States)

    MacKenzie, Ross; Collin, Jeff

    2012-08-01

    The enforced opening of Thailand's cigarette market to imports in 1990 has become a cause celebre in debates about the social and health impacts of trade agreements. At the instigation of leading US-based cigarette manufacturers, the US Trade Representative (USTR) threatened trade sanctions against Thailand to compel the government to liberalize its domestic cigarette market. Thailand's challenge to the USTR led to referral to General Agreement on Tariffs and Trade (GATT) arbitration. While GATT ruled in favour of the USTR on market access, it also found that Thailand could subsequently enact non-discriminatory tobacco control regulation without contravening the GATT agreement. This paper contributes to existing literature via its analysis of tobacco industry documents that highlight not only USTR responsiveness to lobbying from tobacco corporations, raising concerns about the drivers of globalization and the limited protection afforded to public health concerns in trade agreements. Significantly, the documents also indicate that USTR support of the tobacco industry was not unconditional, being subject to wider pressures of global trade negotiations. Such qualification notwithstanding, however,,ongoing governmental willingness to advance the international interests of tobacco corporations remains a concern from a public health perspective, particularly given the failure of the US to ratify the World Health Organization's Framework Convention on Tobacco Control.

  13. Nutrition labelling is a trade policy issue: lessons from an analysis of specific trade concerns at the World Trade Organization.

    Science.gov (United States)

    Thow, Anne Marie; Jones, Alexandra; Hawkes, Corinna; Ali, Iqra; Labonté, Ronald

    2017-01-12

    Interpretive nutrition labels provide simplified nutrient-specific text and/or symbols on the front of pre-packaged foods, to encourage and enable consumers to make healthier choices. This type of labelling has been proposed as part of a comprehensive policy response to the global epidemic of non-communicable diseases. However, regulation of nutrition labelling falls under the remit of not just the health sector but also trade. Specific Trade Concerns have been raised at the World Trade Organization's Technical Barriers to Trade Committee regarding interpretive nutrition labelling initiatives in Thailand, Chile, Indonesia, Peru and Ecuador. This paper presents an analysis of the discussions of these concerns. Although nutrition labelling was identified as a legitimate policy objective, queries were raised regarding the justification of the specific labelling measures proposed, and the scientific evidence for effectiveness of such measures. Concerns were also raised regarding the consistency of the measures with international standards. Drawing on policy learning theory, we identified four lessons for public health policy makers, including: strategic framing of nutrition labelling policy objectives; pro-active policy engagement between trade and health to identify potential trade issues; identifying ways to minimize potential 'practical' trade concerns; and engagement with the Codex Alimentarius Commission to develop international guidance on interpretative labelling. This analysis indicates that while there is potential for trade sector concerns to stifle innovation in nutrition labelling policy, care in how interpretive nutrition labelling measures are crafted in light of trade commitments can minimize such a risk and help ensure that trade policy is coherent with nutrition action. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  15. Buying and Selling Behavior of Individual Investors in Option-like Securities

    OpenAIRE

    Schmitz, Philipp; Weber, Martin

    2007-01-01

    We analyze the trading behavior of individual investors in option-like securities, namely bank-issued warrants, and thus expand the growing literature of investors behavior to a new kind of securities. A unique data set from a large German discount broker gives us the opportunity to analyze the trading behavior of 1,454 investors, making 89,958 transactions in 6,724 warrants on 397 underlyings. In different logit regression, we make use of the facts that investors can speculate on rising and ...

  16. 77 FR 26588 - In the Matter of Recycle Tech, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-05-04

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Recycle Tech, Inc.; Order of... of current and accurate information concerning the securities of Recycle Tech, Inc. (``Recycle Tech... protection of investors require a suspension of trading in the securities of Recycle Tech. Therefore, it is...

  17. 17 CFR 240.17a-23 - Recordkeeping and reporting requirements relating to broker-dealer trading systems.

    Science.gov (United States)

    2010-04-01

    ... requirements relating to broker-dealer trading systems. 240.17a-23 Section 240.17a-23 Commodity and Securities... relating to broker-dealer trading systems. (a) Scope of section. This section shall apply to any registered broker or dealer that acts as the sponsor of a broker-dealer trading system. (b) Definitions. For...

  18. Opportunity for peri-urban Perth groundwater trade

    Science.gov (United States)

    Gao, Lei; Connor, Jeff; Doble, Rebecca; Ali, Riasat; McFarlane, Don

    2013-07-01

    Groundwater trade is widely advocated for reallocating scarce groundwater resources between competing users, and managing over-allocated and declining aquifers. However, groundwater markets are still in their infancy, and the potential benefits and opportunities need investigation, particularly where there is a need to reduce the extraction from declining aquifers. This article evaluates economic impacts of reducing groundwater extraction for irrigation use in peri-urban Perth, Australia, where irrigation, a lake-based ecosystem, and public water supply are highly dependent on a declining groundwater resource. We present an assessment of market-based water trading approaches to reduce groundwater extraction with an economic model representing diversity in returns to groundwater use across a population of irrigators. The results indicate that potential economic costs of a proportional reduction in available groundwater for irrigation are 18-21% less if groundwater trade is possible. We also evaluate a water buyback from irrigation to provide public water supply as an alternative to new infrastructure. We find that buying back up to around 50% of current irrigation allocations could create new public water supply only at the cost of 0.32-0.39 million per GL, which is less than one fifth of the costs of new desalinisation or recycled water supply options (2-3 million per GL). We conclude that, with rapid development of computer and internet based trading platforms that allows fast, efficient and low cost multiple party trading, it is increasingly feasible to realise the economic potentials of market-based trade approaches for managing overexploited aquifers.

  19. Cryptographic Combinatorial Securities Exchanges

    Science.gov (United States)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  20. Electric trade in the United States 1992

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This publication, Electric Trade in the US 1992 (ELECTRA), is the fourth in a series of reports on wholesale power transactions prepared by the Electric Data Systems Branch, Survey Management Division, Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1992. The electric trade data collected and presented in this report furnish important information on the wholesale structure found within the US electric power industry. The patterns of interutility trade in the report support analyses of wholesale power transactions and provide input for a broader understanding of bulk power market issues that define the emerging national electric energy policies. The report includes information on the quantity of power purchased, sold, exchanged, and wheeled; the geographical locations of transactions and ownership classes involved; and the revenues and costs. Information on the physical transmission system are being included for the first time in this publication. Transmission data covering investor-owned electric utilities were shifted from the Financial Statistics of Selected Investor-Owned Electric Utilities to the ELECTRA publication. Some of the prominent features of this year`s report include information and data not published before on transmission lines for publicly owned utilities and transmission lines added during 1992 by investor-owned electric utilities.

  1. Electric trade in the United States 1992

    International Nuclear Information System (INIS)

    1994-09-01

    This publication, Electric Trade in the US 1992 (ELECTRA), is the fourth in a series of reports on wholesale power transactions prepared by the Electric Data Systems Branch, Survey Management Division, Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1992. The electric trade data collected and presented in this report furnish important information on the wholesale structure found within the US electric power industry. The patterns of interutility trade in the report support analyses of wholesale power transactions and provide input for a broader understanding of bulk power market issues that define the emerging national electric energy policies. The report includes information on the quantity of power purchased, sold, exchanged, and wheeled; the geographical locations of transactions and ownership classes involved; and the revenues and costs. Information on the physical transmission system are being included for the first time in this publication. Transmission data covering investor-owned electric utilities were shifted from the Financial Statistics of Selected Investor-Owned Electric Utilities to the ELECTRA publication. Some of the prominent features of this year's report include information and data not published before on transmission lines for publicly owned utilities and transmission lines added during 1992 by investor-owned electric utilities

  2. 76 FR 24934 - Magnum d'Or Resources, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2011-05-03

    ... press releases to investors concerning, among other things: (1) The company's current financial... lack of current and accurate information concerning the securities of Magnum d'Or Resources, Inc... interest and the protection of investors require a suspension of trading in the securities of the above...

  3. 36 CFR 13.1006 - Customary trade.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Customary trade. 13.1006... § 13.1006 Customary trade. In the Gates of the Arctic National Preserve unit which contains the Kobuk River and its tributaries, “customary trade” shall include—in addition to the exchange of furs for cash...

  4. Value Relevance vis-à-vis Disclosure on Business Combinations and Goodwill Recognized by Publicly Traded Brazilian Companies

    Directory of Open Access Journals (Sweden)

    Maíra Melo de Souza

    Full Text Available Abstract The objective of this study is to examine the value relevance of the level of disclosure on business combinations and goodwill recognized by publicly traded Brazilian companies. The research sample is composed of publicly traded Brazilian companies that carried out any type of business combination, as the acquiring entity, between 2010 and 2013, yielding a total sample of 202 observations. To measure the disclosure level of each, a metric was created based on CPC-15 R1 (2011 to examine certain disclosure items in order to render a greater level of detail. Data collection was carried out using the footnotes to the annual consolidated standardized financial statements (DFPs available from the São Paulo Stock Exchange (BM&FBOVESPA website. The results revealed that disclosure levels for business combinations are positively and significantly associated with the stock price of the companies analyzed. As to the recognition of goodwill during business combinations, despite the fact that it represents a significant share of the value of the transactions, no statistical significance explaining stock price behavior was found. It also bears mentioning that the average level of disclosure identified in the explanatory notes in the sample was very low, indicating that companies need to improve when it comes to transparency of information.

  5. Government influence on international trade in uranium

    International Nuclear Information System (INIS)

    1978-01-01

    The subject is dealt with in sections, entitled; introduction (history of uncertainty in the uranium market, opposition to nuclear power); unsatisfactory features of today's trade conditions (including discussion of restrictions in production, exports and imports); desirable principles governing international trade in uranium, apart from the non-proliferation issue (limitation on governmental intervention for economic purposes, reservation of adequate uranium resources in exporting countries, government export price control); desirable principles for achieving balance between security of supply and non-proliferation (need for consensus, reprocessing and fast breeder reactors, principles guiding government controls established for non-proliferation purposes). (U.K.)

  6. 78 FR 50135 - Soil Biogenics Ltd., File No. 500-1; Order of Suspension of Trading

    Science.gov (United States)

    2013-08-16

    ... SECURITIES AND EXCHANGE COMMISSION Soil Biogenics Ltd., File No. 500-1; Order of Suspension of Trading August 14, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Soil Biogenics Ltd. because it has not filed [[Page 50136

  7. Nuclear power, climate change and energy security: Exploring British public attitudes

    Energy Technology Data Exchange (ETDEWEB)

    Corner, Adam; Venables, Dan [School of Psychology, Cardiff University, Tower Building, Park Place, Cardiff CF10 3AT (United Kingdom); Spence, Alexa [School of Psychology/Horizon Digital Economy Research, University of Nottingham (United Kingdom); Poortinga, Wouter [Welsh School of Architecture, Cardiff University (United Kingdom); School of Psychology, Cardiff University, Tower Building, Park Place, Cardiff CF10 3AT (United Kingdom); Demski, Christina [School of Psychology, Cardiff University, Tower Building, Park Place, Cardiff CF10 3AT (United Kingdom); Pidgeon, Nick, E-mail: pidgeonn@cardiff.ac.uk [School of Psychology, Cardiff University, Tower Building, Park Place, Cardiff CF10 3AT (United Kingdom)

    2011-09-15

    Public attitudes towards nuclear power in the UK have historically been deeply divided, but as concern about climate change and energy security has exerted an increasing influence on British energy policy, nuclear power has been reframed as a low-carbon technology. Previous research has suggested that a significant proportion of people may 'reluctantly accept' nuclear power as a means of addressing the greater threat of climate change. Drawing on the results of a national British survey (n=1822), the current study found that attitudes towards nuclear remain divided, with only a minority expressing unconditional acceptance. In general, people who expressed greater concern about climate change and energy security and possessed higher environmental values were less likely to favour nuclear power. However, when nuclear power was given an explicit 'reluctant acceptance' framing - allowing people to express their dislike for nuclear power alongside their conditional support - concerns about climate change and energy security became positive predictors of support for nuclear power. These findings suggest that concern about climate change and energy security will only increase acceptance of nuclear power under limited circumstances-specifically once other (preferred) options have been exhausted. - Highlights: > We report data from 2005 to 2010 of British attitudes towards nuclear power and climate change. > Changes in attitudes over the time period were relatively modest. > British population remained relatively divided on nuclear power in 2010. > Concern about climate change was negatively related to evaluations of nuclear power. > Different framings of the issue alter the balance of support for nuclear power.

  8. Nuclear power, climate change and energy security: Exploring British public attitudes

    International Nuclear Information System (INIS)

    Corner, Adam; Venables, Dan; Spence, Alexa; Poortinga, Wouter; Demski, Christina; Pidgeon, Nick

    2011-01-01

    Public attitudes towards nuclear power in the UK have historically been deeply divided, but as concern about climate change and energy security has exerted an increasing influence on British energy policy, nuclear power has been reframed as a low-carbon technology. Previous research has suggested that a significant proportion of people may 'reluctantly accept' nuclear power as a means of addressing the greater threat of climate change. Drawing on the results of a national British survey (n=1822), the current study found that attitudes towards nuclear remain divided, with only a minority expressing unconditional acceptance. In general, people who expressed greater concern about climate change and energy security and possessed higher environmental values were less likely to favour nuclear power. However, when nuclear power was given an explicit 'reluctant acceptance' framing - allowing people to express their dislike for nuclear power alongside their conditional support - concerns about climate change and energy security became positive predictors of support for nuclear power. These findings suggest that concern about climate change and energy security will only increase acceptance of nuclear power under limited circumstances-specifically once other (preferred) options have been exhausted. - Highlights: → We report data from 2005 to 2010 of British attitudes towards nuclear power and climate change. → Changes in attitudes over the time period were relatively modest. → British population remained relatively divided on nuclear power in 2010. → Concern about climate change was negatively related to evaluations of nuclear power. → Different framings of the issue alter the balance of support for nuclear power.

  9. Foreign Under-Investment in US Securities and the Role of Relational Capital

    OpenAIRE

    Michael, Bryane

    2015-01-01

    Over 70 academic papers attempt to explain why foreigners invest in US securities. All ignore the vital role of the US broker-dealer. Macroeconomic factors like a trade balance or corporate governance may guide foreign investors toward certain markets. But US broker-dealers provide information to foreign investors and execute the actual trades. We hypothesize that particular foreign investors under-invest in US securities because of a lack of relational capital with US broker-dealers. We find...

  10. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved. PMID:24078906

  11. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Weizhe Zhang

    2013-01-01

    Full Text Available Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  12. Secure encapsulation and publication of biological services in the cloud computing environment.

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  13. Volatilities, traded volumes, and the hypothesis of price increments in derivative securities

    Science.gov (United States)

    Lim, Gyuchang; Kim, SooYong; Scalas, Enrico; Kim, Kyungsik

    2007-08-01

    A detrended fluctuation analysis (DFA) is applied to the statistics of Korean treasury bond (KTB) futures from which the logarithmic increments, volatilities, and traded volumes are estimated over a specific time lag. In this study, the logarithmic increment of futures prices has no long-memory property, while the volatility and the traded volume exhibit the existence of the long-memory property. To analyze and calculate whether the volatility clustering is due to a inherent higher-order correlation not detected by with the direct application of the DFA to logarithmic increments of KTB futures, it is of importance to shuffle the original tick data of future prices and to generate a geometric Brownian random walk with the same mean and standard deviation. It was found from a comparison of the three tick data that the higher-order correlation inherent in logarithmic increments leads to volatility clustering. Particularly, the result of the DFA on volatilities and traded volumes can be supported by the hypothesis of price changes.

  14. 78 FR 55769 - North China Horticulture, Inc., File No. 500-1; Order of Suspension of Trading

    Science.gov (United States)

    2013-09-11

    ... SECURITIES AND EXCHANGE COMMISSION North China Horticulture, Inc., File No. 500-1; Order of Suspension of Trading September 6, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of North China Horticulture, Inc...

  15. Trade-driven relocation of air pollution and health impacts in China.

    Science.gov (United States)

    Wang, Haikun; Zhang, Yanxu; Zhao, Hongyan; Lu, Xi; Zhang, Yanxia; Zhu, Weimo; Nielsen, Chris P; Li, Xin; Zhang, Qiang; Bi, Jun; McElroy, Michael B

    2017-09-29

    Recent studies show that international trade affects global distributions of air pollution and public health. Domestic interprovincial trade has similar effects within countries, but has not been comprehensively investigated previously. Here we link four models to evaluate the effects of both international exports and interprovincial trade on PM 2.5 pollution and public health across China. We show that 50-60% of China's air pollutant emissions in 2007 were associated with goods and services consumed outside of the provinces where they were produced. Of an estimated 1.10 million premature deaths caused by PM 2.5 pollution throughout China, nearly 19% (208,500 deaths) are attributable to international exports. In contrast, interprovincial trade leads to improved air quality in developed coastal provinces with a net effect of 78,500 avoided deaths nationwide. However, both international export and interprovincial trade exacerbate the health burdens of air pollution in China's less developed interior provinces. Our results reveal trade to be a critical but largely overlooked consideration in effective regional air quality planning for China.International and domestic interprovincial trade of China are entangled, but their health impacts have been treated separately in earlier studies. Here Wang. quantify the complex impacts of trade on public health across China within an integrative framework.

  16. THE EFFECT OF ILLICIT TRADE IN NARCOTICS ON GLOBAL ECONOMY

    Directory of Open Access Journals (Sweden)

    ALASMARI Khaled

    2013-07-01

    Illicit markets especially those dealing with narcotics constitute grievous issues to the world’s economies, putting to test global safety, economic progress as well as security and many other aspects. Seemingly, illicit narcotics trade in the last decade – that is 2000 to 2011 underwent a significant boom, resulting from a wide spectrum of illegal drugs such as cocaine as well as heroin among many other hard drugs. In today’s global society, several concerns are emerging on the rise of illicit narcotics trade accompanied with organized crime, chiefly as major hindrances to consistent global economic progress. Apparently, some of the effects of illicit narcotics trade are that; this trade gradually turns upside down business rules, opening way for new unruly market players besides reconfiguring influence in global economics as well as politics. Surprisingly, the revenue from illegal drugs in 2011 alone was roughly 10% of the global GDP. Hence, exaggerating local economies’ incomes and triggering ceaseless conflicts among market players, while at the same time reducing legal business activities likewise disintegrating socioeconomic conditions. An empirical research method was adopted for this study, analyzing illicit trade in narcotics on the global arena as from 2000 to 2011 and its resultant effects. The research findings indicate that, illegal drugs trade particularly on the world economy besides growing at a high rate, it endangers the overall welfare of humans likewise the business environment. This is ostensibly because this trade has high chances of engrossing regional economies into illegal drugs business activities, causing them to neglect sustainable ethical businesses. Now, to effectively address negative economic issues related to illegal drugs trade, there is apparent need for integrated efforts from local as well as international authorities. Such efforts are chiefly to control not only the harmful effects resulting from the use of illicit

  17. 75 FR 742 - Temporary Rule Regarding Principal Trades With Certain Advisory Clients

    Science.gov (United States)

    2010-01-06

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 275 [Release No. IA-2965A; File No. S7-23-07] RIN 3235-AJ96 Temporary Rule Regarding Principal Trades With Certain Advisory Clients AGENCY: Securities... transactions with certain of their advisory clients. As adopted, the only change to the rule was the expiration...

  18. 17 CFR 41.25 - Additional conditions for trading for security futures products.

    Science.gov (United States)

    2010-04-01

    ... security outstanding, the designated contract market or registered derivatives transaction execution... securities. (3) Notwithstanding paragraphs (b)(1) or (b)(2) of this section, if a derivatives clearing... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Additional conditions for...

  19. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Creation of participant's security entitlement... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security... public money, including without limitation deposits to the Treasury tax and loan accounts, or other...

  20. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  1. The Effect of International Trade on Rule of Law

    Directory of Open Access Journals (Sweden)

    Junsok Yang

    2013-03-01

    Full Text Available In this paper, we look at the relationship between international trade and the rule of law, using the World Justice Project Rule of Law Index, which include index figures on human rights, limits on government powers, transparency and regulatory efficiency. Based on regression analyses using the rule of law index figures and international trade figures (merchandise trade, service trade, exports and importsIn this paper, we look at the relationship between international trade and the rule of law, using the World Justice Project Rule of Law Index, which include index figures on human rights, limits on government powers, transparency and regulatory efficiency. Based on regression analyses using the rule of law index figures and international trade figures (merchandise trade, service trade, exports and imports as percentage of GDP, international trade and basic human rights seem to have little relationship; but trade has a close positive relationship with strong order and security. Somewhat surprisingly, regulatory transparency and effective implementation seems to have little or no effect on international trade and vice versa. International trade shows a clear positive relationship with the country’s criminal justice system, but the relationship with the civil justice system is not as clear as such. For regulatory implementation and civil justice, services trade positively affect these institutions, but these institutions in turn affect exports more strongly than services trade. Finally, the effect of trade on rule of law is stronger on a medium to long term (10-20 year time horizon.

  2. Nuclear security in major public events: the XV Pan American Games and the III Para-Pan American Games in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The organization of a major public event involving large numbers of spectators and participants, presents important security challenges. Taking this into consideration, the Brazilian Nuclear Energy Commission (CNEN) has been requested, by the National Secretary of Public Security/ Ministry of Justice (SENASP/MJ), by the end of 2006, to participate on the security actions to be implemented in both the XV Pan American Games and III Para Pan American Games. The XV Pan American Games 2007 and the III Para Pan American Games were held in Rio de Janeiro, Brazil from 13 to 29 July 2007 and from 12 to 19 August 2007, respectively. Those events had 8700 participants between athletes, coaches and referees from 42 countries. More than 300 competition events were held at 17 different venues and were covered by 4910 professionals from TV, radio and written press. Around 2 million tickets have been sold or distributed and 18,000 volunteers participated on the organization. The participation of CNEN was concentrated on the implementation of specific nuclear and radiological security measures to be applied at those events. This was part of a multi-institutional plan for the security of the Games, coordinated by the National Secretary of Public Security of the Ministry of Justice (SENASP/MJ). The support provided by IAEA under a Cooperation Arrangement with the Brazilian authorities was a key factor for the success of the whole operation. The actions taken and the lessons identified by the Brazilian Nuclear Energy Commission related to nuclear and radiological security for the Pan American Games and for the Para Pan American Games are presented. (author)

  3. New Trend of Insider Trading in Chinese Securities Market and Its Legal Countermeasures%我国证券市场内幕交易的新趋势及其对策

    Institute of Scientific and Technical Information of China (English)

    张韩

    2013-01-01

    近年来,我国证券市场内幕交易案件频发,呈现出内幕交易地域场所扩大化、内幕信息窃取手段科技化、内幕交易行为方式复杂化等新趋势。究其原因,实为证券法条文过于笼统,期货内幕交易规定尚属立法空白所致。对此,应建立证券法上的惩罚性赔偿制度,构建多主体间的连带法律责任制度,尽快出台具体可行的内幕交易司法解释,由内幕交易行为人设置专项赔偿基金。%Recently there are frequent cases of insider trading in Chinese securities market , with the new trend of expansion of places for insider trading , of high-tech methods of stealing of inside information and of complexity of forms of insider trading .The key reason is the unspecific articles of Securities Law and the lack of regulations on futures'insider trading.In view of this, we should introduce punitive damages system , multi-party's joint liability system and class action system .Meanwhile , we need to put forward specific and practical judicial interpretation as soon as possible and insider trader should set up special compensation fund .

  4. Tailoring ISO/IEC 27001 for SMEs: A Guide to Implement an Information Security Management System in Small Settings

    Science.gov (United States)

    Valdevit, Thierry; Mayer, Nicolas; Barafort, Béatrix

    While Information Security Management Systems (ISMS) are being adopted by the biggest IT companies, it remains quite difficult for smaller entities to implement and maintain all the requirements of ISO/IEC 27001. In order to increase information security in Luxembourg, the Public Research Centre Henri Tudor has been charged by the Luxembourg Ministry of Economy and Foreign Trade to find solutions to facilitate ISMS deployment for SMEs. After an initial experiment aiming at assisting a SME in getting the first national ISO/IEC 27001 certification for a private company, an implementation guide for deploying an ISMS, validated by local experts and experimented in SMEs, has been released and is presented in this paper.

  5. 76 FR 12887 - Foreign-Trade Zones in the United States

    Science.gov (United States)

    2011-03-09

    ..., International Trade Administration, Commerce. ACTION: Extension of public comment period. SUMMARY: On December..., Foreign-Trade Zones Board, International Trade Administration, U.S. Department of Commerce, 1401... will be accepted in Microsoft Word, Excel, WordPerfect, or Adobe portable document file (pdf) formats...

  6. Fewer can be More: Nuclear Safety and Security Culture Self-Assessment in the Hungarian Public Ltd. for Radioactive Waste Management

    International Nuclear Information System (INIS)

    Horváth, K.; Solymosi, M.; Vass, G.

    2016-01-01

    The Hungarian regulator and operators show strong commitment towards robust nuclear safety and security culture. The paper discusses the evolution and the basis of the regulation of Hungarian safety and security culture. Because of security considerations nuclear safety incidents have always received and for sure will receive more publicity than malicious acts. That is probably the main reason behind that mostly nuclear safety incidents influence the common beliefs. This kind of primacy is noticeable as well in regulations and also in practice. Although there is a strong connection nuclear safety and security culture, their relationship has not been researched for a long time. The paper also presents an already achieved, combined nuclear safety and security culture survey type assessment. Survey is a well known type of organizational culture self assessment. The applied methods, relationship between these two cultures and of course some difficulties of the process are summarized. The presented method is appropriate to combine different guidance and characteristics to measure different attitude in a single survey. The method in practice is shown through the nuclear safety and security culture assessment conducted at Hungarian Public Ltd. Of Radioactive Waste Management. (author)

  7. 17 CFR 240.10b-18 - Purchases of certain equity securities by the issuer and others.

    Science.gov (United States)

    2010-04-01

    ... authorize Rule 10b-18 purchases by or on behalf of the issuer. (4) Agent independent of the issuer has the... trading volume for that security or, in the event that trading volume data are unavailable, is at least 20... of the security, exclusive of any shares owned by any affiliate; Provided, however, That a block...

  8. 75 FR 24775 - Notice of Open Public Hearing

    Science.gov (United States)

    2010-05-05

    ... Washington, DC, on June 9, 2010, titled ``Evaluating China's Role in the World Trade Organization over the... security implications of the U.S. bilateral trade and economic relationship with China. The June 9 hearing...

  9. 76 FR 41855 - Columbus Geographic Systems (GIS) Ltd.; Order of Suspension of Trading

    Science.gov (United States)

    2011-07-15

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Columbus Geographic Systems (GIS) Ltd.; Order of Suspension of Trading July 13, 2011. It appears to the Securities and Exchange Commission that... Systems (GIS) Ltd. because it has not filed any periodic reports since the period ended June 30, 2008. The...

  10. Scoin Trading (Pty)

    African Journals Online (AJOL)

    User

    2 Scoin Trading (Pty) Ltd v Bernstein 2011 2 SA 118 (SCA). ... Literature on the law of contract in South Africa have over the years tended to hold that fault ..... who was suddenly compelled to be absent on public business was not held to be in.

  11. Government Procurement : Market Access, Transparency, and Multilateral Trade Rules

    OpenAIRE

    Evenett, Simon J.; Hoekman, Bernard M.

    2004-01-01

    The authors examine the effects on national welfare and market access of two public procurement practices-discrimination against foreign suppliers of goods and services and nontransparency of the procedures used to allocate government contracts to firms. Both types of policies have become prominent in international trade negotiations, including the Doha Round of the World Trade Organization (WTO) trade talks. Traditionally, the focus of international trade agreements has been on market access...

  12. A discourse activist approach to studying IT-security practices in Danish public organizations

    DEFF Research Database (Denmark)

    Bager, Ann Starbæk; Holmgreen, Lise-Lotte

    plurivocality and dialogue in organizational and leadership development practices: Discussion and close up discourse analysis of dialogic practices in a leadership development forum. PhD thesis. University of Aalborg, Denmark. Deetz, S (2001): Conceptual Foundations. In: New Handbook of Organizational......With the threat of personal and organizational details being compromised through e.g. hacking, IT security is fast becoming a major concern in many organizations. In the presentation, the authors explore the potential of applying a discourse based methodological approach to the study and change...... of IT-security practices in Danish public organizations. The approach contributes to the field of Organizational Discourse Studies (ODS), in which discourse scholars are actively involved in dealing with local organizational challenges and fostering organizational change (cf. Grant & Iedema, 2005...

  13. Insider Trading B-side: relevance, timeliness and position influence

    Directory of Open Access Journals (Sweden)

    Luiz Felipe de A. Pontes Girão

    2015-12-01

    Full Text Available Objective – Our main objective is to analyze the impacto f insider trading on stock investments’ decision. Design/methodology/approach – We used an online survey, obtaining 271 valid answers. To analyze our data, we used some parametric (t and F Anova, and non-parametric techniques (Mann-Whitney and Kruskal-Wallis. Findings – We find that insider tradings are relevant to investment decisions, and the timeliness also exert an influence to this kind of decision, especially abnormal trades. Practical implications – In practical terms, our results suggests that the Brazilian Securities and Exchange Commission (CVM must update the Brazilian insider trading regulation to achieve the objective to protect investors. In the investors point of view, this possible update could improve investors’ ability to control insiders and follow his activities as well as to mimic his trades. Originality/value – The originality of our paper is an analysis of relevance, timeliness and influence of position in a firm as “determinants” of investment decisions. We use these three specific characteristics to criticize the Brazilian insider trading regulation.

  14. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  15. Design and research on the platform of network manufacture product electronic trading

    Science.gov (United States)

    Zhou, Zude; Liu, Quan; Jiang, Xuemei

    2003-09-01

    With the rapid globalization of market and business, E-trading affects every manufacture enterprise. However, the security of network manufacturing products of transmission on Internet is very important. In this paper we discussed the protocol of fair exchange and platform for network manufacture products E-trading based on fair exchange protocol and digital watermarking techniques. The platform realized reliable and copyright protection.

  16. Synergy effects between MINUSTAH and public security in Brazil

    Directory of Open Access Journals (Sweden)

    Christoph Harig

    2015-03-01

    Full Text Available This article assesses the complex relationship between UN Peace Operations and public security in Brazil. It shows that there are obvious similarities at an operational level between military actions in MINUSTAH and Rio´s Pacification, which arguably result in reciprocal learning processes among troops. With the establishment of dedicated training centres and a considerable amount of practical experience in missions that differ significantly from combat-orientated warfare, soldiers are becoming increasingly familiar with police tasks. Considering the extension of the legal framework for allowing domestic military actions, I argue that this “police-ization of the military” (Dunlap, 1999, p. 222 is probably more significant for internal “Guaranteeing Law and Order” (GLO missions than for further Brazilian participations in Peace Operations.

  17. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies?

    Science.gov (United States)

    Neufeld, Maria; Lachenmeier, Dirk W.; Walch, Stephan G.; Rehm, Jürgen

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia. PMID:28663784

  18. Detailed Information Security in Cloud Computing

    OpenAIRE

    Pavel Valerievich Ivonin

    2013-01-01

    The object of research in this article is technology of public clouds, structure and security system of clouds. Problems of information security in clouds are considered, elements of security system in public clouds are described.

  19. The Trading Axis in Irkutsk Downtown

    Directory of Open Access Journals (Sweden)

    Elena Grigoryeva

    2016-10-01

    Full Text Available The article reveals a linear concentration of the trading function in the historical center of Irkutsk. It features historical prerequisites and continuation of the tradition in the post-Soviet period, given the conversion of plants and factories. The article analyses the current state and prospects of modernization of the trading axis with its transformation into a modern public space.

  20. Development of nuclear power and impacts on public safety and security

    International Nuclear Information System (INIS)

    Bochmann, H.P.

    1985-01-01

    The author summarizes the contribution of nuclear power to the overall power supply in the FRG, impacts of the nuclear power industry on public safety and security, and the legal instruments available to protect the public. He concludes his discussion of facts and arguments with the following statements: protection against interference or any other harmful actions of third parties aimed against nuclear installations must be devised so as to practically guarantee prevention of sabotage or any acts of terrorism. Preventive measures have to be made with an eye to what is sensible in practice, as perfectionism might have the adverse effect. The available concept of integrated protection and engineered safety, which has been set up in 1977, will be a sufficient means of reacting to near developments and information in a flexible and effective manner. (orig./HSCH) [de

  1. Public security female workers at the coast of Paraná, Brazil: intersections of gender, work, violence(s), and health.

    Science.gov (United States)

    Schneider, Daniele; Signorelli, Marcos Claudio; Pereira, Pedro Paulo Gomes

    2017-09-01

    This study aimed to promote visibility of women working in public security along the Parana coast, articulating issues of gender, violence(s), and the health-disease process. The methodology was qualitative, through an ethnographic research which included 50 women (civilians, military policewomen, and prison officers) from municipalities along the Parana coast, between March 2014 and March 2015. Results revealed: 1) the dilemmas that these women are subjected to, facing the seasonal dynamics in the field of public security in the region; 2) exposure to violence (mainly institutional and gender-based) and its impact on these women's health; 3) power relations, marked by corporations' hierarchies and gender asymmetries between men and women in professional settings. In summary, this research highlighted the need to promote visibility of women working in public security institutions, considering the impact of violence and gender inequalities in their personal and professional lives, including the resistance and rearrangements promoted by these women in the institutions in response to their presence in a hegemonic and traditionally male environment.

  2. Securities Operations: Update on Actions Taken to Address Day Trading Concerns

    National Research Council Canada - National Science Library

    2001-01-01

    In 1999, day trading 1 began to receive intense scrutiny from state and federal regulators and the Congress because of concerns that it posed significant investor protection and market integrity issues...

  3. Leveraging Trade Agreements to Meet U.S. Security Aims

    Science.gov (United States)

    2016-04-08

    market , accounting for $24.9 billion in exports . An estimated 800,000 U.S. jobs are tied to trade with China .6 President Nixon’s 1972 goal of bringing...pursued a foreign policy initiative referred to as the “North American Accord,” explaining, A developing closeness among Canada, Mexico , and the United...framework to facilitate better cooperation with their powerful southern neighbor.9 Reagan’s North American Accord with Mexico took longer to evolve

  4. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  5. Collective Bargaining on Employment Security: The Influence of the Legal Framework

    NARCIS (Netherlands)

    Zekic, Nuna; Muffels, R.J.A.

    2016-01-01

    Employers’ organisations and trade unions (also called the social partners) are given a central role to play in the specification of employment security into concrete regulations through collective bargaining. The question is how employment security can be implemented through collective bargaining.

  6. Conceptual Framework of Energy Security Assessment in Korea

    International Nuclear Information System (INIS)

    Moon, Kee Hwan; Chung, Whan Sam; Kim, Seung Su

    2016-01-01

    Korea's electric power is an essential source of energy, supplying 21.4% of the energy required by the manufacturing industry, 43.4% of that required for commerce, and 59.5% of that required by the public sector in 2014. Korea relies heavily on imports of energy sources because of its lack of natural resources. Its land area is limited, making it difficult to utilize renewable energy. Moreover, it is difficult to trade electricity through grid connections with neighbouring countries. Considering the key role of electric power in Korea and the circumstances of its power generation industry, we must understand the contribution of each fuel used in power plants to energy sustainability. This study derives the conceptual framework to quantify energy security levels for nuclear power generation in Korea and employ them in evaluating the national energy security. And sample calculation of nuclear energy security indicators is performed. The implications drawn from the evaluation are as follows. Nuclear power demonstrates dominance in the dimensions of economy and technology as the related technologies have entered into the stage of maturity. Without constant technological innovation, however, sustainability of nuclear sources will not be guaranteed. Nuclear has in the middle in terms of SS, but their high volatility impels Korea to pursue the diversification of energy suppliers. The energy security indicators suggested in this study are anticipated to contribute to establishing an energy security policy based on a comprehensive understanding of the energy security status in Korea. In the future, it will be necessary to establish specific scenarios for a decrease of regional conflicts and a post-2020 climate change conventions and conduct realistic and dynamic analyses

  7. Conceptual Framework of Energy Security Assessment in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Kee Hwan; Chung, Whan Sam; Kim, Seung Su [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    Korea's electric power is an essential source of energy, supplying 21.4% of the energy required by the manufacturing industry, 43.4% of that required for commerce, and 59.5% of that required by the public sector in 2014. Korea relies heavily on imports of energy sources because of its lack of natural resources. Its land area is limited, making it difficult to utilize renewable energy. Moreover, it is difficult to trade electricity through grid connections with neighbouring countries. Considering the key role of electric power in Korea and the circumstances of its power generation industry, we must understand the contribution of each fuel used in power plants to energy sustainability. This study derives the conceptual framework to quantify energy security levels for nuclear power generation in Korea and employ them in evaluating the national energy security. And sample calculation of nuclear energy security indicators is performed. The implications drawn from the evaluation are as follows. Nuclear power demonstrates dominance in the dimensions of economy and technology as the related technologies have entered into the stage of maturity. Without constant technological innovation, however, sustainability of nuclear sources will not be guaranteed. Nuclear has in the middle in terms of SS, but their high volatility impels Korea to pursue the diversification of energy suppliers. The energy security indicators suggested in this study are anticipated to contribute to establishing an energy security policy based on a comprehensive understanding of the energy security status in Korea. In the future, it will be necessary to establish specific scenarios for a decrease of regional conflicts and a post-2020 climate change conventions and conduct realistic and dynamic analyses.

  8. 76 FR 24026 - Federal Acquisition Regulation; Information Collection; Trade Agreements Certificate

    Science.gov (United States)

    2011-04-29

    ...; Information Collection; Trade Agreements Certificate AGENCY: Department of Defense (DOD), General Services... approved information collection requirement concerning trade agreements certificate. Public comments are...-mail [email protected] . SUPPLEMENTARY INFORMATION: A. Purpose Under the Trade Agreements Act of...

  9. The role of Nigerian youths in effective implementation of security ...

    African Journals Online (AJOL)

    ... effective implementation of security and social development intervention in Nigeria cannot be over-emphasized. This is because youths have been deeply involved in various self-help projects in various Local and State Governments in Nigeria. Their areas of interventions cover projects involving trade, commerce, security ...

  10. Intraday Trading Patterns in the Equity Warrants and Equity Options Markets: Australian Evidence

    Directory of Open Access Journals (Sweden)

    Lydia Segara

    2007-06-01

    Full Text Available This paper extends the microstructure literature, by examining the previouslyundocumented intraday trading patterns in trading volume, price volatility, order depthand relative spreads for both the warrant and option market in Australia. Comparisons ofintraday variations across these derivative securities allows for insight to be drawn intocompeting market microstructure theories and provides the opportunity to examinewhether market design differences explain variations in observed intraday patterns. Wefind that intraday trading patterns documented in the warrant and option markets can beexplained by their market designs, along with theories relating to time-varying informationasymmetry and time-varying hedging trades around nontrading periods.

  11. Carry trade as a speculative investment strategy in Serbia

    Directory of Open Access Journals (Sweden)

    Bungin Sanja

    2012-12-01

    Full Text Available This paper is analyses causes and the consequences of a speculative investment carry trade strategy in the exchange market in Serbia. The presence of such type of investor is related to high yields of risk free securities denominated in dinars, as well as the perception of future movements of dinar exchange rate related to currency that serves as source of investment. The consequences of carry trade may significantly influence exchange rate movements when monetary policy has limited facilities to combat negative and sudden shocks.

  12. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  13. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  14. Testing the performance of technical trading rules in the Chinese markets based on superior predictive test

    Science.gov (United States)

    Wang, Shan; Jiang, Zhi-Qiang; Li, Sai-Ping; Zhou, Wei-Xing

    2015-12-01

    Technical trading rules have a long history of being used by practitioners in financial markets. The profitable ability and efficiency of technical trading rules are yet controversial. In this paper, we test the performance of more than seven thousand traditional technical trading rules on the Shanghai Securities Composite Index (SSCI) from May 21, 1992 through June 30, 2013 and China Securities Index 300 (CSI 300) from April 8, 2005 through June 30, 2013 to check whether an effective trading strategy could be found by using the performance measurements based on the return and Sharpe ratio. To correct for the influence of the data-snooping effect, we adopt the Superior Predictive Ability test to evaluate if there exists a trading rule that can significantly outperform the benchmark. The result shows that for SSCI, technical trading rules offer significant profitability, while for CSI 300, this ability is lost. We further partition the SSCI into two sub-series and find that the efficiency of technical trading in sub-series, which have exactly the same spanning period as that of CSI 300, is severely weakened. By testing the trading rules on both indexes with a five-year moving window, we find that during the financial bubble from 2005 to 2007, the effectiveness of technical trading rules is greatly improved. This is consistent with the predictive ability of technical trading rules which appears when the market is less efficient.

  15. Permit trading and credit trading

    DEFF Research Database (Denmark)

    Boom, Jan-Tjeerd; R. Dijstra, Bouwe

    This paper compares emissions trading based on a cap on total emissions (permit trading) and on relative standards per unit of output (credit trading). Two types of market structure are considered: perfect competition and Cournot oligopoly. We find that output, abatement costs and the number...... of firms are higher under credit trading. Allowing trade between permit-trading and credit-trading sectors may increase in welfare. With perfect competition, permit trading always leads to higher welfare than credit trading. With imperfect competition, credit trading may outperform permit trading....... Environmental policy can lead to exit, but also to entry of firms. Entry and exit have a profound impact on the performance of the schemes, especially under imperfect competition. We find that it may be impossible to implement certain levels of total industry emissions. Under credit trading several levels...

  16. Fluctuations of trading volume in a stock market

    Science.gov (United States)

    Hong, Byoung Hee; Lee, Kyoung Eun; Hwang, Jun Kyung; Lee, Jae Woo

    2009-03-01

    We consider the probability distribution function of the trading volume and the volume changes in the Korean stock market. The probability distribution function of the trading volume shows double peaks and follows a power law, P(V/)∼( at the tail part of the distribution with α=4.15(4) for the KOSPI (Korea composite Stock Price Index) and α=4.22(2) for the KOSDAQ (Korea Securities Dealers Automated Quotations), where V is the trading volume and is the monthly average value of the trading volume. The second peaks originate from the increasing trends of the average volume. The probability distribution function of the volume changes also follows a power law, P(Vr)∼Vr-β, where Vr=V(t)-V(t-T) and T is a time lag. The exponents β depend on the time lag T. We observe that the exponents β for the KOSDAQ are larger than those for the KOSPI.

  17. WTO confidential: the case of asbestos. World Trade Organization.

    Science.gov (United States)

    Castleman, Barry

    2002-01-01

    The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see.

  18. Trade Union Organisers in Trade Union Organising Strategies: building workplace unionism or reinforcing bureaucracy

    OpenAIRE

    Looker, Gerard

    2015-01-01

    This thesis considers the role of union full time officers in union organising strategies. Two decades of promoting union organising influenced by models developed by the AFL-CIO, has failed to arrest the decline of UK trade unions let alone produce evidence of renewal. Focusing mainly on one region in the UKs largest public sector trade union, Unison, the research provides for a detailed account of how organising strategies affect union work, presenting thick and deep data from full time off...

  19. 12 CFR 551.50 - What records must I maintain for securities transactions?

    Science.gov (United States)

    2010-01-01

    ... ticket) of each order or any other instruction given or received for the purchase or sale of securities.... You must maintain an itemized daily record of each purchase and sale of securities in chronological... and amount of the securities; (3) The unit and aggregate purchase or sale price; (4) The trade date...

  20. 17 CFR 230.415 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-04-01

    ... majority-owned subsidiary; or (xi) Shares of common stock which are to be offered and sold on a delayed or... an existing trading market for outstanding shares of the same class at other than a fixed price. (5... and sale of securities. 230.415 Section 230.415 Commodity and Securities Exchanges SECURITIES AND...

  1. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  2. Importing food damages domestic environment: Evidence from global soybean trade.

    Science.gov (United States)

    Sun, Jing; Mooney, Harold; Wu, Wenbin; Tang, Huajun; Tong, Yuxin; Xu, Zhenci; Huang, Baorong; Cheng, Yeqing; Yang, Xinjun; Wei, Dan; Zhang, Fusuo; Liu, Jianguo

    2018-05-22

    Protecting the environment and enhancing food security are among the world's Sustainable Development Goals and greatest challenges. International food trade is an important mechanism to enhance food security worldwide. Nonetheless, it is widely concluded that in international food trade importing countries gain environmental benefits, while exporting countries suffer environmental problems by using land and other resources to produce food for exports. Our study shows that international food trade can also lead to environmental pollution in importing countries. At the global level, our metaanalysis indicates that there was increased nitrogen (N) pollution after much farmland for domestically cultivated N-fixing soybeans in importing countries was converted to grow high N-demanding crops (wheat, corn, rice, and vegetables). The findings were further verified by an intensive study at the regional level in China, the largest soybean-importing country, where the conversion of soybean lands to corn fields and rice paddies has also led to N pollution. Our study provides a sharp contrast to the conventional wisdom that only exports contribute substantially to environmental woes. Our results suggest the need to evaluate environmental consequences of international trade of all other major goods and products in all importing countries, which have significant implications for fundamental rethinking in global policy-making and debates on environmental responsibilities among consumers, producers, and traders across the world.

  3. Public Enterprises in Estonia as Instruments of Foreign Trade. Estnische öffentliche Unternehmen als Instrumente der Außenwirtschaftspolitik

    Directory of Open Access Journals (Sweden)

    Peter Friedrich

    2016-10-01

    Full Text Available The authors discuss whether a small country with shrinking population should apply public enterprises to improve its economic situation for purposes of external economic relations policy. The study refers to Estonia as an example. Estonia has developed public enterprises of the central state and of the municipalities since the reestablishment of the Estonian Republic. As public enterprise use private forms of law, some management problems occur because public firms are legally obliged to practice the management by objectives. The operationalization of welfare maximisation or achievement of sustainability of society to formulate goals for public enterprises was yet not successful. However, public firms should increase income, avoid monopoly positions of private firms, provide special public services, and should realize public goals. The activities of Estonian public enterprises and their goals show that Estonian enterprises can be used as instruments for foreign trade. The authors formulate a simple two-country model comprising a small and a big country. They introduce a public interest function referring to production, demand and employment, which allows the authors to argue that under conditions of shrinking population, the small country’s public interests, becomes reduced. They show that employing public enterprises diminishes negative effects on public interests. Even some types of inefficient public firms may lead to improvements.

  4. Department of Trade annual report 1983-84. [Australia

    Energy Technology Data Exchange (ETDEWEB)

    1984-01-01

    The Department of Trade was created on 11 March 1983. It is responsible for the administration of the Government's policies as they relate to international trade, the promotion of Australia's exports and the Australian Trade Commissioner Service. The Department's activities for the financial year 1983/84 are documented in this report. Areas documented are corporate strategy, execution of corporate strategy, management, information services, finance and staffing, Acts administered by the Minister, functions and membership of councils and committees, international trade meetings attended by departmental representatives, departmental publications, and national export award winners.

  5. Advanced API security securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

    CERN Document Server

    Siriwardena, Prabath

    2014-01-01

    Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the 'coolest' way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an afterthought, but API security has evolved a lot in last five years. The growth of standards, out there, has been exponential. That's where AdvancedAPI Security comes in--to wade through the weeds

  6. Climate policy and dependence on traded carbon

    International Nuclear Information System (INIS)

    Andrew, Robbie M; Peters, Glen P; Davis, Steven J

    2013-01-01

    A growing number of countries regulate carbon dioxide (CO 2 ) emissions occurring within their borders, but due to rapid growth in international trade, the products consumed in many of the same countries increasingly rely on coal, oil and gas extracted and burned in other countries where CO 2 is not regulated. As a consequence, existing national and regional climate policies may be growing less effective every year. Furthermore, countries that are dependent on imported products or fossil fuels are more exposed to energy and climate policies in other countries. We show that the combined international trade in carbon (as fossil fuels and also embodied in products) increased from 12.3 GtCO 2 (55% of global emissions) in 1997 to 17.6 GtCO 2 (60%) in 2007 (growing at 3.7% yr −1 ). Within this, trade in fossil fuels was larger (10.8 GtCO 2 in 2007) than trade in embodied carbon (6.9 GtCO 2 ), but the latter grew faster (4.6% yr −1 compared with 3.1% yr −1 for fuels). Most major economies demonstrate increased dependence on traded carbon, either as exports or as imports. Because energy is increasingly embodied in internationally traded products, both as fossil fuels and as products, energy and climate policies in other countries may weaken domestic climate policy via carbon leakage and mask energy security issues. (letter)

  7. Statistical properties of trading activity in Chinese stock market

    Science.gov (United States)

    Sun, Xiaoqian; Cheng, Xueqi; Shen, Huawei; Wang, Zhaoyang

    2010-08-01

    We investigate the statistical properties of traders' trading behavior using cumulative distribution function(CDF). We analyze exchange data of 52 stocks for one-year period which contains non-manipulated stocks and manipulated stocks published by China Securities Regulatory Commission(CSRC). By analyzing the total number of transactions and the trading volume of each trader over a year, we find the cumulative distributions have power-law tails and the distributions between non-manipulated stocks and manipulated stocks are different. These findings can help us to detect the manipulated stocks.

  8. 15 CFR 930.122 - Necessary in the interest of national security.

    Science.gov (United States)

    2010-01-01

    ... Trade (Continued) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... proposed. Secretarial review of national security issues shall be aided by information submitted by the...

  9. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  10. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  11. International trade agreements: a threat to tobacco control policy.

    Science.gov (United States)

    Shaffer, E R; Brenner, J E; Houston, T P

    2005-08-01

    International covenants establish a role for governments in ensuring the conditions for human health and wellbeing, which has been recognised as a central human right. International trade agreements, conversely, prioritize the rights of corporations over health and human rights. International trade agreements are threatening existing tobacco control policies and restrict the possibility of implementing new controls. This situation is unrecognised by many tobacco control advocates in signatory nations, especially those in developing countries. Recent agreements on eliminating various trade restrictions, including those on tobacco, have expanded far beyond simply international movement of goods to include internal tobacco distribution regulations and intellectual property rules regulating advertising and labelling. Our analysis shows that to the extent trade agreements protect the tobacco industry, in itself a deadly enterprise, they erode human rights principles and contribute to ill health. The tobacco industry has used trade policy to undermine effective barriers to tobacco importation. Trade negotiations provide an unwarranted opportunity for the tobacco industry to assert its interests without public scrutiny. Trade agreements provide the industry with additional tools to obstruct control policies in both developed and developing countries and at every level. The health community should become involved in reversing these trends, and help promote additional measures to protect public health.

  12. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  13. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  14. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Creation of Participant's Security... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement... States to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  15. Cross-border contraband trade across the main route from Moyale to ...

    African Journals Online (AJOL)

    Journal of Business and Administrative Studies ... and the countries' peace and security, are challenged by the increasing nature of illegal cross border trade. ... of the business through various interventions, the success so far is limited.

  16. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 2; referees: 2 approved

    OpenAIRE

    Maria Neufeld; Dirk W. Lachenmeier; Stephan G. Walch; Jürgen Rehm

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm t...

  17. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 1; referees: 2 approved

    OpenAIRE

    Maria Neufeld; Dirk W. Lachenmeier; Stephan G. Walch; Jürgen Rehm

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm t...

  18. NOx emissions trading: Precursor to future growth

    International Nuclear Information System (INIS)

    Colella, A.

    1993-01-01

    Title I of the Clean Air Act Amendments (CAAA) of 1990 specified the framework for enhanced regulation in ozone non-attainment areas with increasingly stringent requirements dependent on the area classification - marginal, moderate, serious, severe or extreme. Before the CAAA were passed, only volatile organic compounds (VOCs) were regulated as precursors to ozone formation, Now, by statute, emissions of nitrogen oxides (NO x ) are also regulated as ozone precursor. Under the CAAA, new sources and modifications of existing sources are subject to Title I permitting requirements in ozone non-attainment areas if emissions of NO x and/or VOCs exceed certain triggering levels. For many new or facility expansion projects, especially power generation, the NO x thresholds are easily exceeded thus triggering Title I non-attainment new source review which requires application of control technology to new equipment which results in the Lowest Achievable Emission Rate (LAER), and securing emission reductions either internally or from other major sources to offset the increased emission from the new or modified source. The selection of a LAER technology is generally within an applicant's control. An applicant can determine up-front the engineering and cost considerations associated with LAER technology is assessing a project's viability. However, without a clear source of emission offsets of a means to secure them, assessing project viability could be difficult if not impossible. No available emission offsets means no industrial growth. For sources of NO x undergoing Title I new source review, a regional or state banking system that facilitates NO x emissions trading is needed as a precursor to future growth. This paper presents an overview of EPA's Emissions Trading Policy and Title I new source review offset provisions. Industry's concerns about emissions trading and recommendations for future trading programs are presented

  19. Privacy, security, and the public health researcher in the era of electronic health record research.

    Science.gov (United States)

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  20. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Occupancy by police officers to... HOUSING Occupancy by Over-Income Families or Police Officers § 960.505 Occupancy by police officers to provide security for public housing residents. (a) Police officer. For purpose of this subpart E, “police...