WorldWideScience

Sample records for publicly traded securities

  1. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  2. An analysis of security price risk and return among publicly traded pharmacy corporations.

    Science.gov (United States)

    Gilligan, Adrienne M; Skrepnek, Grant H

    2013-01-01

    Community pharmacies have been subject to intense and increasing competition in the past several decades. To determine the security price risk and rate of return of publicly traded pharmacy corporations present on the major U.S. stock exchanges from 1930 to 2009. The Center of Research in Security Prices (CRSP) database was used to examine monthly security-level stock market prices in this observational retrospective study. The primary outcome of interest was the equity risk premium, with analyses focusing upon financial metrics associated with risk and return based upon modern portfolio theory (MPT) including: abnormal returns (i.e., alpha), volatility (i.e., beta), and percentage of returns explained (i.e., adjusted R(2)). Three equilibrium models were estimated using random-effects generalized least squares (GLS): 1) the Capital Asset Pricing Model (CAPM); 2) Fama-French Three-Factor Model; and 3) Carhart Four-Factor Model. Seventy-five companies were examined from 1930 to 2009, with overall adjusted R(2) values ranging from 0.13 with the CAPM to 0.16 with the Four-Factor model. Alpha was not significant within any of the equilibrium models across the entire 80-year time period, though was found from 1999 to 2009 in the Three- and Four-Factor models to be associated with a large, significant, and negative risk-adjusted abnormal returns of -33.84%. Volatility varied across specific time periods based upon the financial model employed. This investigation of risk and return within publicly listed pharmacy corporations from 1930 to 2009 found that substantial losses were incurred particularly from 1999 to 2009, with risk-adjusted security valuations decreasing by one-third. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. Evaluating of foreign trade security

    OpenAIRE

    Vasyliev Andriy

    2015-01-01

    A method of evaluating foreign trade security is considered based on horizontally integrated approach to research security issues, taking into account the conditions of management, factors, components and levels of external security. The work was based theories of security, economics, management theory, practice of state regulation of foreign trade.

  4. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  5. Trade Publications in the Marketing Classroom.

    Science.gov (United States)

    Stull, William A.

    1991-01-01

    Describes how marketing teachers can use trade publications to enhance the quality of and provide relevance to the marketing education curriculum. Identifies representative trade publications; suggests how to get them for classroom use and how teachers can use them. (JOW)

  6. The Supply of Trade Credit by Brazilian Publicly Traded Firms

    Directory of Open Access Journals (Sweden)

    Rafael Felipe Schiozer

    2011-12-01

    Full Text Available This paper investigates the determinants of trade credit supply by Brazilian publicly traded companies between the years of 2005 and 2008. International literature (both theoretical and empirical documents that the main determinants of trade credit supply are the size of the firm and the size of its debt. Both indicate that the availability of resources to the firm is an important factor for the supply of trade credit. In addition, the literature confirms strategic uses of trade credit such as those for price discrimination purposes. The results obtained using a sample of 157 Brazilian companies do not support that size and indebtedness are relevant determinants for trade credit supply, but they confirm the supply of trade credit as a strategic tool for the firms. Additionally we observed a significant decrease in trade credit supply in 2008, the year in which a severe international financial crisis took place.

  7. Trends in International Security and Trade (Trade Experts’ Roundtable, 2017

    Directory of Open Access Journals (Sweden)

    Elinor Sloan

    2017-08-01

    Full Text Available With so many trouble spots in the world, it can be difficult for Canadian businesses to know where to trade successfully and with some assurance of security. Canadian government organizations affiliated with Global Affairs Canada (GAC need to take a broader view of international security, rather than assessing states in isolation, if businesses are to have the vital information they need. Multinational firms typically have their own risk-management strategies, but smaller enterprises need outside help to get information on the safety and viability of potential export markets. However, none of these GAC-affiliated organizations examines the security risks inherent in the interactions between countries. While GAC focuses mainly on economics, tariffs, language barriers and other factors, the Crown corporation Export Development Canada (EDC does risk assessments of various countries to determine what level of political risk insurance it should offer to Canadian companies. The Business Development Bank, best known for its domestic work with Canadian businesses, has branched out into the foreign realm too, but only in terms of industry and market research on export assessments. Based on long-term GDP projections, some interesting forecasts have been made that will affect how and where Canadian businesses trade internationally. They will need accurate information on risk and security in order to do so. By 2030, the four largest world economies will be those of the U.S., China, India and Japan. For now, the best bets for Canadian businesses in the short to medium term include China, India and some Southeast Asian countries, although there are some accompanying dangers in these areas. Pakistan, Nigeria and Egypt have the potential to be good markets for Canadian exports, but the current risk from terrorist activity precludes foreign commercial interests. The unstable relationships between countries in the world’s hotspots need continuing assessment and

  8. Trade policy and public health.

    Science.gov (United States)

    Friel, Sharon; Hattersley, Libby; Townsend, Ruth

    2015-03-18

    Twenty-first-century trade policy is complex and affects society and population health in direct and indirect ways. Without doubt, trade policy influences the distribution of power, money, and resources between and within countries, which in turn affects the natural environment; people's daily living conditions; and the local availability, quality, affordability, and desirability of products (e.g., food, tobacco, alcohol, and health care); it also affects individuals' enjoyment of the highest attainable standard of health. In this article, we provide an overview of the modern global trade environment, illustrate the pathways between trade and health, and explore the emerging twenty-first-century trade policy landscape and its implications for health and health equity. We conclude with a call for more interdisciplinary research that embraces complexity theory and systems science as well as the political economy of health and that includes monitoring and evaluation of the impact of trade agreements on health.

  9. A secure online image trading system for untrusted cloud environments.

    Science.gov (United States)

    Munadi, Khairul; Arnia, Fitri; Syaryadhi, Mohd; Fujiyoshi, Masaaki; Kiya, Hitoshi

    2015-01-01

    In conventional image trading systems, images are usually stored unprotected on a server, rendering them vulnerable to untrusted server providers and malicious intruders. This paper proposes a conceptual image trading framework that enables secure storage and retrieval over Internet services. The process involves three parties: an image publisher, a server provider, and an image buyer. The aim is to facilitate secure storage and retrieval of original images for commercial transactions, while preventing untrusted server providers and unauthorized users from gaining access to true contents. The framework exploits the Discrete Cosine Transform (DCT) coefficients and the moment invariants of images. Original images are visually protected in the DCT domain, and stored on a repository server. Small representation of the original images, called thumbnails, are generated and made publicly accessible for browsing. When a buyer is interested in a thumbnail, he/she sends a query to retrieve the visually protected image. The thumbnails and protected images are matched using the DC component of the DCT coefficients and the moment invariant feature. After the matching process, the server returns the corresponding protected image to the buyer. However, the image remains visually protected unless a key is granted. Our target application is the online market, where publishers sell their stock images over the Internet using public cloud servers.

  10. Leveraging Trade Agreements to Meet U.S. Security Aims

    Science.gov (United States)

    2016-04-08

    President George H.W. Bush sought means to influence the policies of Latin American states more effectively. Mexico , particularly in the post-Cold War era...security goals. A review of the U.S. trade policy, and its nesting with the National Security Strategy, demonstrates how President Barack Obama’s... President Barack Obama’s strategic “pivot to Asia,” and the Trans-Pacific Partnership (TPP) trade agreement facilitate U.S. enduring national

  11. Publicly Traded Ed. Companies Are Rare

    Science.gov (United States)

    Flanigan, Robin L.

    2012-01-01

    K12 Inc., the nation's largest provider of online precollegiate education, was launched in 2000 and went public seven years later after raising about $140 million in revenue. Like other companies, it moved from being privately held to being publicly traded to raise more money quickly, increase brand awareness, and accelerate business goals. The…

  12. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  13. LEGAL SECURITY ON CELLPHONE TRADING THROUGH ELECTRONIC MEDIA IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Aan Aswari

    2017-05-01

    Full Text Available The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in performing its obligation reflect the concrete aspect. Warranty provides protection security for related parties with some governing regulations during transaction. However, some other supporting components have not been effectively contribute to balance the utilization of technology in trading. Keywords: legal security, trading, cellphone, electronic media

  14. LEGAL SECURITY ON CELLPHONE TRADING THROUGH ELECTRONIC MEDIA IN INDONESIA

    OpenAIRE

    Aan Aswari

    2017-01-01

    The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...

  15. Legal Security on Cellphone Trading Through Electronic Media in Indonesia

    OpenAIRE

    Aswari, Aan; Pasamai, Syamsudin; Qomar, Nurul; Abbas, Ilham

    2017-01-01

    The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...

  16. Contra trading in Bursa Malaysia Securities Berhad: a Sharīʿah and legal appraisal

    Directory of Open Access Journals (Sweden)

    Noor Suhaida Kasri

    2017-07-01

    Full Text Available Purpose - The purpose of this paper is to analyze the practice of contra trading in Bursa Malaysia Securities Berhad. Through a critical examination of the practice, it aims to discuss the issues from the angles of Sharīʿah and Malaysian common law. Design/methodology/approach - The paper uses a qualitative research methodology. The information on the practice of contra trading is obtained through the Bursa Malaysia Securities Berhad’s website and literature as well as series of meetings and discussions held with Bursa Malaysia Securities Berhad. In comprehending and dissecting the Sharīʿah and legal issues, classical along with contemporary Sharīʿah literature including local and international Sharīʿah advisory bodies’ resolutions and standards have been referred to. The Sharīʿah analysis of these issues is further supported by reference to the statute and by-laws of Bursa Malaysia Securities Berhad as well as other related legal literature. Findings - This paper finds that contra trading involves a real sale and purchase of shares; the shares are not taken into the possession of the contra trader, neither physically nor constructively; the liability of shares is not transferred to the contra trader; though the practice of profiting in contra trading may contradict the prohibition on profiting without bearing liability, the permissibility of contra trading could still be argued from the contextual approach of public interest (maṣlaḥah and needs (hājah; and contra trading is not gambling. Research limitations/implications - This paper is limited in its analysis to only Sharīʿah and legal perspectives. It does not cover a thorough empirical and quantitative investigation that would measure the extent of the public needs for contra trading and the real benefits that contra trading brings about to the society in the long run. Such studies will further demonstrate whether contra trading deserves a relaxation from the strict Shar

  17. 17 CFR 41.23 - Listing of security futures products for trading.

    Science.gov (United States)

    2010-04-01

    ... security futures products for trading, a designated contract market or registered derivatives transaction... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Listing of security futures products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING...

  18. US public perspectives on security

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale [Univ. of Oklahoma, Norman, OK (United States); Jenkins-Smith, Hank C. [Univ. of Oklahoma, Norman, OK (United States); Silva, Carol L. [Univ. of Oklahoma, Norman, OK (United States)

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  19. 26 CFR 1.1445-8 - Special rules regarding publicly traded partnerships, publicly traded trusts and real estate...

    Science.gov (United States)

    2010-04-01

    ... partnerships, publicly traded trusts and real estate investment trusts (REITs). 1.1445-8 Section 1.1445-8... estates upon the disposition of U.S. real property interests. Except as otherwise provided in this... Bonds § 1.1445-8 Special rules regarding publicly traded partnerships, publicly traded trusts and real...

  20. When is public enforcement of insider trading regulations effective?

    NARCIS (Netherlands)

    Wielhouwer, J.L.

    2013-01-01

    In this paper we investigate when public enforcement of insider trading regulations reduces the amount of insider trading. We model a game between a potentially self-interested regulator enforcing insider trading laws and a trader who may be trading on inside information. We show that equilibrium

  1. Managing the trade-public health linkage in defence of trade ...

    African Journals Online (AJOL)

    Managing the trade-public health linkage in defence of trade liberalisation and ... of United States-measures affecting the production and sale of clove cigarettes. ... Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad.

  2. Malaysia: Political, Security, Economic, and Trade Issues Considered

    Science.gov (United States)

    2007-02-13

    general election. Key observers have also pointed to decisions by Parti-Islam sa- Malaysia (PAS), Parti Keadilan Rakyat , and the Democratic Action Party...Sultan fulfills this function. Each state has a state legislature. The lower house of Malaysia’s Parliament, the Dewan Rakyat , has 193 members elected...Order Code RL33878 Malaysia : Political, Security, Economic, and Trade Issues Considered February 13, 2007 Bruce Vaughn, Coordinator Specialist in

  3. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  4. Securing military information systems on public infrastructure

    CSIR Research Space (South Africa)

    Botha, P

    2015-03-01

    Full Text Available to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared...

  5. 77 FR 14734 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-03-13

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... proposed agenda of a meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The... innovation in the environmental technology sector. Background: The ETTAC is mandated by Public Law 103-392...

  6. IFRS ADOPTION AND EARNINGS MANAGEMENT IN BRAZILIAN PUBLICLY TRADED COMPANIES

    Directory of Open Access Journals (Sweden)

    Roberto Midoguti Joia

    2014-03-01

    Full Text Available In 2007, Brazil adopted the International Financial Reporting Standards (IFRS. Studies involving publicly traded companies in different countries around the world indicate that these new standards tend to improve the information quality and make it more comparable and transparent. This study was aimed at verifying any changes in the earnings management levels after 2010 and whether this happened in function of the full adoption of the IFRS by the Brazilian publicly traded companies (except for financial institutions. The data were extracted from the three-monthly financial statements of the databases from Economática and the Brazilian Securities Commission for the period from 2006 till 2011. To achieve the research objectives, two tests were applied. The first showed that the average discretionary accruals, calculated through the Modified Jones Model, were lower after 2010. Next, the regression analysis was elaborated, using panel data with Newey-West’s correction. The results did not confirm the hypothesis that the adoption of the IFRS affected the earnings management level in the period under analysis, but showed that the size and indebtedness significantly explain the discretionary accruals, independently of the adoption of the IFRS. The results suggest that larger companies with a large proportion of own capital tend to produce higher quality reports, independently of the adoption of the IFRS.

  7. Discerning The Motivational Basis For Trade Unionism In Public And ...

    African Journals Online (AJOL)

    Discerning The Motivational Basis For Trade Unionism In Public And Private ... private businesses are very clear to the actors of industrial relations; those of their ... selfish interests; unions in the public sector ought to function as uplift unions, ...

  8. 17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.

    Science.gov (United States)

    2010-04-01

    ... trading in a security futures product on a designated contract market or registered derivatives...) Registered derivatives transaction execution facilities. Prior to listing a security futures product for... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Prohibition of dual trading in...

  9. Predicting Social Security numbers from public data

    OpenAIRE

    Acquisti, Alessandro; Gross, Ralph

    2009-01-01

    Information about an individual's place and date of birth can be exploited to predict his or her Social Security number (SSN). Using only publicly available information, we observed a correlation between individuals' SSNs and their birth data and found that for younger cohorts the correlation allows statistical inference of private SSNs. The inferences are made possible by the public availability of the Social Security Administration's Death Master File and the widespread accessibility of per...

  10. Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity

    DEFF Research Database (Denmark)

    Asharov, Gilad; Orlandi, Claudio

    2012-01-01

    We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...... constant probability ε. The idea behind the model is that the fear of being caught cheating will be enough of a deterrent to prevent any cheating attempt. However, in the basic covert security model, the honest parties are not able to persuade any third party (say, a judge) that a cheating occurred. We...... propose (and formally define) an extension of the model where, when an honest party detects cheating, it also receives a certificate that can be published and used to persuade other parties, without revealing any information about the honest party’s input. In addition, malicious parties cannot create fake...

  11. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  12. The modern way of trading with options such derivative securities

    Directory of Open Access Journals (Sweden)

    Dragosavac Miloš

    2013-01-01

    Full Text Available Participants in the financial markets today are faced with a number of financial risks. This raises the question, what measures and instruments should be used, to minimize the risks to the lowest extent possible. One form of protection options are. Options are derivative securities, namely financial derivatives, which can be used to protect against the risks associated with trading. The reason for the earnings at risk. It is usually used to hedge price risk, which is the word of possession and the right to sell the right to purchase certain assets at a predetermined fixed price that applies to a specific date in the future. In this way a protection against adverse price changes in the future. As their name implies, is a selection of options, where the owner decides whether the option will be exercised or not. That choice is not free, because in case of insurance premiums paid by commission from potential financial risk. Many of the securities issued by the company include the option.

  13. Privacy and security perceptions of european citizens: A test of the trade-off model

    NARCIS (Netherlands)

    Friedewald, M.; Lieshout, M. van; Rung, S.; Ooms, M.; Ypma, J.

    2015-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional “trade-off” paradigm that argues that citizens might be willing to sacrifice some privacy for more security. Academics have long argued against the trade-off paradigm, but these arguments have

  14. 75 FR 7546 - Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification...

    Science.gov (United States)

    2010-02-22

    ... DEPARTMENT OF COMMERCE Census Bureau 15 CFR Part 30 [Docket Number: 090422707-91445-02] RIN 0607-AA48 Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification... Trade Regulations (FTR) to eliminate the requirement to report a Social Security Number (SSN) as an...

  15. 75 FR 55574 - Joint Public Roundtable on Swap Execution Facilities and Security-Based Swap Execution Facilities

    Science.gov (United States)

    2010-09-13

    ...; File No. 4-612] Joint Public Roundtable on Swap Execution Facilities and Security-Based Swap Execution Facilities AGENCY: Commodity Futures Trading Commission (``CFTC'') and Securities and Exchange Commission... discuss swap execution facilities and security-based swap execution facilities in the context of certain...

  16. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  17. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for certain derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... Miscellaneous Exemptions § 240.3a12-7 Exemption for certain derivative securities traded otherwise than on a...

  18. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  19. The governance of publicly traded limited liability companies

    NARCIS (Netherlands)

    Gomtsyan, S.

    The limited liability company is not only a widespread business form for non-listed firms but also is used by listed companies. There were 20 publicly traded Delaware LLCs in September 2013. Given the policy of the Delaware legislators and courts to give a maximum effect to the principle of freedom

  20. Trade liberalization and the diet transition: a public health response.

    Science.gov (United States)

    Rayner, Geof; Hawkes, Corinna; Lang, Tim; Bello, Walden

    2006-12-01

    Trade liberalization remains at the forefront of debates around globalization, particularly around the impact on agriculture and food. These debates, which often focus on how poorer countries can 'trade their way' out of poverty, pay limited attention to dietary health, especially in the light of the WHO's Global Strategy for Diet, Physical Activity and Health (2004), which warned that future health burdens will be increasingly determined by diet-related chronic diseases. This article examines the diet transition as the absent factor within debates on liberalizing trade and commerce. We describe the evolution of trade agreements, noting those relevant to food. We review the association between trade liberalization and changes in the global dietary and disease profile. We illustrate some of the complex linkages between trade liberalization and the 'diet transition', illustrated by factors such as foreign direct investment, supermarketization and cultural change. Finally, we offer three scenarios for change, suggesting the need for more effective 'food governance' and engagement by public health advocates in policy making in the food and agriculture arena.

  1. Polish Security Printing Works in the system of public and economic security

    OpenAIRE

    Remigiusz Lewandowski

    2013-01-01

    The article raises the issue of placing PWPW in the system of economic and public security. Two particular categories of security connected with PWPW business activity, i.e. identification and transactional security, have been defined and discussed in the article. The most essential factors affecting the above security categories as well as relations between identification/transactional security and economic/public security. The article indicates that PWPW plays an important role in the state...

  2. Malaysia: Political, Security, Economic, and Trade Issues Considered

    National Research Council Canada - National Science Library

    Vaughn, Bruce; Martin, Michael

    2007-01-01

    This report discusses key aspects of the U.S.-Malaysia relationship, including economics and trade, counterterrorism cooperation, defense ties, and Malaysia's external posture as it affects Amen can interests...

  3. Supply Chain Security: U.S. Customs and Border Protection has Enhanced its Partnership with Import Trade Sectors by Challenges Remain in Verifying Security Practices

    National Research Council Canada - National Science Library

    Caldwell, Stephen L; Fossett, Christine A; Conrad, Christopher; Berbsteub, Amy; Berry, Fredrick; Camarillo, Yecenia; Cook, Frances; David, Katherine; Dye, Wendy; Gibson, Nkenge

    2008-01-01

    .... For example, between March 2005 and November 2007, CBP established requirements for C-TPAT members in nine trade sectors to meet minimum security criteria for their specific trade sector, including...

  4. A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs

    Science.gov (United States)

    Elahi, Golnaz; Yu, Eric

    In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholder interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for "good enough" security, given the competing demands from many parties. In this paper, we examine how conceptual modeling can provide explicit and systematic support for analyzing security trade-offs. After considering the desirable criteria for conceptual modeling methods, we examine several existing approaches for dealing with security trade-offs. From analyzing the limitations of existing methods, we propose an extension to the i* framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches.

  5. Trade, Development, and the Political Economy of Public Standards

    OpenAIRE

    Swinnen, Johan F.M.; Vandemoortele, Thijs

    2009-01-01

    This paper presents a political economy model of public standards in an open economy model. We use the model to derive the political optimum and to analyze different factors that have an influence on this political equilibrium. The paper discusses how the level of development influences the political equilibrium. We also analyze the relation between trade and the political equilibrium and compare this political outcome with the social optimum to identify under which cases ‘under-standardizati...

  6. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    sacrificed at the altar of soldiers' constitutional rights to form and join trade unions .... includes a rights-based culture, a rise in individualism, a change in the acceptance of ... military leadership with the military unions that poses the greatest threat to civil– ... 10 European Organisation of Military Associations, available at ...

  7. SECURITY BREACH IN TRADING SYSTEM-COUNTERMEASURE USING IPTRACEBACK

    OpenAIRE

    M. P. Rajakumar; V. Shanthi

    2014-01-01

    Recently, economic scenario is often facing security breach that has heavy impact on the financial soundness of a company particularly, stock prices on firms. The utmost consequence being the whole business comes to a standstill. From the estimates attributed by the financial sector, it has been inferred that the loss incurred on virus and worms attack is said to have the greatest impact that hampers the prosperity of a business entity. Thus, security strategies attempt on revolving around th...

  8. Satisfying the demand for financial information in public traded companies

    DEFF Research Database (Denmark)

    Holm, Claus

    A public traded company which wishes to comply with IAS standards and stock exchange requirements for full public disclosure of relevant information faces a major communication task. The Investor Relation policy of such a company has to satisfy a demand for financial information which seems...... line focus to the disclosure of cash flow surrogates like EBITA and EBITDA. Overall, the findings suggest a communication strategy intended to satisfy the demand from the professional analysts. However, the shear number of different key figures and financial ratios identified in the study suggest...

  9. 76 FR 77776 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-12-14

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  10. 76 FR 51001 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-08-17

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  11. 76 FR 26247 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-05-06

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401 Constitution Ave, NW...

  12. 78 FR 46921 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-08-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Hinman, Office of Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053...

  13. 77 FR 58356 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-09-20

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  14. 78 FR 4834 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-01-23

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  15. Supplemental Security Income Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The SSI Public-Use Microdata File contains an extract of data fields from SSA's Supplemental Security Record file and consists of a 5 percent random, representative...

  16. Volatilities, Traded Volumes, and Price Increments in Derivative Securities

    Science.gov (United States)

    Kim, Kyungsik; Lim, Gyuchang; Kim, Soo Yong; Scalas, Enrico

    2007-03-01

    We apply the detrended fluctuation analysis (DFA) to the statistics of the Korean treasury bond (KTB) futures from which the logarithmic increments, volatilities, and traded volumes are estimated over a specific time lag. For our case, the logarithmic increment of futures prices has no long-memory property, while the volatility and the traded volume exhibit the existence of long-memory property. To analyze and calculate whether the volatility clustering is due to the inherent higher-order correlation not detected by applying directly the DFA to logarithmic increments of the KTB futures, it is of importance to shuffle the original tick data of futures prices and to generate the geometric Brownian random walk with the same mean and standard deviation. It is really shown from comparing the three tick data that the higher-order correlation inherent in logarithmic increments makes the volatility clustering. Particularly, the result of the DFA on volatilities and traded volumes may be supported the hypothesis of price changes.

  17. Global maize trade and food security: implications from a social network model.

    Science.gov (United States)

    Wu, Felicia; Guclu, Hasan

    2013-12-01

    In this study, we developed a social network model of the global trade of maize: one of the most important food, feed, and industrial crops worldwide, and critical to food security. We used this model to analyze patterns of maize trade among nations, and to determine where vulnerabilities in food security might arise if maize availability was decreased due to factors such as diversion to nonfood uses, climatic factors, or plant diseases. Using data on imports and exports from the U.N. Commodity Trade Statistics Database for each year from 2000 to 2009 inclusive, we summarized statistics on volumes of maize trade between pairs of nations for 217 nations. There is evidence of market segregation among clusters of nations; with three prominent clusters representing Europe, Brazil and Argentina, and the United States. The United States is by far the largest exporter of maize worldwide, whereas Japan and the Republic of Korea are the largest maize importers. In particular, the star-shaped cluster of the network that represents U.S. maize trade to other nations indicates the potential for food security risks because of the lack of trade these other nations conduct with other maize exporters. If a scenario arose in which U.S. maize could not be exported in as large quantities, maize supplies in many nations could be jeopardized. We discuss this in the context of recent maize ethanol production and its attendant impacts on food prices elsewhere worldwide. © 2013 Society for Risk Analysis.

  18. National security and the constitutional right to join military trade ...

    African Journals Online (AJOL)

    The unionisation of the South African Military Forces has tested both lawyers and the South African legal system. However, there is very little academic commentary on this important subject. In this article, the policy, which allowed the unionisation of the South African military, the influence of the policy on national security, ...

  19. Leveraging Trade Agreements to Meet U.S. Security Aims

    Science.gov (United States)

    2016-04-08

    market , accounting for $24.9 billion in exports . An estimated 800,000 U.S. jobs are tied to trade with China .6 President Nixon’s 1972 goal of bringing...pursued a foreign policy initiative referred to as the “North American Accord,” explaining, A developing closeness among Canada, Mexico , and the United...framework to facilitate better cooperation with their powerful southern neighbor.9 Reagan’s North American Accord with Mexico took longer to evolve

  20. 40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.

    Science.gov (United States)

    2010-07-01

    ... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...

  1. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... members of national securities exchanges. 240.19c-3 Section 240.19c-3 Commodity and Securities Exchanges... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of each national securities exchange shall provide as follows: (a) No rule, stated policy or practice of...

  2. 17 CFR 240.3a12-8 - Exemption for designated foreign government securities for purposes of futures trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for designated foreign government securities for purposes of futures trading. 240.3a12-8 Section 240.3a12-8 Commodity and... trading. (a) When used in this Rule, the following terms shall have the meaning indicated: (1) The term...

  3. 78 FR 21909 - Environmental Technologies Trade Advisory Committee; Public Meeting

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference....S. exports of environmental technologies, goods, services, and products. The ETTAC was originally...

  4. 77 FR 35941 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-06-15

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... promotion programs; and issues related to innovation in the environmental technology sector. Background: The...

  5. 78 FR 21911 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... review the role of the U.S. government in supporting the early adoption of environmental technologies and...

  6. 76 FR 66912 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference... expand U.S. exports of environmental technologies, goods, services, and products. The ETTAC was...

  7. 77 FR 6064 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-02-07

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference... administration of programs to expand U.S. exports of environmental technologies, goods, services, and products...

  8. Economic growth: trade, public finance, and the paradox of thrift

    OpenAIRE

    John Smithin

    2014-01-01

    The classical argument for free trade stressed the possibilities of economic growth by exploiting the gains from trade. A trade surplus per se was not the main objective; presumably the argument was that trade would be balanced at the new higher growth rate. Moreover, the arguments for free trade were made against the background of an assumed hard peg (the gold standard) which would enforce balance of payments equilibrium. This means that contemporary free trade agreements (FTAs), with floati...

  9. Secure public cloud platform for medical images sharing.

    Science.gov (United States)

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  10. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  11. Surveying Public Attitudes of Security Sector Reforms in the Arab ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The notion that the security sector's primary responsibility is to protect and preserve autocratic Arab regimes is widely discredited today. ... of public opinion in security sector reform by providing evidence-based information on public perceptions, and in so doing, encouraging civilian oversight and transparency in the sector.

  12. International trade versus public health during the FCTC negotiations, 1999-2003.

    Science.gov (United States)

    Mamudu, Hadii M; Hammond, Ross; Glantz, Stanton A

    2011-01-01

    To examine why the Framework Convention on Tobacco Control did not include an explicit trade provision and delineate the central arguments in the debate over trade provision during the negotiations. Triangulate interviews with participants in the FCTC negotiations, the FCTC negotiations documents, and tobacco industry documents. An explicit FCTC trade provision on relation between international trade and public health became a contentious issue during the negotiations. As a result, two conflicting positions, health-over-trade and opposition to health-over-trade emerged. Opposition to explicit trade language giving health priority was by both tobacco industry and countries that generally supported strong FCTC provisions because of concerns over 'disguised protectionism' and setting a precedent whereby governments could forfeit their obligations under pre-existing treaties. Owing to lack of consensus among political actors involved in the negotiations, a compromise position eliminating any mention of trade emerged, which was predicated on belief among some in the public health community that public health would prevail in future trade versus health conflicts. The absence of an explicit FCTC trade provision was due to a political compromise rather than the impact of international trade agreements and decisions on public health and lack of consensus among health advocates. This failure to include an explicit trade provision in the FCTC suggests that the public health community should become more involved in trade and health issues at all levels of governance and press the FCTC Conference of the Parties for clarification of this critical issue.

  13. 31 CFR 357.10 - Laws governing a Treasury book-entry security, TRADES, and security interests or entitlements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Laws governing a Treasury book-entry... PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY TREASURY BONDS, NOTES AND BILLS HELD IN LEGACY TREASURY DIRECT Treasury/Reserve Automated Debt Entry System (TRADES) § 357.10 Laws governing a Treasury book...

  14. A tainted trade? Moral ambivalence and legitimation work in the private security industry.

    Science.gov (United States)

    Thumala, Angélica; Goold, Benjamin; Loader, Ian

    2011-06-01

    The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. © London School of Economics and Political Science 2011.

  15. 76 FR 1101 - Property Traded on an Established Market

    Science.gov (United States)

    2011-01-07

    ... Property Traded on an Established Market AGENCY: Internal Revenue Service (IRS), Treasury. ACTION: Notice... regulations relating to determining when property is traded on an established market (that is, publicly traded... traded on an established securities market (often referred to as ``publicly traded''), the issue price of...

  16. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    Energy Technology Data Exchange (ETDEWEB)

    Koech, H K [Program Manager CBP/DHS Office Number 363-6109 Cell Number 0722-774-912, Office Location: Ground Floor U.S. Embassy Nairobi (Kenya)

    2010-07-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  17. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Koech, H.K.

    2010-01-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  18. 17 CFR 249.820 - Form 19b-4(e) for the listing and trading of new derivative securities products by self...

    Science.gov (United States)

    2010-04-01

    ... and trading of new derivative securities products by self-regulatory organizations that are not deemed... listing and trading of new derivative securities products by self-regulatory organizations that are not... self-regulatory organization's listing and trading of a new derivative securities product that is not...

  19. Predicting financial distress in publicly-traded companies

    Directory of Open Access Journals (Sweden)

    Felipe Fontaine Rezende

    2017-07-01

    Full Text Available ABSTRACT Several models for forecasting bankruptcy have been developed over the years, one of the reasons for which is the important part it plays in decision-making. However, forecasting a company’s bankruptcy leaves a very short time for stakeholders to change the situation. It is in this context that this paper arises in order to develop a model for predicting financial distress, which is identified as a step prior to bankruptcy. The predictive model uses the logistic regression technique with panel data and a sample of Brazilian publicly-traded companies with shares listed on the São Paulo Stock, Commodities, and Futures Exchange between 2001 and 2014. As well as financial variables, the final model includes market expectations (macroeconomic and sector variables. These variables are statistically tested and the hypothesis is confirmed that they improve the accuracy of the model. The research identified the existence of financial distress in 96% of the companies that went bankrupt. In addition, the relationship between the phenomena of bankruptcy and financial distress is verified, using financial and macroeconomic explanatory variables. The results demonstrate that most (83% of the explanatory variables in the model for predicting bankruptcy are also present in the model for predicting the phenomenon of financial distress. The expected gross domestic product variables and the quick ratio, asset turnover, and net equity over total liabilities financial variables are statistically significant in predicting both phenomena. With this evidence, the study suggests the use of the concept of financial distress as a stage prior to bankruptcy and provides a model for predicting financial distress with 89% accuracy when applied to publicly-traded companies in Brazil in the period examined.

  20. The nature of the derivative market transactions traded in the Johannesburg securities exchange

    Directory of Open Access Journals (Sweden)

    Tankiso Moloi

    2014-10-01

    Full Text Available The main objective of the study was to assess and understand the nature of derivative products traded in the Johannesburg Securities Exchange (JSE by analysing daily transactions consisting of deals and contracts concluded, as well as notional values of derivatives traded in the review period. Analysed data found that the South African derivative market continues to grow and evolve with the consistent introduction of new derivative products such as the “can do” derivatives, IDX derivatives that are now being traded at the JSE. The evolvement and growth is confirmed by the fact that the total derivative deals in the JSE has also grown by 16.6% (CAGR from 2006. The study further found that the equity index remains the largest derivative for both options and futures

  1. Trade and commerce in improved crops and food: an essay on food security.

    Science.gov (United States)

    Kershen, Drew L

    2010-11-30

    Agricultural trade between nations is a significant proportion of total international trade. Agricultural trade in transgenic crops faces extra complications due to the existence of domestic and international regimes that focus specifically on agricultural biotechnology. These specialized regimes create legal and commercial challenges for trade in transgenic crops that have significant implications for the food security of the nations of the world. By food security, one should understand not just the available supply of food, but also the quality of the food and the environmental impact of agricultural production systems. These specialized regimes for transgenic crops can either encourage or hinder the adoption of agricultural biotechnology as a sustainable intensive agriculture. Sustainable intensive agriculture offers hope for agronomic improvements for agricultural production, socio-economic betterment for farmers and environmental benefits for societies. Sustainable intensive agriculture offers particular hope for the poorest farmers of the world because agricultural biotechnology is a technology in the seed. Copyright © 2010 Elsevier B.V. All rights reserved.

  2. The Battle to Secure Our Public Access Computers

    Science.gov (United States)

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  3. Unbelievable security : Matching AES using public key systems

    NARCIS (Netherlands)

    Lenstra, A.K.; Boyd, C.

    2001-01-01

    The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching public key sizes for RSA and the ElGamal family of protocols. For the latter both traditional multiplicative groups of finite

  4. Palestinian Security Sector Reform : the View of the Public | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    PSR will consult with various stakeholders - the Ministry of the Interior, the security services, the judiciary, members of Parliament, human rights organizations and international donors - in extensive surveys of the public's perception of the security sector in all its dimensions, including capacity, mission, performance, service ...

  5. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  6. Water security in South Africa: perceptions on public expectations ...

    African Journals Online (AJOL)

    Water security in South Africa: perceptions on public expectations and municipal ... will in government, a need to restore citizen trust in government intention and capability ... services, and a failure to up-scale existing water re-use technology.

  7. Integrating Local Public Health Agencies into the Homeland Security Community

    National Research Council Canada - National Science Library

    Reed, Patricia D

    2007-01-01

    After more than seven years of funding through The Centers for Disease Control and Prevention, local public health agencies have made inconsistent progress in fulfilling their Homeland Security objectives...

  8. Exploring public perceptions of energy security risks in the UK

    International Nuclear Information System (INIS)

    Demski, Christina; Poortinga, Wouter; Pidgeon, Nick

    2014-01-01

    Along with climate change and affordability, concerns about energy security are key drivers behind proposals for major energy system change in the UK and numerous other countries. Unlike climate change we know very little about how the public thinks and feels about this aspect of sustainability and energy policy. Beyond engaging critically with conceptual and theoretical discussions, empirical data from two surveys (Cardiff postal survey, N=520; online UK survey, N=499) using a ten item energy security scale are presented and discussed. Here we show that aspects of energy security are certainly of concern to the UK public, with particularly high concern around dependence on fossil fuels/imports and relatively lower expressed concern for actual disruption of energy supply. However public concerns around energy security are only emerging, and likely to change depending on the context in which it is discussed (e.g. in comparison to climate change). In addition, findings from public interviews are used to further contextualise the survey findings, showing unfamiliarity among the UK public with regards to the term “energy security”. We discuss implications, and further work that would be useful for understanding public perceptions in more depth. - highlights: • Exploring public views on energy security using a 10 item scale. • Concerns over energy security is relatively high but susceptible to framing. • Patterns of concern for different energy security aspects examined. • The term energy security is unfamiliar, only an emerging concern among UK publics. • Further discussion on the meanings and implications of these perceptions

  9. The significance of interconnector counter-trading in a security constrained electricity market

    International Nuclear Information System (INIS)

    Higgins, P.; Li, K.; Devlin, J.; Foley, A.M.

    2015-01-01

    Throughout the European Union there is an increasing amount of wind generation being dispatched-down due to the binding of power system operating constraints from high levels of wind generation. This paper examines the impact a system non-synchronous penetration limit has on the dispatch-down of wind and quantifies the significance of interconnector counter-trading to the priority dispatching of wind power. A fully coupled economic dispatch and security constrained unit commitment model of the Single Electricity Market of the Republic of Ireland and Northern Ireland and the British Electricity Trading and Transmission Arrangement was used in this study. The key finding was interconnector counter-trading reduces the impact the system non-synchronous penetration limit has on the dispatch-down of wind. The capability to counter-trade on the interconnectors and an increase in system non-synchronous penetration limit from 50% to 55% reduces the dispatch-down of wind by 311 GW h and decreases total electricity payments to the consumer by €1.72/MW h. In terms of the European Union electricity market integration, the results show the importance of developing individual electricity markets that allow system operators to counter-trade on interconnectors to ensure the priority dispatch of the increasing levels of wind generation. - Highlights: • Interconnector counter-trading reduces the system marginal price in the SEM. • Dispatch-down of wind power is reduced due to interconnector counter-trading. • A 5% increase in the SNSP limit can reduce wind power dispatched-down by 50%. • An increase in the SNSP limit and installed wind capacity reduces the SMP.

  10. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting... Analysis Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th...

  11. Relative Pricing of Publicly Traded U.S. Electric Utility Companies

    Science.gov (United States)

    Jewczyn, Nicholas Stephen

    In the financial turmoil of 2008, U.S. firms reported debt-ratios that differed from the debt-ratios calculated from balance sheets. The problem is that investors bought common stock expecting initial investment return and lost money when companies delisted. The purpose of this quantitative study was to determine sample securities pricing with the application of synthetic assets and debt accrued. Addressed in the research questions was whether those securities were (a) underpriced compared with return-on-assets (ROA), (b) overpriced compared with ROA, (c) a debt-ratio higher than 60% and also overpriced, (d) underpriced with a synthetic asset added, or (e) related by relative pricing to variant pricing and market capitalization. The study's base theory was Pan's efficient market hypothesis (EMH) of security price prediction of market prices versus model prices. The data from the financial statements of 16 publicly traded U.S. electric utility companies were analyzed via correlations and multiple regression analyses to determine securities pricing and suitability. The findings from the analyses of the sample's variables of market price, book value, market-to-book, and study constructed variables from those variable data were statistically significant. The alternate hypotheses were accepted for all 5 research questions since the analytical operationalization of the hypothetical constructs led to significant relationships. Results suggest that the use of more pricing determinants in securities evaluation may lead to investors losing less money and earning the expected returns for a more efficient capital market, leading to a stronger economy and macroeconomic stability.

  12. Market Reactions to Publicly Announced Privacy and Security Breaches Suffered by Companies Listed on the United States Stock Exchanges: A Comparative Empirical Investigation

    Science.gov (United States)

    Coronado, Adolfo S.

    2012-01-01

    Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.…

  13. Determinants of Audit fees by Brazilian Companies Publicly Traded

    Directory of Open Access Journals (Sweden)

    Victor Placeres Borges

    2017-08-01

    Full Text Available The studies on the determinants of audit fees in Brazil became possible with the mandatory disclosure of audit expenses in 2009. Thus, the objective of this research was to identify the determinants of the fees paid by Brazilian publicly traded companies to independent auditors in 2010 to 2014. The analysis took place through regression with data arranged in panel. Size, performance, complexity, audit firm size, adoption of corporate governance practices, audit rotation, industry and litigation risks have all been found to have an impact on the fees. Therefore, the aspects that can be used by companies for the purpose of information management or that require more auditing timefor signaling points of greater risks are highlighted. In addition, understanding the determinants allows companies to plan future expenditures with audit fees and assists regulators and inspectors in defining and comparing key determinants of firms for identifying abnormal payments. These results complement the research in Brazil, Australia, Bangladesh, Norway, Bahrain, England, Jordan, Kuwait, USA, Malaysia, Nigeria, Abu Dhabi, Italy and Indonesia.

  14. Draft Public Health Statement on the U.S.-Central American Free Trade Agreement (CAFTA).

    Science.gov (United States)

    2004-01-01

    The U.S. is rapidly negotiating a raft of new regional and bilateral trade agreements. The most recent agreement, with Central America, [was to] come before Congress for a vote as soon as late May. There is growing concern that international trade agreements threaten health care and the health of communities. . . . The Draft Public Health Statement on the U.S.-Central American Free Trade Agreement (CAFTA), developed by CPATH which planned a campaign around the issues, analyzes key provisions from the perspective of public health and suggests reframing the trade debate in terms of health.

  15. Self-Sufficiency versus Security: How Trade Protectionism Challenges the Sustainability of the Food Supply in Russia

    Directory of Open Access Journals (Sweden)

    Vasilii Erokhin

    2017-10-01

    Full Text Available Food security is increasingly influenced by multilateral trade systems and foreign trade policies implemented by national governments. Many of them are now concerned about the sustainability of food supply and the vulnerability of domestic food markets to price volatility, and seek to support domestic producers and protect themselves from increasing food imports. Such restrictions improve food self-sufficiency, but decrease food security. It is important to understand any changes that may have occurred in the food consumption pattern due to trade protectionism and to observe any nutritional implications of these changes. This paper employs the rational food security (RFS assessment approach, which differentiates sources of food supply on the domestic market, assesses the influence of agricultural and trade frameworks on food consumption patterns, and complies consumption with the appropriate food intake threshold. In the case of Russia, the study demonstrates that the conventional consumption approach to self-sufficiency (FSCA underestimates the food insecurity level by not accounting for nutrition factors. In addition, the gap between the FSCA and the RFS increases in times of protectionist trade policy and decreases when the agricultural and trade policy framework turns to liberalization. The paper concludes that trade protectionism challenges the sustainability of food supply by decreasing food availability and quality of food products, causes dietary changes, and threatens the food security of the country.

  16. Trade and health: how World Trade Organization (WTO) law affects alcohol and public health.

    Science.gov (United States)

    Baumberg, Ben; Anderson, Peter

    2008-12-01

    The alcohol field is becoming more aware of the consequences of world trade law for alcohol policies. However, there is a need for greater clarity about the different effects of trade on alcohol-related harm. A comprehensive review of all literature on alcohol and world trade [including World Trade Organization (WTO) disputes on alcohol], supported by a more selective review of other relevant cases, academic reports and the grey literature on trade and health. The burden of WTO law on alcohol policies depends upon the type of policy in question. Purely protectionist policies are likely to be struck down, which may lead to increases in alcohol-related harm. Partly protectionist and partly health-motivated policies are also at risk of being struck down. However, purely health-motivated policies are likely to be defended by the WTO-and to the extent that policy makers misunderstand this, they are needlessly avoiding effective ways of reducing alcohol-related harm. WTO agreements contain genuine and substantial risks to alcohol policies, and various ways of minimizing future risks are suggested. However, the 'chilling effect' of mistakenly overestimating these constraints should be avoided. Health policy makers should decide on which policies to pursue based primarily on considerations of effectiveness, ethics and politics rather than legality. As long as any effect of these policies on trade is minimized, they are overwhelmingly likely to win any challenges at the WTO.

  17. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  18. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  19. The Role of the Press in Public Security

    Directory of Open Access Journals (Sweden)

    Robson Sávio Reis Souza

    2007-06-01

    Full Text Available The sensational increase in violent criminality in recent years has placed the question of public security on the social agenda. Formerly a matter restricted to a few actors, now the topic of public security has become the center of discussion in an affl icted society in the midst of a notorious increase in violence and criminality. The result of the referendum on the prohibition of the sale of fi rearms and ammunition amplifi ed an obvious popular clamor demanding consistent, lasting and clear measures in the combating and prevention of crime. The media, perceiving the importance of this historic moment (and mainly the power to vocalize this demand of the middle class – their major consumer – has deepened the discussion on this issue, organizing in an increasingly more constant way coverage of public security.

  20. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal.... Postal Service Mail to Jeffery Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security...

  1. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal..., Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445...

  2. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau, Federal Communications...

  3. The controversy over free trade: the gap between economists and the general public

    OpenAIRE

    Cletus C. Coughlin

    2002-01-01

    Despite economists’ nearly universal support of free trade, the general public in the United States has serious reservations about it. In this article, Cletus C. Coughlin examines the reasons for this difference of opinion and the primary suggestions for bridging this gap.> Economists stress that free trade allows and, in fact, forces a nation to maximize the (net) value of the goods and services produced within its borders. Similarly, free trade allows consumers to maximize the net benefits ...

  4. Do Managers Trade on Public or Private Information? : Evidence from Fundamental Valuations

    NARCIS (Netherlands)

    D. Veenman (David)

    2012-01-01

    textabstractUsing accounting-based (residual income) valuations, this study examines the extent to which abnormal returns after insider share trades are explained by private information versus mispricing of public information. For a sample of insider trades in the Netherlands (1999- 2008), I find

  5. Do Managers Trade on Public or Private Information? Evidence from Fundamental Valuations

    NARCIS (Netherlands)

    Veenman, D.

    2013-01-01

    Using accounting-based (residual income) valuations, this study examines the extent to which abnormal returns after insider share trades are explained by private information versus mispricing of public information. For a sample of insider trades in the Netherlands (1999–2008), I find that managers'

  6. Effects of cross-border power trade between Laos and Thailand: Energy security and environmental implications

    International Nuclear Information System (INIS)

    Watcharejyothin, Mayurachat; Shrestha, Ram M.

    2009-01-01

    This paper analyzed the effects of hydropower development in Laos and power trade between Laos and Thailand on economy wide, energy resource mix, power generation capacity mix, energy system cost, environment, as well as, energy security. A MARKAL-based model for an integrated energy system of Laos and Thailand was developed to assess the effects of energy resource development and trade to meet the national energy demands of the two countries. Two national MARKAL-based energy system models of Laos and Thailand were formulated for the study. The results show that 80% exploitation of water resource in Laos would induce power trade between the countries. The integrated energy system cost is found to decrease marginally but it would mitigate the CO 2 emission by 2% when compared with the base case. Thailand is expected to gain benefit from the increased level of power imported from Laos in terms of the lower energy system cost, better environmental quality and, greater diversification of energy sources. As compared to the base case, Laos would become the net energy exporter, earn significant export revenue, and improve the increase in revenue of energy export per increase in total energy system cost from the maximum exploitation of hydropower resource.

  7. Health security as a public health concept: a critical analysis.

    Science.gov (United States)

    Aldis, William

    2008-11-01

    There is growing acceptance of the concept of health security. However, there are various and incompatible definitions, incomplete elaboration of the concept of health security in public health operational terms, and insufficient reconciliation of the health security concept with community-based primary health care. More important, there are major differences in understanding and use of the concept in different settings. Policymakers in industrialized countries emphasize protection of their populations especially against external threats, for example terrorism and pandemics; while health workers and policymakers in developing countries and within the United Nations system understand the term in a broader public health context. Indeed, the concept is used inconsistently within the UN agencies themselves, for example the World Health Organization's restrictive use of the term 'global health security'. Divergent understandings of 'health security' by WHO's member states, coupled with fears of hidden national security agendas, are leading to a breakdown of mechanisms for global cooperation such as the International Health Regulations. Some developing countries are beginning to doubt that internationally shared health surveillance data is used in their best interests. Resolution of these incompatible understandings is a global priority.

  8. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  9. 78 FR 77200 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel AFFAIR; Invitation for Public...

    Science.gov (United States)

    2013-12-20

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD-2013-0151] Requested Administrative Waiver of the Coastwise Trade Laws: Vessel AFFAIR; Invitation for Public Comments AGENCY: Maritime... AFFAIR is: Intended Commercial Use of Vessel: ``Charter Fishing (sport) & sightseeing tours.'' Geographic...

  10. Trade and public health: the WTO, tobacco, alcohol, and diet

    National Research Council Canada - National Science Library

    McGrady, Benn

    2011-01-01

    .... This book examines the extent to which the law of the World Trade Organization restricts domestic implementation of these types of measures. The relationship between international health instruments and the WTO Agreement is examined, as are the WTO covered agreements themselves"--

  11. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY... Fullano, Associate Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission...

  12. Multilateral trade liberalization and public goods provision in a North-South trade model with nonhomothetic preferences

    OpenAIRE

    Stibora, J.J.; Vaal, A. de

    2012-01-01

    Under nonhomothetic preferences developing countries are less likely to gain from multilateral trade liberalization than developed countries. This paper shows that this relative disadvantage for developing countries changes when the effects on public good provision are taken into account. The impact it has depends on the strength of their comparative advantage in export markets. We show that a strong (weak) comparative advantage in export markets mitigates (reinforces) the relative disadvanta...

  13. The development of renewable energies and supply security: A trade-off analysis

    International Nuclear Information System (INIS)

    Röpke, Luise

    2013-01-01

    This paper analyzes the effects of the green transformation on the German electricity sector with respect to the energy-political triangle. It focuses on how the development of renewable energies will affect security of electricity supply. In a cost–benefit analysis, the value of supply security is compared with its costs of provision. More specifically, the benefits of maintaining the present quality of electricity supply are the avoided social damages from electricity outages and are compared with the respective investment costs in the low- and medium-voltage distribution grid. It is shown that the transformation process towards a green and decentralized production structure will be costly for society, even though the costs can be reduced by different measures. - Highlights: • The effects of the transformation on the German electricity sector are analyzed. • The paper focuses on the trade-off between green energies and supply security. • The benefits of maintaining supply quality are compared with the investment costs. • The costs of maintaining supply quality by far exceed the induced welfare gains. • A strong focus on renewable energies endangers different energy-political goals

  14. Security in Brazilian Universities: Compared Prospects of Public Institutions

    Directory of Open Access Journals (Sweden)

    Christiane de Holanda Camilo

    2016-12-01

    Full Text Available This article is a presentation of preliminary results of the data collected in the "Research Project Violence, Conflict and Crime: Subsidies for the Formulation of UFG Security Policy" held between 2014-2015. The objective is to analyze policies to prevent violence in universities. The methodology used was an exploratory and documental research and are based public information available on institutional websites. The five universities surveyed were: UFSC, USP, UFMT, UFMG and UNILA. The results allowed certain approximation and divergence on the concepts of security on campuses, as the statistical record and the presence of military police at the university.

  15. Human Security and Energy Security: A Sustainable Energy System as a Public Good

    NARCIS (Netherlands)

    Karlsson-Vinkhuyzen, S.I.S.E.; Jollands, N.

    2013-01-01

    This chapter is dedicated to the concept of human security and its link to energy and energy governance, particularly global energy governance. Through this focus emerges the need to look at the links between the concept of public goods and energy. Our starting argument is that conventional notions

  16. Optimal Initial Public O¤ering design with aftermarket trading.

    OpenAIRE

    Fabrice Rousseau; Sarah Parlane

    2009-01-01

    We characterize the optimal pricing and allocation of shares in the presence of distinct adverse selection problems. Some investors have private information at the time of the IPO and sell their shares in the after-market upon facing liquidity needs. Others learn their private interest in the after-market, and sell their shares strategically. The optimal mechanism trades-o¤ informational rents and rents to strategic traders. Flipping facilitates truthful information revelation. When liquidity...

  17. Enhancing U.S. National Security: The Case for Hemispheric Free Trade

    Science.gov (United States)

    1992-04-15

    and trade and relations with the hemisphere. Part III takes a closer look at the President’s free trade proposal, examining the pros and cons . In Part...objectives? We turn to this question next. FREE TRADE AREAS: PROS AND CONS A free trade area (FTA) can be said to expand economic well- being if it...Riahts Concerns Those who oppose hemispheric free trade on human rights grounds argue that free trade will engender sweatshop conditions in the lower

  18. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its third meeting on October...

  19. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Security, Reliability, and Interoperability Council (CSRIC III) scheduled for December 5, 2012, at Federal...

  20. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its fourth meeting on...

  1. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    Science.gov (United States)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  2. 77 FR 4853 - Onyx Service & Solutions, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-01-31

    ... Suspension of Trading January 27, 2012. It appears to the Securities and Exchange Commission that there is a... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  3. 77 FR 16112 - Eugene Science, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-03-19

    ... Trading March 15, 2012. It appears to the Securities and Exchange Commission that there is a lack of... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  4. 76 FR 12144 - Advanced Optics Electronics, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2011-03-04

    ... Suspension of Trading March 2, 2011. It appears to the Securities and Exchange Commission that there is a... the opinion that the public interest and the protection of investors require a suspension of trading... Securities Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for...

  5. 77 FR 16113 - ASP Ventures Corp., Order of Suspension of Trading

    Science.gov (United States)

    2012-03-19

    ... Trading March 15, 2012. It appears to the Securities and Exchange Commission that there is a lack of... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  6. 78 FR 65744 - Newtech Resources Ltd., Order of Suspension of Trading

    Science.gov (United States)

    2013-11-01

    ... Trading October 21, 2013. It appears to the Securities and Exchange Commission that there is a lack of... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  7. 77 FR 58424 - Enwin Resources, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-09-20

    ... Trading September 18, 2012. It appears to the Securities and Exchange Commission that there is a lack of... the public interest and the protection of investors require a suspension of trading in the securities... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  8. 78 FR 33142 - Lanbo Financial Group, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-06-03

    ... Suspension of Trading May 30, 2013. It appears to the Securities and Exchange Commission that there is a lack... the opinion that the public interest and the protection of investors require a suspension of trading... the Securities Exchange Act of 1934, that trading in the securities of the above-listed company is...

  9. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    Science.gov (United States)

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  10. Opportunities for public aquariums to increase the sustainability of the aquatic animal trade.

    Science.gov (United States)

    Tlusty, Michael F; Rhyne, Andrew L; Kaufman, Les; Hutchins, Michael; Reid, Gordon McGregor; Andrews, Chris; Boyle, Paul; Hemdal, Jay; McGilvray, Frazer; Dowd, Scott

    2013-01-01

    The global aquatic pet trade encompasses a wide diversity of freshwater and marine organisms. While relying on a continual supply of healthy, vibrant aquatic animals, few sustainability initiatives exist within this sector. Public aquariums overlap this industry by acquiring many of the same species through the same sources. End users are also similar, as many aquarium visitors are home aquarists. Here we posit that this overlap with the pet trade gives aquariums significant opportunity to increase the sustainability of the trade in aquarium fishes and invertebrates. Improving the sustainability ethos and practices of the aquatic pet trade can carry a conservation benefit in terms of less waste, and protection of intact functioning ecosystems, at the same time as maintaining its economic and educational benefits and impacts. The relationship would also move forward the goal of public aquariums to advance aquatic conservation in a broad sense. For example, many public aquariums in North America have been instrumental in working with the seafood industry to enact positive change toward increased sustainability. The actions include being good consumers themselves, providing technical knowledge, and providing educational and outreach opportunities. These same opportunities exist for public aquariums to partner with the ornamental fish trade, which will serve to improve business, create new, more ethical and more dependable sources of aquatic animals for public aquariums, and perhaps most important, possibly transform the home aquarium industry from a threat, into a positive force for aquatic conservation. © 2012 Wiley Periodicals, Inc.

  11. Public perspectives on nuclear security. US national security surveys, 1993--1997

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  12. 75 FR 29988 - Civil Nuclear Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2010-05-28

    ..., treaties and regulations, advocacy, and talent and education. Public Participation: The meeting will be... Secretary for Manufacturing, Acting. [FR Doc. 2010-12814 Filed 5-27-10; 8:45 am] BILLING CODE 3510-DR-P ...

  13. BASES OF PUBLIC POLICY FORMATION DIRECTED AT ENSURING BUDGET SECURITY

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2015-03-01

    Full Text Available In the article the priorities and public policies that can improve the safety level of the budget of Ukraine have been grounded. Attention on the problems of imbalance and deficiency trends accumulation of public debt has been focused. The detailed analysis of the budget deficit of the European community to further research the main problems of fiscal security has been carried out. The formation of the concept of budget policy should include long-term and medium-term priorities of the state priorities areas have been concluded. Budget policy on public debt must deal with interrelated issues of debt bondage and effective use of public credit, promote economic growth with respect safe level and structure of public debt have been emphasized by author. Debt policy as part of fiscal policy under certain conditions can be a powerful tool to intensify investment and innovation processes in society, promote economic and social development. The reorientation of fiscal policy to address current problems through debt and use it as the basis of investment and innovation development provides an effective public debt management is designed to reduce state budget expenditures on its servicing and repayment, optimizing the scope and structure of debt according to economic growth. The role of debt policy in modern terms increases is clearly subordinate to and consistent with long-term goals and priorities of fiscal policy. There is an urgent development and implementation of effective mechanisms for investing borrowed resources, increasing the efficiency of public investment, including the improvement of organizational, financial, legal and controls. Strategically budget security guarantees only competitive economy, which can be constructed only by recovery and accelerated development of promising sectors of the national economy in the presence of a balanced budget policy. Now there is a tendency to implement only measures to stabilize the political and socio

  14. Examination of the effects of public spending and trade policy on real exchange rate in Cameroon

    Directory of Open Access Journals (Sweden)

    Victalice Ngimanang ACHAMOH

    2015-11-01

    Full Text Available The study adopts the inter-temporal model of Rodríguez (1989 and Edward (1989 extended in Elbadawi and Soto (1997 to empirically examine the effect of public expenditure and trade openness on the real exchange rate using Cameroon data from 1977 to 2010. After exploring some issues on exchange rate and reviewing the relevant literature, the study employs residual based-cointegration technique. All the variables were stationary at level form or first differences. Public spending significantly appreciates the real exchange likewise the trade openness variable in the longrun. The results of the study suggests that appreciation of real exchange rate could be prevented by contracting public spending or adopting restrictive trade measures especially in the long run.

  15. 77 FR 13294 - Announcing Approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure...

    Science.gov (United States)

    2012-03-06

    ...-02] Announcing Approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure... approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure Hash Standard (SHS... Federal Information Processing Standard (FIPS) Publication 180-4, Secure Hash Standard (SHS). FIPS 180-4...

  16. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory..., Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW., Room..., Public Safety and Homeland Security Bureau. [FR Doc. 2011-4398 Filed 2-25-11; 8:45 am] BILLING CODE 6712...

  17. 17 CFR 230.139a - Publications by brokers or dealers distributing asset-backed securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Publications by brokers or... Publications by brokers or dealers distributing asset-backed securities. The publication or distribution by a broker or dealer of information, an opinion or a recommendation with respect to asset-backed securities...

  18. 26 CFR 1.7704-1 - Publicly traded partnerships.

    Science.gov (United States)

    2010-04-01

    ...; transactional volume information; and information on special or capital distributions by a partnership. The... Tokyo Stock Exchange); (4) A regional or local exchange; and (5) An interdealer quotation system that... opportunity to sell or exchange the interest through a public means of obtaining or providing information of...

  19. Security, at what cost? A stated preference approach toward understanding individuals' privacy and civil liberties trade-offs regarding security measures

    NARCIS (Netherlands)

    Robinson, N.; Potoglou, D.

    2010-01-01

    In the presently heightened security environment there are a number of examples of policy that must strike a delicate balance between strengthening security without jeopardising public liberties and personal privacy. The introduction of national identity cards and biometric passports, the expansion

  20. Implementation of the Internet of Things on Public Security

    Science.gov (United States)

    Lu, Kesheng; Li, Xichun

    The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players. The public security as one of the key players is going to make real-time communications will be possible not only by humans but also by things at anytime and from anywhere. This research will present the advent of the Internet of Things to create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities.

  1. Efficient quantum secure communication with a publicly known key

    International Nuclear Information System (INIS)

    Li Chunyan; Li Xihan; Deng Fuguo; Zhou Hongyu

    2008-01-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently. (general)

  2. Fortress America: The Aesthetics of Homeland Security in the Public Realm

    Science.gov (United States)

    2017-09-01

    matured and evolved as a profession and is now an integral part of all urban design. UK citizens benefit from aesthetical public spaces where security...only can homeland security architecture restrict access to public spaces, it might not actually make the public safer. The indirect costs of poorly...change. Until public agencies hold homeland security architecture projects to the same public benefit requirements as other projects, the hostile

  3. The impact of later trading hours for Australian public houses (hotels) on levels of violence.

    Science.gov (United States)

    Chikritzhs, Tanya; Stockwell, Tim

    2002-09-01

    To examine the impact of later trading hours for licensed hotels (Australian public houses are usually known as "hotels") in Perth, Western Australia, on levels of violent assault on or near these premises. Data on assault offenses reported to police between July 1, 1991, and June 30, 1997, were examined to identify those offenses that occurred on or close to hotels. During this period, 45 (24%) of the 188 hotels meeting study criteria were granted an extended trading permit for 1AM closing ("ETP hotels"), whereas the rest continued to close at midnight ("non-ETP hotels"). A time-series analysis employing linear regression was used to test whether there was a relationship between the introduction of extended trading and monthly rates of assaults associated with ETP hotels, while controlling for the general trend in assault rates among normally trading hotels. Possible confounders and other variables of interest (e.g., levels of alcohol purchases) were also examined. After controlling for the general trend in assaults occurring throughout Perth hotels, there was a significant increase in monthly assault rates for hotels with late trading following the introduction of extended trading permits. This relationship was largely accounted for by higher volumes of high alcohol content beer, wine and distilled spirits purchased by late trading hotels. Late trading was associated with both increased violence in and around Perth hotels and increased levels of alcohol consumption during the study period. It is suggested that greater numbers of patrons and increased levels of intoxication contributed to the observed increase in violence and that systematic planning and evaluation of late trading licenses is required.

  4. Securities Operations: Update on Actions Taken to Address Day Trading Concerns

    National Research Council Canada - National Science Library

    2001-01-01

    .... In particular there was concern that broker-dealers promoting day trading as a strategy (day trading firms) sometimes used questionable advertising to attract customers without fully disclosing or by downplaying the risks involved...

  5. The Challenges Facing the Multilateral Trading System in Addressing Global Public Policy Objectives

    Directory of Open Access Journals (Sweden)

    Christophe Bellmann

    2013-02-01

    Full Text Available Despite a record-breaking 14.5 per cent increase in world merchandise exports, the effects of the financial crisis and global recession are still hampering faster economic recovery. Relatively high oil prices combined with persistent unemployment and measures designed to reduce budget deficits have undermined short-term growth prospects. While South–South trade continues to explode, trade imbalances – i.e. the gap between exports and imports – widened in 2010 compared to 2009 (though smaller than pre-crisis levels. Meanwhile, trade negotiations under the Doha Round have reached an impasse, generating uncertainties about the future of the World Trade Organization (WTO as a negotiating forum. Under these circumstances, should the system rethink its decision-making process founded upon the predominance of member states, the principle of consensus and the notion of single undertaking, as some critics have suggested? And, if so, how could such a reform agenda be initiated at the WTO? Moreover, beyond the negotiating function of the WTO, the paralysis of the system also raises urgent questions about the ability of the system to respond to pressing challenges of our times, such as trade and climate change, or food security and price volatility.

  6. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  7. Domains of State-Owned, Privately Held, and Publicly Traded Firms in International Competition.

    Science.gov (United States)

    Mascarenhas, Briance

    1989-01-01

    Hypotheses relating ownership to domain differences among state-owned, publicly traded, and privately held firms in international competition were examined in a controlled field study of the offshore drilling industry. Ownership explained selected differences in domestic market dominance, international presence, and customer orientation, even…

  8. 78 FR 13752 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SPIRIT; Invitation for Public...

    Science.gov (United States)

    2013-02-28

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD-2013 0013] Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SPIRIT; Invitation for Public Comments AGENCY: Maritime... . SUPPLEMENTARY INFORMATION: As described by the applicant the intended service of the vessel SPIRIT is: Intended...

  9. 77 FR 22631 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SPIRIT; Invitation for Public...

    Science.gov (United States)

    2012-04-16

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD 2012 0049] Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SPIRIT; Invitation for Public Comments AGENCY: Maritime... . SUPPLEMENTARY INFORMATION: As described by the applicant the intended service of the vessel SPIRIT is: Intended...

  10. A Market Analysis of Publications, Trade Conferences, and Key Events for Fleet Readiness Center Southwest

    Science.gov (United States)

    2007-12-01

    Win and Keep Big Customers. Austin: Bard Press, 2005. Kotler , Philip and Kevin Lane Keller. Marketing Management. Upper Saddle River, NJ...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT A Market Analysis of Publications, Trade Conferences...AGENCY USE ONLY (Leave blank) 2. REPORT DATE December 2007 3. REPORT TYPE AND DATES COVERED MBA Professional Report 4. TITLE AND SUBTITLE: A Market

  11. 78 FR 70097 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel BEE; Invitation for Public...

    Science.gov (United States)

    2013-11-22

    ... Administrative Waiver of the Coastwise Trade Laws: Vessel BEE; Invitation for Public Comments AGENCY: Maritime... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER....gov . SUPPLEMENTARY INFORMATION: As described by the applicant the intended service of the vessel BEE...

  12. One Health, One World—The Intersecting Legal Regimes of Trade, Climate Change, Food Security, Humanitarian Crises, and Migration

    OpenAIRE

    Garcia, Kelli K.; Gostin, Lawrence O.

    2012-01-01

    Today’s global health challenges require a multi-sectoral approach in which health is a fundamental value within global governance and international law. “One Health, One World” provides a unified, harmonious vision of global health governance that supports the wellbeing of humans and animals living in a clean and temperate environment. This article focuses on five legal regimes—trade law, food security law, environmental law, humanitarian law, and refugee law—that play a pivotal role in infl...

  13. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  14. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  15. 49 CFR 387.303 - Security for the protection of the public: Minimum limits.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Security for the protection of the public: Minimum... Insurance for Motor Carriers and Property Brokers § 387.303 Security for the protection of the public... convenience of the user, the revised text is set forth as follows: § 387.303 Security for the protection of...

  16. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  17. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  18. 78 FR 50481 - Request for Public Comments Regarding the National Trade Estimate Report on Foreign Trade Barriers

    Science.gov (United States)

    2013-08-19

    ... barriers to U.S. exports of goods, services, and U.S. foreign direct investment for inclusion in the NTE... affecting U.S. exports of goods and services, U.S. foreign direct investment, and protection of intellectual... National Trade Estimate Report on Foreign Trade Barriers AGENCY: Office of the United States Trade...

  19. Synergy effects between MINUSTAH and public security in Brazil

    Directory of Open Access Journals (Sweden)

    Christoph Harig

    2015-03-01

    Full Text Available This article assesses the complex relationship between UN Peace Operations and public security in Brazil. It shows that there are obvious similarities at an operational level between military actions in MINUSTAH and Rio´s Pacification, which arguably result in reciprocal learning processes among troops. With the establishment of dedicated training centres and a considerable amount of practical experience in missions that differ significantly from combat-orientated warfare, soldiers are becoming increasingly familiar with police tasks. Considering the extension of the legal framework for allowing domestic military actions, I argue that this “police-ization of the military” (Dunlap, 1999, p. 222 is probably more significant for internal “Guaranteeing Law and Order” (GLO missions than for further Brazilian participations in Peace Operations.

  20. MANAGERIAL ACCOUNTING AND PRICING FOR SALE OF GOODS AND PRODUCTS IN TRADE AND PUBLIC CATERING

    Directory of Open Access Journals (Sweden)

    TUHARI Tudor

    2017-06-01

    Full Text Available The most relevant problems of accounting and control in the sphere of commodity exchange are the reliable determination of the cost of mass goods and products during their storage and sale, as well as the operational orientation in pricing, taking into account the demand and supply in the interests of obtaining the necessary profit at an appropriate level of profitability. In the case of the sum stock accounting method for the goods in the retail trade and public catering, the especially important element of the accounting is the process of formation of retail sales prices and calculation of production cost of sales and profit of the enterprise. The article mainly focuses on the method of determining the retail sales prices for goods and products in the area of trade and public catering, respectively, through the use of trade mark-ups in percentage terms in relation not to the purchase, but to retail sales prices including VAT. Determining the cost of sales and its accounting is recommended to adjust only at the end of the month based on the calculation of the average percentage of trade mark-up (margin.

  1. Renewable Energy Certificate and Perform, Achieve, Trade mechanisms to enhance the energy security for India

    International Nuclear Information System (INIS)

    Kumar, Rajesh; Agarwala, Arun

    2013-01-01

    The Renewable Energy Certificate and Perform Achieve Trade mechanisms in India are designed to target energy generation and saving, respectively, in line with Clean Development Mechanism implemented by United Nations Framework Convention on Climate Change. The Renewable Energy Certificate System is a voluntary regulation in India for renewable energy generators and is designed for effective implementation of inter-state transactions by introducing the Renewable Purchase Obligation regulation for consumers and a flexible trading platform for transactions across the country. Another initiative, the Perform Achieve Trade scheme, is an enhanced energy efficiency trading mechanism based on consumption targets that require large energy user sectors to improve efficiency by 1–2% per year. The Perform Achieve Trade programme has introduced mechanisms for the identification of industry sector, designated customer, specific energy consumption and target setting. The Perform Achieve Trade design issues are in test phase in the first cycle of the scheme which will run from 2012 to 2015. This paper discusses key design issues about boundary and target setting for Renewable Energy Certificate and Perform Achieve Trade energy saving certificate (ESCert) A data sharing and trading mechanism for Perform Achieve Trade is also proposed for review and coordination among regulator, designated consumers and traders in the market. - Highlights: ► Renewable Energy Certificate’ and ‘Perform Achieve Trade’ are energy certification programmes. ► REC and PAT programme implementation and the institutional network work are presented. ► The trading and communication network propose for possible linkage between REC, PAT and CDM. ► Independent associations in parallel with CERC and BEE are redefined for two tier review of scheme

  2. 76 FR 32246 - Uniontown Energy, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2011-06-03

    ... Trading June 1, 2011. It appears to the Securities and Exchange Commission that there is a lack of current... opinion that the public interest and the protection of investors require a suspension of trading in the... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  3. 78 FR 76377 - Makism3D Corp.; Order of Suspension of Trading

    Science.gov (United States)

    2013-12-17

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Makism3D Corp.; Order of Suspension of Trading... protection of investors require a suspension of trading in the securities of Makism3D Corp. (``Makism3D... opinion that the public interest and the protection of investors require a suspension of trading in the...

  4. 78 FR 65744 - High End Ventures, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2013-11-01

    ... of Trading October 21, 2013. It appears to the Securities and Exchange Commission that there is a... opinion that the public interest and the protection of investors require a suspension of trading in the... Exchange Act of 1934, that trading in the securities of the above-listed company is suspended for the...

  5. 17 CFR 41.25 - Additional conditions for trading for security futures products.

    Science.gov (United States)

    2010-04-01

    ... security outstanding, the designated contract market or registered derivatives transaction execution... securities. (3) Notwithstanding paragraphs (b)(1) or (b)(2) of this section, if a derivatives clearing... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Additional conditions for...

  6. Bank regulatory Capital Buffer and Liquidity: Evidence from US and European Publicly Traded Banks

    OpenAIRE

    Distinguin , Isabelle; Roulet , Caroline; Tarazi , Amine

    2012-01-01

    The theory of financial intermediation highlights various channels through which capital and liquidity are interrelated. Using a simultaneous equations framework, we investigate the relationship between bank regulatory capital buffer and liquidity for European and U.S. publicly traded commercial banks. Previous research studying the determinants of bank capital buffer has neglected the role of liquidity. On the whole, we find that banks do not strengthen their regulatory capital buffer when t...

  7. Corporate Governance Provisions, Family Involvement, and Firm Performance in Publicly Traded Family Firms

    Directory of Open Access Journals (Sweden)

    Esra Memili

    2015-07-01

    Full Text Available This study examines the moderation effects of corporate governance provisions on the link between family involvement (i.e., family ownership and family management in publicly-traded firms and firm performance by drawing upon agency theory, with a focus on principal-principal agency issues, and the extant family governance literature. We develop and test the hypotheses on 386 of the S&P 500 firms longitudinally. Findings support the hypotheses suggesting the moderation effects of the use of provisions (a protecting controlling owners in terms of their sustainability of controlling status, and (b protecting management legally on the inverted U-shaped relationship between family ownership and firm performance. We also found support for the moderation effects of provisions (c protecting controlling owners in terms of their voting rights, (d protecting noncontrolling owners, and (e protecting management monetarily on the inverted U-shaped relationship between family management and firm performance. By this, our study provides empirical support for the principal-principal agency perspective on the corporate governance in publicly-traded family firms. As such, it suggests new avenues of research for both the corporate governance literature, as well as for the theory of the family firm. Our study also offers insights to policy directed toward monitoring the actions of large shareholders such as family and enhancing the overall shareholder value in publicly-traded family firms.

  8. Securities Operations: Update on Actions Taken to Address Day Trading Concerns

    National Research Council Canada - National Science Library

    2001-01-01

    In 1999, day trading 1 began to receive intense scrutiny from state and federal regulators and the Congress because of concerns that it posed significant investor protection and market integrity issues...

  9. The WHO/WTO study on trade and public health: a critical assessment.

    Science.gov (United States)

    Howse, Robert

    2004-04-01

    This article provides a brief critical examination of a 2002 report jointly issued by the World Health Organization and the World Trade Organization on WTO law and public health. The author argues that the report is in many respects misleading as to the content of WTO law, as interpreted by the Appellate Body of the WTO, its final court. In particular, the WHO/WTO report systematically understates or underestimates the margins of regulatory autonomy that WTO member states have to make regulations that protect public health.

  10. E-invoicing in EU public procurement as a tool for cross border trade barriers elimination

    Directory of Open Access Journals (Sweden)

    Oleksandr TSARUK

    2015-12-01

    Full Text Available Public Procurement of goods and services always was one of the principal element of e-procurements because it effects economic growth, describes governments' public services and national competitiveness, level of human capital growth in a long run. Furthermore, researching EU policy on e-procurements demands to observe legislature essence and technological models of e-procurement solutions because none of which has not been developed as the universal one yet. Basic European agreements on public procurements and trade, combining with the currently used public procurement models, force to develop a commonly used framework for all EU countries. Monitoring of EU e-procurement system as model for implementation at Eastern partnerships countries was also suggested.

  11. 78 FR 26814 - Millington Exchange Traded MAVINS Fund, LLC and Millington Securities, Inc.; Notice of Application

    Science.gov (United States)

    2013-05-08

    ... size, experience and potentially stronger relationships in the fixed income markets. Purchases of... into, and receive securities from, the series in connection with the purchase and redemption of...

  12. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  13. Management of information security risks in a federal public institution: a case study

    Directory of Open Access Journals (Sweden)

    Jackson Gomes Soares Souza

    2016-11-01

    Full Text Available Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T. managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and their implementation aiming greater control of information security risks and opportunities related to information technology security.

  14. Globalization of water and food through international trade: impacts on food security, resilience and justice

    Science.gov (United States)

    D'Odorico, P.; Carr, J. A.; Seekell, D. A.; Suweis, S. S.

    2015-12-01

    The global distribution of water resources in general depends on geographic conditions but can be (virtually) modified by humans through mechanisms of globalization, such as trade, that make food commodities available to populations living far from the production regions. While trade is expected to improve access to food and (virtual) water, its impact on the global food system and its vulnerability to shocks remains poorly understood. It is also unclear who benefits from trade and whether it contributes to inequality and justice in resource redistribution. We reconstruct the global patterns of food trade and show with a simple model how the ongoing intensification of imports and exports has eroded the resilience of the global food system. Drawing on human rights theory, we investigate the relationship between inequality and injustice in access to water and food. We assess the fulfillment of positive and negative water and food rights and evaluate the obligations arising from the need to ensure that these rights are met throughout the world. We find that trade enhances the vulnerability to shocks but overall increase the number of people whose water and food rights are met.

  15. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  16. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

  17. 78 FR 22580 - Millington Securities, Inc. and Millington Exchange Traded MAVINS Fund, LLC; Notice of Application

    Science.gov (United States)

    2013-04-16

    ... security for inclusion in the Fund's portfolio to have aggregate investment characteristics, fundamental... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30459; File No. 812-13887... an order under section 6(c) of the Investment Company Act of 1940 (the ``Act'') for an exemption from...

  18. Determinants of corporate cash holdings: Evidence from Portuguese publicly traded firms

    Directory of Open Access Journals (Sweden)

    Fernandes, Filipa

    2017-05-01

    Full Text Available This paper investigates the determinants of cash holdings of publicly traded Portuguese firms. We find that such firms hold less cash than similar companies operating in countries where both shareholders and creditors’ rights are more tightly protected by the law. In addition, our regression results suggest that leverage, other liquid assets, and firm growth are negatively correlated with our sample firms’ cash holdings whereas long-term debt and financial distress are positively correlated. Our findings cannot be reconciled with just one of the existent theories (trade-off, pecking order and free cashflow theory, and emphasize the importance of a country’s legal, institutional, and economic environment for explaining firms’ cash holdings decisions.

  19. Resource power and resource security: the politics of nonfuel minerals trade

    International Nuclear Information System (INIS)

    Kahn, O.E.

    1985-01-01

    The developed producers, Canada, Australia, and South Africa, and not the developing producers, are the power wielders and major tracers in nonfuel minerals. Specific circumstances allow producers to obtain compliant behavior from consumers. These include: exporter's market share, importer's degree of dependence, the material's being critical to importer's economy, and the trading system's condoning nonmarket goals. These (and other) criteria comprise an analytical device, the strategic trading relationship, which is used to demonstrate developed producer commodity power and developed consumer vulnerability. Consuming country governments rely on the private sector to deal with national enmeshment in strategic trading relationships. Japan excepted, OECD members fail either to address their continued access to nonfuel minerals, or their ability to survive supply disruption with minimum dislocation. Producer power is exemplified by Canada's threat and use of embargo to make her uranium customers tighten their nonproliferation policies. Structural power deters South Africa's ability to head off wholehearted economic pressure is the classic case

  20. 78 FR 29779 - Labor Affairs Council of the United States-Colombia Trade Promotion Agreement; Notice of Public...

    Science.gov (United States)

    2013-05-21

    ... Trade Promotion Agreement; Notice of Public Session Meeting AGENCY: International Labor Affairs Bureau... Labor Affairs Bureau (ILAB) of the U.S. Department of Labor gives notice of the public session of the meeting of the Labor Affairs Council (``Council'' or ``LAC''). The LAC public session has been rescheduled...

  1. One Health, One World—The Intersecting Legal Regimes of Trade, Climate Change, Food Security, Humanitarian Crises, and Migration

    Directory of Open Access Journals (Sweden)

    Kelli K. Garcia

    2012-04-01

    Full Text Available Today’s global health challenges require a multi-sectoral approach in which health is a fundamental value within global governance and international law. “One Health, One World” provides a unified, harmonious vision of global health governance that supports the wellbeing of humans and animals living in a clean and temperate environment. This article focuses on five legal regimes—trade law, food security law, environmental law, humanitarian law, and refugee law—that play a pivotal role in influencing health outcomes and are integral to achieving the One Health, One World vision. International trade, for example, opens markets not only to life-saving products such as vaccines, medicines, and medical equipment, but also to life-threatening products such as tobacco and asbestos. If strengthened and enforced, environmental law can decrease air and water pollution, major causes of death and disability. World hunger has been exacerbated by the global economic crisis and climate change, increasing the urgency for international law to enhance food security. Humanitarian law must similarly be strengthened to protect civilians adequately as the nature of warfare continues to change. Refugee law plays a pivotal role in protecting the health of deeply vulnerable people who lack food, shelter, and social stability. Higher standards and more effective compliance are necessary for international law to realize its full potential to safeguard the world's population.

  2. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  3. 77 FR 7131 - Addendum to Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-02-10

    ... DEPARTMENT OF COMMERCE International Trade Administration Addendum to Environmental Technologies... agenda of a meeting of the Environmental Technologies Trade Advisory Committee (ETTAC) will be changed to... & Environmental Industries, International Trade Administration, Room 4053, 1401 Constitution Avenue NW...

  4. The executive and legislative branches and trade unions in the Argentine social security reform

    Directory of Open Access Journals (Sweden)

    Sidney Jard da Silva

    2007-01-01

    Full Text Available This article analyzes the interaction between organized labor and government during reform of the pension system in Argentina. The purpose is to investigate the political and institutional conditions favorable to the inclusion of trade unions in a negotiated pension reform process. The Argentine pattern of union-government interaction was shown to be shaped more by the peculiarities of the decision-making process than by the demands and power of union organizations.

  5. Volatilities, traded volumes, and the hypothesis of price increments in derivative securities

    Science.gov (United States)

    Lim, Gyuchang; Kim, SooYong; Scalas, Enrico; Kim, Kyungsik

    2007-08-01

    A detrended fluctuation analysis (DFA) is applied to the statistics of Korean treasury bond (KTB) futures from which the logarithmic increments, volatilities, and traded volumes are estimated over a specific time lag. In this study, the logarithmic increment of futures prices has no long-memory property, while the volatility and the traded volume exhibit the existence of the long-memory property. To analyze and calculate whether the volatility clustering is due to a inherent higher-order correlation not detected by with the direct application of the DFA to logarithmic increments of KTB futures, it is of importance to shuffle the original tick data of future prices and to generate a geometric Brownian random walk with the same mean and standard deviation. It was found from a comparison of the three tick data that the higher-order correlation inherent in logarithmic increments leads to volatility clustering. Particularly, the result of the DFA on volatilities and traded volumes can be supported by the hypothesis of price changes.

  6. Legitimizing Security in the Ivory Tower: Canadian University Corporate Security Services' Public Quest for Legitimacy.

    Science.gov (United States)

    Wilkinson, Blair

    2016-05-01

    This article examines how university corporate security (UCS) services engage in legitimation work in their attempts to make their university communities (i.e., faculty, staff, students) and political masters (i.e., university administrators, boards of governors, senators) believe that they are honest, trustworthy, and caring and have authority that should be deferred to. This is accomplished through the analysis of interview and observational data collected as part of a research project exploring UCS services at five Canadian universities and an examination of how UCS services at 14 Canadian universities communicate using the social media service Twitter. These UCS services were found to primarily use Twitter for the purposes of soliciting or requesting information and for networking. In communicating through Twitter, UCS services engage in public legitimation work in which they make claims about and attempt to demonstrate their expertise, authority, and accountability. This article argues that both UCS services' particular legitimacy problem (i.e., their possession of both private and public attributes) and the interactive nature of public legitimation work create tensions that may serve to disrupt UCS services' ability to attain legitimacy. Cet article examine la manière dont les services de sécurité d'entreprise à l'université (SEU) s'engagent à légitimer leurs tentatives de persuader leurs communautés universitaires (c'est-à-dire le corps professoral, le personnel et les étudiants) ainsi que la haute administration (c'est-à-dire les administrateurs de l'université, le conseil des gouverneurs et les sénateurs) qu'ils sont honnêtes, attentifs, dignes de confiance, et qu'ils possèdent un niveau d'autorité auquel quiconque devrait se référer. Ceci sera accompli en analysant un corpus d'entrevues et d'observations dans le cadre d'un projet de recherche examinant les services de type SEU dans cinq universités canadiennes, ainsi qu'une étude sur

  7. Re-envisioning global agricultural trade: time for a paradigm shift to ensure food security and population health in low-income countries.

    Science.gov (United States)

    Pirkle, Catherine M; Poliquin, Hélène; Sia, Drissa; Kouakou, Kouassi Joseph; Sagna, Tani

    2015-03-01

    In this commentary, we use examples from West Africa to highlight how the liberalization of global agricultural trade exacerbates population health inequalities by threatening the livelihoods and food security of communities in low-income settings. We highlight the exploitative nature of trade agreements with West African countries demonstrating how these agreements disincentivize local agricultural investment and take jobs away from small-scale farmers. Further, we link agricultural trade liberalization to increased food insecurity, malnutrition, and exposure to environmental contaminants. Finally, we propose a paradigm shift that advocates for food sovereignty and the right to food. © The Author(s) 2014.

  8. Cryptonite: A Secure and Performant Data Repository on Public Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor

    2012-06-29

    Cloud storage has become immensely popular for maintaining synchronized copies of files and for sharing documents with collaborators. However, there is heightened concern about the security and privacy of Cloud-hosted data due to the shared infrastructure model and an implicit trust in the service providers. Emerging needs of secure data storage and sharing for domains like Smart Power Grids, which deal with sensitive consumer data, require the persistence and availability of Cloud storage but with client-controlled security and encryption, low key management overhead, and minimal performance costs. Cryptonite is a secure Cloud storage repository that addresses these requirements using a StrongBox model for shared key management.We describe the Cryptonite service and desktop client, discuss performance optimizations, and provide an empirical analysis of the improvements. Our experiments shows that Cryptonite clients achieve a 40% improvement in file upload bandwidth over plaintext storage using the Azure Storage Client API despite the added security benefits, while our file download performance is 5 times faster than the baseline for files greater than 100MB.

  9. 75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil

    Science.gov (United States)

    2010-06-22

    ... and the host cities. In private security alone, Brazil spent over US$ 17 billion in 2008. In... intelligence, as well as an overview of the country's economic and political environment. A networking...-users and partners. Follow-on business meetings in other cities in the region can be set up before or...

  10. Public Health Crisis in War and Conflict - Health Security in Aggregate.

    Science.gov (United States)

    Quinn, John; Zelený, Tomáš; Subramaniam, Rammika; Bencko, Vladimír

    2017-03-01

    Public health status of populations is multifactorial and besides other factors it is linked to war and conflict. Public health crisis can erupt when states go to war or are invaded; health security may be reduced for affected populations. This study reviews in aggregate multiple indices of human security, human development and legitimacy of the state in order to describe a predictable global health portrait. Paradigm shift of large global powers to that non-state actors and proxies impact regional influence through scaled conflict and present major global health challenges for policy makers. Small scale conflict with large scale violence threatens health security for at-risk populations. The paper concludes that health security is directly proportional to state security. Copyright© by the National Institute of Public Health, Prague 2017

  11. Are Entrepreneur-Led Companies Better? Evidence from Publicly Traded U.S. Companies: 1998-2010

    Directory of Open Access Journals (Sweden)

    Joel M. Shulman

    2010-12-01

    Full Text Available Do U.S. publicly-traded companies led by entrepreneurs perform better than nonentrepreneur-led U.S. public companies? Our data suggests they do. We analyze monthly stock returns of U.S. publicly traded companies over the time period 1998-2010 and find compelling evidence demonstrating that irrespective of market capitalization and time period, companies led by U.S. entrepreneurs provide better stock performance than several stock market indices primarily comprised of non-entrepreneur-led U.S. companies.

  12. Blockchain-based Public Key Infrastructure for Inter-Domain Secure Routing

    OpenAIRE

    de la Rocha Gómez-Arevalillo , Alfonso; Papadimitratos , Panos

    2017-01-01

    International audience; A gamut of secure inter-domain routing protocols has been proposed in the literature. They use traditional PGP-like and centralized Public Key Infrastructures for trust management. In this paper, we propose our alternative approach for managing security associations, Secure Blockchain Trust Management (SBTM), a trust management system that instantiates a blockchain-based PKI for the operation of securerouting protocols. A main motivation for SBTM is to facilitate gradu...

  13. Corporate reporting, security regulation and trading on the Kuwaiti stock exchange (KSE – institutional implications for research

    Directory of Open Access Journals (Sweden)

    Eiman A. Algharaballi

    2012-06-01

    Full Text Available The regulation of equities trading in Kuwait over the period from 1983 to 2011 is documented in this paper. An eclectic approach has resulted in overlapping responsibilities for the three main regulatory and supervisory bodies. Regulation appears to be responsive to market crises. As a result, regulations have tended to change with market conditions. Kuwaiti accounting and auditing requirements are also reviewed. The institutional setting in Kuwait has a number of implications for capital market-based research. Informational inefficiency precludes research that relies on the assumption that security price reflects firm value. Other features (including the profit requirement, lock-up restrictions and the two auditor rule provide opportunities for capital market research in Kuwait.

  14. International trade and investment law: a new framework for public health and the common good.

    Science.gov (United States)

    Delany, Louise; Signal, Louise; Thomson, George

    2018-05-08

    International trade and investment agreements can have positive outcomes, but also have negative consequences that affect global health and influence fundamental health determinants: poverty, inequality and the environment. This article proposes principles and strategies for designing future international law to attain health and common good objectives. Basic principles are needed for international trade and investment agreements that are consistent with the common good, public health, and human rights. These principles should reflect the importance of reducing inequalities, along with social and environmental sustainability. Economic growth should be recognised as a means to common good objectives, rather than an end in itself. Our favoured approach is both radical and comprehensive: we describe what this approach would include and outline the strategies for its implementation, the processes and capacity building necessary for its achievement, and related governance and corporate issues. The comprehensive approach includes significant changes to current models for trade and investment agreements, in particular (i) health, social and environmental objectives would be recognised as legitimate in their own right and implemented accordingly; (ii) changes to dispute-resolution processes, both state-to-state and investor-state; (iii) greater deference to international legal frameworks for health, environmental protection, and human rights; (iv) greater coherence across the international law framework; (v) limitations on investor privileges, and (vi) enforceable corporate responsibilities for contributing to health, environmental, human rights and other common good objectives. We also identify some limited changes that could be considered as an alternative to the proposed comprehensive approach. Future research is needed to develop a range of model treaties, and on the means by which such treaties and reforms might be achieved. Such research would focus also on

  15. 77 FR 52633 - Public Safety and Homeland Security Bureau Seeks Comment on Post-Reconfiguration 800 MHz Band...

    Science.gov (United States)

    2012-08-30

    ... border. The Public Safety and Homeland Security Bureau (Bureau), by this action, affords interested... INFORMATION CONTACT: Brian Marenco, Policy and Licensing Division, Public Safety and Homeland Security Bureau... 2007, the Commission delegated authority to Public Safety and Homeland Security Bureau to propose and...

  16. A Study of Customer Satisfaction on Online Trading System Application of Securities Company in Indonesia Using Servqual

    Directory of Open Access Journals (Sweden)

    Hery Hery

    2015-05-01

    Full Text Available The purpose of this study is to measure the service  quality of online trading system implemented by PT  KDB  Daewoo  Securities  Indonesia.  The study is  a part of the company  efforts to provide  the best solution  services. The study  is performed   to determine the influence of service quality  factors on the customer satisfaction by means of ServQual  method. The method takes  into account  five  independent  variables,  namely, reliability (X1 ,  responsiveness  (X2 ,  assurance  (X3 , empathy (X4 , and tangibility (X5 . Meanwhile,  the cus- tomer satisfaction is considered as the dependent variable (Y . The population of of the study  is all 67 900 online traders at the company and the sample size is 265 traders. The data are collected via questionnaires and interviews. From the study results, we conclude that the five variables have  significant  influence  on the customer  satisfaction on the online trading system application   at PT KDB Daewoo Securities Indonesia. To  improve  the customer satisfaction, the company  should prioritize the quality- related factors,  and expand  and upgrade  the existing facilities and infrastructures.

  17. A General Construction of IND-CCA2 Secure Public Key Encryption

    DEFF Research Database (Denmark)

    Kiltz, Eike; Malone-Lee, John

    2003-01-01

    We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction....

  18. 76 FR 54196 - Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee

    Science.gov (United States)

    2011-08-31

    ... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: In accordance with the Secure Rural Schools and Community Self Determination Act of 2000 (Pub. L. 106-393), [as...

  19. Engineering Trade-off Considerations Regarding Design-for-Security, Design-for-Verification, and Design-for-Test

    Science.gov (United States)

    Berg, Melanie; Label, Kenneth

    2018-01-01

    The United States government has identified that application specific integrated circuit (ASIC) and field programmable gate array (FPGA) hardware are at risk from a variety of adversary attacks. This finding affects system security and trust. Consequently, processes are being developed for system mitigation and countermeasure application. The scope of this tutorial pertains to potential vulnerabilities and countermeasures within the ASIC/FPGA design cycle. The presentation demonstrates how design practices can affect the risk for the adversary to: change circuitry, steal intellectual property, and listen to data operations. An important portion of the design cycle is assuring the design is working as specified or as expected. This is accomplished by exhaustive testing of the target design. Alternatively, it has been shown that well established schemes for test coverage enhancement (design-for-verification (DFV) and design-for-test (DFT)) can create conduits for adversary accessibility. As a result, it is essential to perform a trade between robust test coverage versus reliable design implementation. The goal of this tutorial is to explain the evolution of design practices; review adversary accessibility points due to DFV and DFT circuitry insertion (back door circuitry); and to describe common engineering trade-off considerations for test versus adversary threats.

  20. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  1. Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations

    Directory of Open Access Journals (Sweden)

    Myeonggil Choi

    2015-08-01

    Full Text Available Cloud computing has made it possible for private companies to make rapid changes in their computing environments. However, in the public sector, security issues hinder institutions from adopting cloud computing. To solve these security challenges, in this paper, we propose a methodology for information security management, which quantitatively classifies the importance of information in cloud systems in the public sector. In this study, we adopt a Delphi approach to establish the classification criteria of the proposed methodology in an objective and systematic manner. Further, through a case study of a public corporation, we try to validate the usefulness of the proposed methodology. The results of this study will help public institutions to consider introducing cloud computing and to manage cloud systems effectively and securely.

  2. Aviation Security, Risk Assessment, and Risk Aversion for Public Decisionmaking

    Science.gov (United States)

    Stewart, Mark G.; Mueller, John

    2013-01-01

    This paper estimates risk reductions for each layer of security designed to prevent commercial passenger airliners from being commandeered by terrorists, kept under control for some time, and then crashed into specific targets. Probabilistic methods are used to characterize the uncertainty of rates of deterrence, detection, and disruption, as well…

  3. ICRP Publication 125: Radiological Protection in Security Screening.

    Science.gov (United States)

    Cool, D A; Lazo, E; Tattersall, P; Simeonov, G; Niu, S

    2014-07-01

    The use of technologies to provide security screening for individuals and objects has been increasing rapidly, in keeping with the significant increase in security concerns worldwide. Within the spectrum of technologies, the use of ionizing radiation to provide backscatter and transmission screening capabilities has also increased. The Commission has previously made a number of statements related to the general topic of deliberate exposures of individuals in non-medical settings. This report provides advice on how the radiological protection principles recommended by the Commission should be applied within the context of security screening. More specifically, the principles of justification, optimisation of protection, and dose limitation for planned exposure situations are directly applicable to the use of ionising radiation in security screening. In addition, several specific topics are considered in this report, including the situation in which individuals may be exposed because they are concealed (‘stowaways’) in a cargo container or conveyance that may be subject to screening. The Commission continues to recommend that careful justification of screening should be considered before decisions are made to employ the technology. If a decision is made that its use is justified, the framework for protection as a planned exposure situation should be employed, including optimization of protection with the use of dose constraints and the appropriate provisions for authorisation and inspection.

  4. Publicity in secured transactions law: Towards a European public notice filing system for non-possessory security rights in movable assets?

    NARCIS (Netherlands)

    Hamwijk, D.J.Y.

    2014-01-01

    There is a growing call to introduce a European public notice filing system for security rights in movable goods comparable to the notice filing system of Art. 9 UCC. A proposal to this effect has been adopted in Book IX DCFR, which represents a comprehensive framework of rules for proprietary

  5. Trading-off fish biodiversity, food security, and hydropower in the Mekong River Basin.

    Science.gov (United States)

    Ziv, Guy; Baran, Eric; Nam, So; Rodríguez-Iturbe, Ignacio; Levin, Simon A

    2012-04-10

    The Mekong River Basin, site of the biggest inland fishery in the world, is undergoing massive hydropower development. Planned dams will block critical fish migration routes between the river's downstream floodplains and upstream tributaries. Here we estimate fish biomass and biodiversity losses in numerous damming scenarios using a simple ecological model of fish migration. Our framework allows detailing trade-offs between dam locations, power production, and impacts on fish resources. We find that the completion of 78 dams on tributaries, which have not previously been subject to strategic analysis, would have catastrophic impacts on fish productivity and biodiversity. Our results argue for reassessment of several dams planned, and call for a new regional agreement on tributary development of the Mekong River Basin.

  6. Security Issues of the Digital Certificates within Public Key Infrastructures

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance, a research paper has mentioned how a PKI security may be violated by MD5 collision over information from the certificates. In order to develop further studies on the topic a serious knowledge about certificate structure is necessary.

  7. Safety, security, and serving the public interest in synthetic biology.

    Science.gov (United States)

    Gronvall, Gigi Kwik

    2018-03-21

    This article describes what may be done by scientists and by the biotechnology industry, generally, to address the safety and security challenges in synthetic biology. Given the technical expertise requirements for developing sound policy options, as well as the importance of these issues to the future of the industry, scientists who work in synthetic biology should be informed about these challenges and get involved in shaping policies relevant to the field.

  8. Enhancing Public Helicopter Safety as a Component of Homeland Security

    Science.gov (United States)

    2016-12-01

    Risk Assessment Tool GPS Global Positioning System IFR instrument flight rules ILS instrument landing system IMC instrument meteorological...daily operations. Additionally, the effectiveness of the standards is evaluated by determining if these standards would have prevented the accidents...trends, such as human behavior and lack of standards, that are common in public safety helicopter accidents. Public safety aviation agencies can use this

  9. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  10. 75 FR 79069 - Anti-Counterfeiting Trade Agreement: Request for Comments From the Public

    Science.gov (United States)

    2010-12-17

    ... proposed agreement to strengthen international cooperation, enforcement practices and legal frameworks for... international cooperation and to promote strong enforcement practices. Together these provisions will help to... OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE Anti-Counterfeiting Trade Agreement: Request for...

  11. Public Health Specializations and Education Needs to Support Homeland Security

    National Research Council Canada - National Science Library

    Landguth, David C

    2006-01-01

    ... of terrorism and natural disasters. Understanding the deficiencies that exist by public health specialization, and identifying the knowledge base required for each specialization will help the United States to meet its future...

  12. Integrating Local Public Health Agencies into the Homeland Security Community

    National Research Council Canada - National Science Library

    Reed, Patricia D

    2007-01-01

    .... This thesis argues that several factors contribute to this lack of success, including funding structures and guidelines, the reluctance on the part of other responder agencies to include Public...

  13. [Disintegration of the prison system, public security and social exclusion].

    Science.gov (United States)

    Freixo, Marcelo

    2016-06-01

    The defense of human rights, namely one of the most important duties of the legislature, is a considerable challenge in the day-to-day business of parliament. The opinions and practices of elected representatives reflect the security concerns and fears of society that engender a vast process of social exclusion. In this context, the defense of the right to health of persons deprived of liberty seems an especially difficult task, as shown in the interview of State Congressman Marcelo Freixo, the Coordinator of the Human Rights Commission of the Legislative Assembly in Rio de Janeiro and creator of the State Mechanism for Preventing and Combating Torture.

  14. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Science.gov (United States)

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  15. Public Security in Brazil: What has been Done About the Homicides?

    Directory of Open Access Journals (Sweden)

    Ana Carolina de Morais Colombaroli

    2016-10-01

    Full Text Available The situation experienced in Brazil can be called "homicide epidemic": in 2014, a rate of 29.1 homicides per 100,000 inhabitants has been reached, an impressively high rate, compared to the world average of 6.9 homicides. The State has shown itself ineffective in face of the deterioration of public security conditions in the country. This paper seeks to verify the evolution of homicide rates in Brazil; analyze the responses given by the State to this increase in crime by verifying the (ineffectiveness of public security policies in reducing homicides; and present public policy strategies in order to reduce violence.

  16. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  17. The Role of Latin America’s Land and Water Resources for Global Food Security: Environmental Trade-Offs of Future Food Production Pathways

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621

  18. The new PR of states: How nation branding practices affect the security function of public diplomacy

    DEFF Research Database (Denmark)

    Rasmussen, Rasmus Kjærgaard; Merkelsen, Henrik

    2012-01-01

    This paper investigates how the role of public relations practice in public diplomacy is undergoing a transformation as a consequence of the influence from nation branding. A case study of the Danish government's response to the so-called Cartoon Crisis illustrates how the threat from international...... a domestic audience. In the public diplomacy efforts towards transnational publics the link to national security will completely disappear whereby the public relations of states is transformed to the marketing of states....... terrorism to national security initially served as a catalyst for new public diplomacy initiatives. But as the initiatives were implemented within a framework of nation branding the focus on risk reduction became subjected to a marketing logic and a new focus on economic objectives took over. The paper...

  19. Agricultural productivity and greenhouse gas emissions: trade-offs or synergies between mitigation and food security?

    International Nuclear Information System (INIS)

    Valin, H; Havlík, P; Mosnier, A; Obersteiner, M; Herrero, M; Schmid, E

    2013-01-01

    In this letter, we investigate the effects of crop yield and livestock feed efficiency scenarios on greenhouse gas (GHG) emissions from agriculture and land use change in developing countries. We analyze mitigation associated with different productivity pathways using the global partial equilibrium model GLOBIOM. Our results confirm that yield increase could mitigate some agriculture-related emissions growth over the next decades. Closing yield gaps by 50% for crops and 25% for livestock by 2050 would decrease agriculture and land use change emissions by 8% overall, and by 12% per calorie produced. However, the outcome is sensitive to the technological path and which factor benefits from productivity gains: sustainable land intensification would increase GHG savings by one-third when compared with a fertilizer intensive pathway. Reaching higher yield through total factor productivity gains would be more efficient on the food supply side but halve emissions savings due to a strong rebound effect on the demand side. Improvement in the crop or livestock sector would have different implications: crop yield increase would bring the largest food provision benefits, whereas livestock productivity gains would allow the greatest reductions in GHG emission. Combining productivity increases in the two sectors appears to be the most efficient way to exploit mitigation and food security co-benefits. (letter)

  20. 76 FR 41278 - Cargo Security Risk Reduction; Public Listening Sessions

    Science.gov (United States)

    2011-07-13

    ....mil/hq/cg5/cg544/cdc.asp or the Federal Docket Management System at http://www.Regulations.gov . For... important for the Coast Guard, in concert with stakeholders, to implement a holistic strategy to mitigate... risk management and shared responsibility between public and private sector stakeholders, across the...

  1. An analysis of Indonesia’s information security index: a case study in a public university

    Science.gov (United States)

    Yustanti, W.; Qoiriah, A.; Bisma, R.; Prihanto, A.

    2018-01-01

    Ministry of Communication and Informatics of the Republic of Indonesia has issued the regulation number 4-2016 about Information Security Management System (ISMS) for all kind organizations. Public university as a government institution must apply this standard to assure its level of information security has complied ISO 27001:2013. This research is a preliminary study to evaluate the readiness of university IT services (case study in a public university) meets the requirement of ISO 27001:2013 using the Indonesia’s Information Security Index (IISI). There are six parameters used to measure the level of information security, these are the ICT role, governance, risk management, framework, asset management and technology. Each parameter consists of serial questions which must be answered and convert to a numeric value. The result shows the level of readiness and maturity to apply ISO 27001 standard.

  2. Public security and peace building operations in post-armed conflict periods

    OpenAIRE

    Aguilar, Sérgio Luiz Cruz

    2012-01-01

    The article shows how contemporary peace operations conducted bythe United Nations (UN) to manage and/or resolve armed conflicts have dealt withthe issue of public security. As part of the effort to establish a lasting peace in theseterritories, the activities of the Organization include the security sector reform andthe structuring of a democratic police force as part of a broader process of peacebuilding. Based on specialized literature on the subject, UN documents and personalobservations,...

  3. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide

    International Nuclear Information System (INIS)

    2012-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  4. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  5. Improved security proofs and constructions for public-key cryptography

    OpenAIRE

    Pan, Jiaxin (M. Sc.)

    2016-01-01

    Diese Arbeit verbessert die Sicherheitsanalyse und Konstruktierbarkeit von Public-Key-Kryptographie: Der erste Teil der Arbeit schlägt einen vereinfachten Sicherheitsbeweis für digitale Signaturverfahren von kanonischen Identifikationsschemata über die klassischen Fiat-Shamir-Transformation im Random Oracle Modell vor. Der zweite Teil der Arbeit schlägt eine neue Variante der Message Authentication Codes (MACs) vor, die sogenannten affinen MACs. Außerdem wird eine generische Transform...

  6. Security for Show? The Militarisation of Public Space in Light of the 2016 Rio Olympic Games

    Directory of Open Access Journals (Sweden)

    Veronica F. Azzi

    Full Text Available Abstract This article aims to analyse the increasing militarisation of public space in the Brazilian city of Rio de Janeiro, particularly on the eve of the 2016 Olympics. To this end, I briefly discuss how the concept of militarisation has been historically approached in the International Relations literature, namely within the security field. In the first section, I address the nature of the domestic security challenges Brazil faces as a developing country. In the second section, I show that the public security challenge of organised crime in Rio was securitised and confronted by increasing militarisation over the years as a result of a specific model of neo-liberal social control carried out by the country. I then analyse Brazil’s Olympics security scheme carried out in order to portray Rio as a safe city to the world. In the last section, I highlight the contradictions between accounts on the collapse in domestic security vis-à-vis official government statements to the international media to assure that ‘nothing would go wrong’ during the mega sports event. The idea is to show how the militarisation of public security, rather than mere governmental efforts to signal stability to the international community during the Olympics, is a trend likely to outlast the event that implies not only, but mainly, the perpetuation of insecurity.

  7. Return to work after renal transplantation: a study of the Brazilian Public Social Security System.

    Science.gov (United States)

    Messias, Alexandre Augusto; Reichelt, Angela J; Dos Santos, Edson F; Albuquerque, Galton C; Kramer, José S P; Hirakata, Vania N; Garcia, Valter D

    2014-12-15

    Return to work is an objective parameter used worldwide to evaluate the success of organ transplantation and is especially feasible after renal transplantation. This study sought to describe the frequency of return to work after renal transplantation and related characteristics. Retrospective cohort of 511 isolated kidney transplant recipients was recruited from a Brazilian referral center from January 2005 to December 2009; all were matched to the public social security database to determine inclusion and benefit awards, as well as the rate of resumption of contributions to the public social security system, a surrogate marker of work rehabilitation. Characteristics associated with work return were analyzed. No social security records were found for 28 subjects. The remaining 483 subjects had a mean age of 45±13 years; 62% were male; 401 (83%) received some public social security benefit; 298 were paying dues and could, therefore, receive temporary or permanent disability benefits. Of these, 78 subjects made social security payments after transplantation, resulting in a work return rate of 26% (95% confidence interval, 21-32). Younger age, living donor graft, and chronic glomerulonephritis were significantly associated with return to work. In Brazil, most renal transplant recipients are on social security benefits, but only a small proportion return to work after surgery. Clinical characteristics may help define work resumption trends.

  8. Public views on multiple dimensions of security: nuclear weapons, terrorism, energy, and the environment: 2007

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  9. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  10. Public-Sector Information Security: A Call to Action for Public-Sector CIOs

    National Research Council Canada - National Science Library

    Heiman, Don

    2002-01-01

    ..., held in November 2001, conference participants identified a series of actions designed to combat emerging cyber-threats to security and critical infrastructure, Subsequent to the forum, NASCIO asked Don...

  11. Single-shot secure quantum network coding on butterfly network with free public communication

    Science.gov (United States)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  12. Trade Agreements PTI

    Data.gov (United States)

    Department of Homeland Security — The objective of the Trade Agreements PTI is to advance CBP’s mission by working with internal and external stakeholders to facilitate legitimate trade and address...

  13. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  14. Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

    Directory of Open Access Journals (Sweden)

    Shuai Han

    2017-01-01

    Full Text Available KDM[F]-CCA security of public-key encryption (PKE ensures the privacy of key-dependent messages f(sk which are closely related to the secret key sk, where f∈F, even if the adversary is allowed to make decryption queries. In this paper, we study the design of KDM-CCA secure PKE. To this end, we develop a new primitive named Auxiliary-Input Authenticated Encryption (AIAE. For AIAE, we introduce two related-key attack (RKA security notions, including IND-RKA and weak-INT-RKA. We present a generic construction of AIAE from tag-based hash proof system (HPS and one-time secure authenticated encryption (AE and give an instantiation of AIAE under the Decisional Diffie-Hellman (DDH assumption. Using AIAE as an essential building block, we give two constructions of efficient KDM-CCA secure PKE based on the DDH and the Decisional Composite Residuosity (DCR assumptions. Specifically, (i our first PKE construction is the first one achieving KDM[Faff]-CCA security for the set of affine functions and compactness of ciphertexts simultaneously. (ii Our second PKE construction is the first one achieving KDM[Fpolyd]-CCA security for the set of polynomial functions and almost compactness of ciphertexts simultaneously. Our PKE constructions are very efficient; in particular, they are pairing-free and NIZK-free.

  15. Virtual-optical information security system based on public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  16. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  17. Korean public's preference for supply security of oil and gas and the impact of protest bidders

    International Nuclear Information System (INIS)

    Kim, Jihyo; Kim, Jinsoo; Kim, Yoon Kyung

    2016-01-01

    The Korean governmental support for supply security of oil and gas via overseas exploration and production (E&P) projects are publicly criticized because of some poor projects lacking of economic feasibility, even though it should be expanded from a long-term perspective. Applying the contingent valuation, this study investigates the Korean public's preferences for governmental support for overseas oil and gas E&P projects. The result shows that the governmental support for overseas E&P projects rather decreases public utility. The primary reason behind this utility decrease is that some respondents protested to bid because of their resistance toward tax increase without guaranteeing the efficient government support. This result implies that simple tax increases for expansion of the governmental support may bring about public's strong opposition. In order to overcome this public opposition, this study suggests that it is necessary to arouse public understanding of the necessity of overseas oil and gas E&P projects. - Highlights: • We investigate the Korean public's preferences for an oil and gas supply security. • The respondents are willing to pay USD 0.017 per liter of gasoline or diesel. • Governmental support for overseas E&P projects decreases the public utility. • It is need to increase public understanding of overseas oil and gas E&P projects.

  18. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  19. Modeling an emissions peak in China around 2030: Synergies or trade-offs between economy, energy and climate security

    Directory of Open Access Journals (Sweden)

    Qi-Min Chai

    2014-12-01

    Full Text Available China has achieved a political consensus around the need to transform the path of economic growth toward one that lowers carbon intensity and ultimately leads to reductions in carbon emissions, but there remain different views on pathways that could achieve such a transformation. The essential question is whether radical or incremental reforms are required in the coming decades. This study explores relevant pathways in China beyond 2020, particularly modeling the major target choices of carbon emission peaking in China around 2030 as China-US Joint Announcement by an integrated assessment model for climate change IAMC based on carbon factor theory. Here scenarios DGS-2020, LGS2025, LBS-2030 and DBS-2040 derived from the historical pathways of developed countries are developed to access the comprehensive impacts on the economy, energy and climate security for the greener development in China. The findings suggest that the period of 2025–2030 is the window of opportunity to achieve a peak in carbon emissions at a level below 12 Gt CO2 and 8.5 t per capita by reasonable trade-offs from economy growth, annually −0.2% in average and cumulatively −3% deviation to BAU in 2030. The oil and natural gas import dependence will exceed 70% and 45% respectively while the non-fossil energy and electricity share will rise to above 20% and 45%. Meantime, the electrification level in end use sectors will increase substantially and the electricity energy ratio approaching 50%, the labor and capital productivity should be double in improvements and the carbon intensity drop by 65% by 2030 compared to the 2005 level, and the cumulative emission reductions are estimated to be more than 20 Gt CO2 in 2015–2030.

  20. American security perspectives: public views on energy, environment, nuclear weapons and terrorism: 2008

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from matching national surveys of the US general public on US energy and environmental security administered by telephone and Internet in mid-2008. Key areas of investigation include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alter-native sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include evolving perspectives on global climate change and relationships among environmental issues and potential policy options. We also report findings from an Internet survey of the general public conducted in mid-2008 that investigates assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism.

  1. National Security in the Nuclear Age. A Proposed Booklist and Public Education Ideas for Libraries.

    Science.gov (United States)

    Dane, Ernest B.

    A bibliography on national security in the nuclear age is divided into three sections. The first section describes a proposal calling for the compilation of a balanced and up-to-date collection of books and other materials on this issue to be included in all U.S. public libraries. Also discussed are selection criteria for the book list, project…

  2. News framing and public support for a common foreign and security policy

    NARCIS (Netherlands)

    de Vreese, C.H.; Kandyla, A.

    2009-01-01

    Abstract A common EU foreign and security policy (CFSP) can be framed by elites and media as a risk or as an opportunity. This article examines the effects of framing in terms of ‘risk’ and ‘opportunity’ on public support. Moreover, we examine first whether the effect of framing CFSP as a ‘risk for

  3. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Occupancy by police officers to... HOUSING Occupancy by Over-Income Families or Police Officers § 960.505 Occupancy by police officers to provide security for public housing residents. (a) Police officer. For purpose of this subpart E, “police...

  4. Trade union activity, cultural, public and political life of Krasnoyarsk Polytechnic Institute in the second half of 1950s–1980

    Directory of Open Access Journals (Sweden)

    Petrik Valeriy V.

    2016-01-01

    Full Text Available Basing on rich documentary, the article studies the activity of the trade union organization in Krasnoyarsk Polytechnic Institute and the impact the trade union had on the cultural, public and political life of the Institute in the second half of the 1950s-1980s. The activity is stated to be held in different forms and areas: amateur arts, propaganda, wall-newspaper and house magazine, vigilant groups, University of Culture, student club, lecturing agitation group, student construction brigades, department, groups and hostels competitions. The authors come to the conclusion that involving students and faculty members into cultural, public and political life added greatly to fostering the future engineers as it took them less time to adapt to the team-spirited workforce after graduating from the higher educational establishment. The article is intended for the people interested in history of higher education in Siberia and Russia.

  5. SAFETY AND SECURITY IMPROVEMENT IN PUBLIC TRANSPORTATION BASED ON PUBLIC PERCEPTION IN DEVELOPING COUNTRIES

    Directory of Open Access Journals (Sweden)

    Tri Basuki JOEWONO

    2006-01-01

    Three aspects of an improvement agenda are proposed based on the perception data, namely technology, management, and institution. This agenda is clarified by a set of action plans incorporating the responsible parties and a time frame. The action plan is divided into three terms to define a clear goal for each step. The short-term action focuses on the hardware and on preparing further steps, whereas the medium-term action focuses on developing and improving the standard of safety and security. The long-term action focuses on advancing safety and security practices. The effectiveness of this agenda and action plan rests upon a set of assumptions, such as the degree of seriousness from the authoritative institution, fair distribution of information, the availability of reasonable resources, and coordinated and collaborative action from all parties involved to reach the objective.

  6. An approach to forming tax regulation of foreign trade activity as a means of financial security assurance

    Directory of Open Access Journals (Sweden)

    Maksimov Yu. A.

    2016-05-01

    Full Text Available the article examines the issue of improving the taxation of foreign trade activity depending on the global market conditions. The author offers an approach to taxation of foreign trade, and suggests the way of improving the taxation in this article’s branch.

  7. Privacy, security, and the public health researcher in the era of electronic health record research.

    Science.gov (United States)

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  8. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    Science.gov (United States)

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  9. Assessing trade in health services in countries of the Eastern Mediterranean from a public health perspective.

    Science.gov (United States)

    Siddiqi, Sameen; Shennawy, Azza; Mirza, Zafer; Drager, Nick; Sabri, Belgacem

    2010-01-01

    Assessing trade in health services (TiHS) in developing countries is challenging since the sources of information are diverse, information is not accessible and professionals lack grasp of issues. A multi-country study was conducted in the Eastern Mediterranean Region (EMR)--Egypt, Jordan, Lebanon, Morocco, Oman, Pakistan, Sudan, Syrian Arab Republic, Tunisia, and Yemen. The objective was to estimate the direction, volume, and value of TiHS; analyze country commitments; and assess the challenges and opportunities for health services.Trade liberalization favored an open trade regime and encouraged foreign direct investment. Consumption abroad and movement of natural persons were the two prevalent modes. Yemen and Sudan are net importers, while Jordan promotes health tourism. In 2002, Yemenis spent US$ 80 million out of pocket for treatment abroad, while Jordan generated US$ 620 million. Egypt, Pakistan, Sudan and Tunisia export health workers, while Oman relies on import and 40% of its workforce is non-Omani. There is a general lack of coherence between Ministries of Trade and Health in formulating policies on TiHS.This is the first organized attempt to look at TiHS in the EMR. The systematic approach has helped create greater awareness, and a move towards better policy coherence in the area of trade in health services. Copyright (c) 2009 John Wiley & Sons, Ltd.

  10. Epidemiologic methods lessons learned from environmental public health disasters: Chernobyl, the World Trade Center, Bhopal, and Graniteville, South Carolina.

    Science.gov (United States)

    Svendsen, Erik R; Runkle, Jennifer R; Dhara, Venkata Ramana; Lin, Shao; Naboka, Marina; Mousseau, Timothy A; Bennett, Charles

    2012-08-01

    Environmental public health disasters involving hazardous contaminants may have devastating effects. While much is known about their immediate devastation, far less is known about long-term impacts of these disasters. Extensive latent and chronic long-term public health effects may occur. Careful evaluation of contaminant exposures and long-term health outcomes within the constraints imposed by limited financial resources is essential. Here, we review epidemiologic methods lessons learned from conducting long-term evaluations of four environmental public health disasters involving hazardous contaminants at Chernobyl, the World Trade Center, Bhopal, and Graniteville (South Carolina, USA). We found several lessons learned which have direct implications for the on-going disaster recovery work following the Fukushima radiation disaster or for future disasters. These lessons should prove useful in understanding and mitigating latent health effects that may result from the nuclear reactor accident in Japan or future environmental public health disasters.

  11. SYMMETRIC ENCRYPTION USING PRE-SHARED PUBLIC PARAMETERS FOR A SECURE TFTP PROTOCOL

    Directory of Open Access Journals (Sweden)

    N. N. MOHAMED

    2017-01-01

    Full Text Available Advances in the communication technology of embedded systems have led to the situation where nowadays almost all systems should implement security for data safety. Trivial File Transfer Protocol (TFTP has advantages for use in embedded systems due to its speed and simplicity, however without security mechanisms, it is vulnerable to various attacks. As an example, during upgrading of Wireless Access Points (WAPs, attackers can access the information and modify it, and then install malicious code to interrupt the system. This work proposes security implementation of Diffie Hellman Key Exchange in TFTP by pre-sharing public parameters that enable two parties to achieve same secret key without the risk of Man-In-The-Middle (MITM attacks. The implementation is integrated with compression and encryption methods to significantly reduce computational requirements in TFTP communication.

  12. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Science.gov (United States)

    2010-10-01

    ... checks by public transportation agency or railroad carrier. 1570.13 Section 1570.13 Transportation Other... regarding security background checks by public transportation agency or railroad carrier. (a) Scope. This... employee of a public transportation agency or a contractor or subcontractor of a public transportation...

  13. Public Interest vs. Interest Groups: Allowance Allocation in the EU Emission Trading Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Anger, Niels; Oberndorfer, Ulrich (Centre for European Economic Research, Mannheim (Germany)); Boehringer, Christoph (Carl von Ossietzky Univ., Oldenburg (Germany))

    2008-07-01

    We assess the political-economy determinants of allowance allocation in the EU Emissions Trading Scheme (EU ETS). A common-agency model suggests that the government considers the preferences of sectoral interest groups when allocating emissions permits, so that industries with a more powerful lobby face a lower regulatory burden. An empirical analysis of the first trading phase of the EU ETS corroborates our theoretical prediction, but also reveals that the political-economy determinants of permit allocation are more complex. Employing instrumental-variable estimation technique, we find that large carbon emitters that were represented by powerful interest groups received higher levels of emissions allowances

  14. Taming the “Publication Machine”: Generating Unity, Engaging the Trading Zones

    OpenAIRE

    Thoreau, François; Neicu, Maria

    2010-01-01

    In this paper, we explore the par ticular issue of a biomedical research team engaging itself in different “trading zones” (Galison 1997). We do so by following the specific process of setting up a new microscope. We star t by briefly introducing our general understanding of the concept of “trading zone.” Then we focus on the empirical material we collected, star ting from the microscope as the researchers we followed were setting it up. Our analysis is twofold: we first describe the acts we...

  15. The Creation of an Energy Security Society as a Way to Decrease Securitization Levels between the European Union and Russia in Energy Trade

    Directory of Open Access Journals (Sweden)

    Olga Khrushcheva

    2011-05-01

    Full Text Available The energy trade between the European Union and Russia is securitized due to a combination of factors. First, there are securitizing agents within the European Union. Second, the domestic consolidation of the energy sector under governmental control, the Gazprom monopoly on transportation networks linking Central Asian gas with European markets and the state imposed-limits on foreign direct investment may also raise concerns in the European Union. Finally, Russia is also securitizing the energy sphere by claiming that the EU is trying to impose its values on Russia (for example through the Energy Charter Treaty, which contradicts Russian interests. This article combines securitization theory and the English School of thought and argues that the creation of an Energy Security Society could help de-securitize energy trade between the European Union and Russia.

  16. DETERMINATION OF CYBER SECURITY AWARENESS OF PUBLIC EMPLOYEES AND CONSCIOUSNESS-RISING SUGGESTIONS

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2016-07-01

    Full Text Available The aim of this study is to measure Turkish government employees’ awareness of cyber security and cyber space elements. Participants were 71 Turkish public employees working for various ministries. Both qualitative and quantitative research methods were used to get the most detailed information from the participants. A survey was administered to cyber security officers in chosen state institutions. For qualitative research, open-ended questions were administered to the participants. Reliability and validity issues were established for both surveys. Results show that employees have enough information about cyber security and cyber warfare. Findings clearly suggests that cyber defense policy should be planned in coordination with other state institutions and experiences should be shared. In order to create feasible and realistic cyber security policy at institutional level, experts at cyber security must be trained, hired and help must be requested from specialized individuals and institutions. This study recommends that rapid reaction teams (RRT should be established to take care of cyber systems, to react against cyber breaches in time, to alert staff for cyber-attacks in order to establish effective recovery.

  17. Security of public key encryption technique based on multiple chaotic systems

    International Nuclear Information System (INIS)

    Wang Kai; Pei Wenjiang; Zou Liuhua; Cheung Yiuming; He Zhenya

    2006-01-01

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP) m , where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications

  18. Text Messaging to Communicate With Public Health Audiences: How the HIPAA Security Rule Affects Practice

    Science.gov (United States)

    Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon

    2013-01-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902

  19. Interactions: Trade Policy and Healthcare Reform After Chaoulli v. Quebec: Is it time for Canada to acknowledge the fragile boundary between health and trade policies and strengthen the separation between private and public health insurance?

    OpenAIRE

    Crawford, Mark

    2006-01-01

    The insulation of Canada’s healthcare system from trade treaty obligations is crucial to the legitimacy of Canada’s trade policy. Legal analysis has suggested, however, that competitive and for-profit delivery of the kind contemplated by the Kirby Report and some provinces may make healthcare more vulnerable to challenges under NAFTA and GATS. The Government of Canada has tried to counter this interpretation by stressing the importance of public financing as the principal criterion for exempt...

  20. Sports Venue Security: Public Policy Options for Sear 4-5 Events

    Science.gov (United States)

    2014-06-01

    team which commands the highest attendance is the world-renowned New York Yankees franchise . The Yankees games average 10,300 people per pre-season...spectator-patron buy -in to partner with the government and private sector for funding SEAR 4–5 venue security. As shown in Chapter III, the sports...now. Further, the sports ticket buying public has also accepted the purely for profit convenience fees already attached to sporting event ticket

  1. Effect of the International Agreement on Government Procurement and the Government Procurement Chapter of the North American Free Trade Agreement on public contracting opportunities

    OpenAIRE

    Heldreth, Steven E.

    1994-01-01

    Approved for public release, distribution unlimited This paper explores the specific legal content of the 1979 and 1993 Agreements on Government Procurement as well as the North American Free Trade Agreement's Chapter Ten (Government Procurement). One chapter addresses the use of free trade agreements, associated problems, and how the agreements have been applied to the public sector. The content of each of the primary documents is an...

  2. European External Trade Policy: The Role of Ideas in German Preference Formation - www-publication

    NARCIS (Netherlands)

    Alons, G.C.

    2013-01-01

    In the literature examining European Union external trade policy, the relative influence of the Commission, the member states and interest groups are an issue of ongoing debate. This article will argue that member states can still play an important role and that a focus on member state preferences

  3. 78 FR 63271 - Request for Public Comments to Compile the Report on Technical Barriers to Trade

    Science.gov (United States)

    2013-10-23

    ... 2014 a Report on Technical Barriers to Trade (TBT Report) identifying and analyzing significant...: Questions regarding the TBT Report or substantive questions or comments concerning standards-related..., USTR (202-395-4498). SUPPLEMENTARY INFORMATION: The TBT Report sets out an inventory of standards...

  4. Confronting the wildlife trade through public education at zoological institutions in Chengdu, P.R. China.

    Science.gov (United States)

    Clayton, Susan; Bexell, Sarah; Ping, Xu; Zhihe, Zhang; Jing, Li Wen; Wei, Chen Hong; Yan, Hu

    2018-03-01

    The wildlife trade poses substantial threats to global biodiversity. China is a significant source of threatened species and also a market for wildlife products. Zoological parks (zoos), which are a popular leisure attraction in China as elsewhere, are increasingly conceptualized as places to educate visitors about both animals and environmental threats more generally. This paper reports on an attempt to inform Chinese zoo visitors about the threats presented by the wildlife trade, and about the opportunity to take personal actions to help protect wildlife. Results from a baseline survey of attitudes among 524 adult visitors to animal exhibits in Chengdu, China showed a high degree of concern about wildlife paired with a lack of confidence about what could be done. A sense of connection to nature, along with a perception of personal efficacy, were the strongest predictors of concern about the wildlife trade. Based in part on these results, an informational exhibit was designed and implemented in two locations in Chengdu. A survey of 533 visitors to assess the impact of the new exhibit showed that connection and perceived efficacy continued to predict concern, and that talking about the exhibit was associated with increased knowledge and concern. Though causality cannot be definitively concluded, results suggest that zoos have the potential to influence attitudes and perceived norms regarding the wildlife trade. By affirming the importance of a feeling of connection, the findings indicate that animal facilities may have an important role in fostering the human relationship to the natural world. © 2018 Wiley Periodicals, Inc.

  5. Secure encapsulation and publication of biological services in the cloud computing environment.

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  6. Evaluating Retirement Income Security for Illinois Public School Teachers. Public Pension Project Report

    Science.gov (United States)

    Johnson, Richard W.; Southgate, Benjamin G.

    2014-01-01

    The financial problems afflicting the Illinois teacher pension plan have grabbed headlines. An equally important problem, though underappreciated, is that relatively few teachers benefit much from the plan. This report evaluates the pension benefits provided to Illinois public school teachers. The researchers project annual and lifetime pension…

  7. The Potential Impact of the Transatlantic Trade and Investment Partnership (TTIP) on public health.

    Science.gov (United States)

    De Vogli, Roberto; Renzetti, Noemi

    2016-01-01

    This article aims to examine the potential health effects of the Transatlantic Trade and Investment partnership (TTIP). Our review indicates that, although proponents of the TTIP claim that the treaty will produce benefits to health-enhancing determinants such as economic growth and employment, evidence shows that previous trade liberalization policies are associated with increasing economic inequities. By reducing Technical Barriers to Trade (TBT) and by promoting increased cooperation between US and EU governmental agencies in the pharmaceutical sector, the TTIP could result in improved research cooperation and reduced duplication of processes. However, the TTIP chapter on Intellectual Property (IP) and Trade-Related Aspects of Intellectual Property Rights (TRIPS) that expand and extend patent monopolies, and delay the availability of generic drugs, are likely to cause underutilization of needed medications among vulnerable populations. The TTIP's Investor to State Dispute Settlement (ISDS) arbitration system, a mechanism that allows transnational companies (TNCs) to sue governments when a policy or law reduces the value of their investment, is likely to generate a negative impact on regulations aimed at increasing access to healthcare, and reducing tobacco, alcohol consumption, and diet-related diseases. The Sanitary and Phytosanitary Standards (SPS) of the TTIP is expected to weaken regulations in the food and agricultural sectors especially in the EU, with potentially negative effects on food safety and foodborne diseases. Finally, the ISDS is likely to infringe the ability of governments to tackle environmental problems such as climate change deemed to be the most important global health threat of the century. Our review concludes by discussing policy implications and the effect of the TTIP on democracy, national sovereignty and the balance of power between large TNCs and governments. It also discusses the adoption of an evidence-based precautionary principle

  8. Balancing ecosystem services with energy and food security - Assessing trade-offs from reservoir operation and irrigation investments in Kenya's Tana Basin

    Science.gov (United States)

    Hurford, A. P.; Harou, J. J.

    2014-08-01

    Competition for water between key economic sectors and the environment means agreeing allocations is challenging. Managing releases from the three major dams in Kenya's Tana River basin with its 4.4 million inhabitants, 567 MW of installed hydropower capacity, 33 000 ha of irrigation and ecologically important wetlands and forests is a pertinent example. This research seeks firstly to identify and help decision-makers visualise reservoir management strategies which result in the best possible (Pareto-optimal) allocation of benefits between sectors. Secondly, it seeks to show how trade-offs between achievable benefits shift with the implementation of proposed new rice, cotton and biofuel irrigation projects. To approximate the Pareto-optimal trade-offs we link a water resources management simulation model to a multi-criteria search algorithm. The decisions or "levers" of the management problem are volume-dependent release rules for the three major dams and extent of investment in new irrigation schemes. These decisions are optimised for eight objectives covering the provision of water supply and irrigation, energy generation and maintenance of ecosystem services. Trade-off plots allow decision-makers to assess multi-reservoir rule-sets and irrigation investment options by visualising their impacts on different beneficiaries. Results quantify how economic gains from proposed irrigation schemes trade-off against the disturbance of ecosystems and local livelihoods that depend on them. Full implementation of the proposed schemes is shown to come at a high environmental and social cost. The clarity and comprehensiveness of "best-case" trade-off analysis is a useful vantage point from which to tackle the interdependence and complexity of "water-energy-food nexus" resource security issues.

  9. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies?

    Science.gov (United States)

    Neufeld, Maria; Lachenmeier, Dirk W.; Walch, Stephan G.; Rehm, Jürgen

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia. PMID:28663784

  10. The internet trade of counterfeit spirits in Russia - an emerging problem undermining alcohol, public health and youth protection policies?

    Science.gov (United States)

    Neufeld, Maria; Lachenmeier, Dirk W; Walch, Stephan G; Rehm, Jürgen

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia.

  11. Automatic public access to documents and maps stored on and internal secure system.

    Science.gov (United States)

    Trench, James; Carter, Mary

    2013-04-01

    The Geological Survey of Ireland operates a Document Management System for providing documents and maps stored internally in high resolution and in a high level secure environment, to an external service where the documents are automatically presented in a lower resolution to members of the public. Security is devised through roles and Individual Users where role level and folder level can be set. The application is an electronic document/data management (EDM) system which has a Geographical Information System (GIS) component integrated to allow users to query an interactive map of Ireland for data that relates to a particular area of interest. The data stored in the database consists of Bedrock Field Sheets, Bedrock Notebooks, Bedrock Maps, Geophysical Surveys, Geotechnical Maps & Reports, Groundwater, GSI Publications, Marine, Mine Records, Mineral Localities, Open File, Quaternary and Unpublished Reports. The Konfig application Tool is both an internal and public facing application. It acts as a tool for high resolution data entry which are stored in a high resolution vault. The public facing application is a mirror of the internal application and differs only in that the application furnishes high resolution data into low resolution format which is stored in a low resolution vault thus, making the data web friendly to the end user for download.

  12. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  13. 7 CFR 1901.506 - Book-entry procedure for FmHA or its successor agency under Public Law 103-354 securities...

    Science.gov (United States)

    2010-01-01

    ... under Public Law 103-354 securities-issuance and redemption of certificate by Reserve bank. 1901.506... applied to such FmHA or its successor agency under Public Law 103-354 securities, the Reserve bank is... successor agency under Public Law 103-354 securities. (3) A Reserve bank as fiscal agent of the United...

  14. Designing a Secure Storage Repository for Sharing Scientific Datasets using Public Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Kumbhare, Alok [Univ. of Southern California, Los Angeles, CA (United States); Simmhan, Yogesth [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2011-11-14

    As Cloud platforms gain increasing traction among scientific and business communities for outsourcing storage, computing and content delivery, there is also growing concern about the associated loss of control over private data hosted in the Cloud. In this paper, we present an architecture for a secure data repository service designed on top of a public Cloud infrastructure to support multi-disciplinary scientific communities dealing with personal and human subject data, motivated by the smart power grid domain. Our repository model allows users to securely store and share their data in the Cloud without revealing the plain text to unauthorized users, the Cloud storage provider or the repository itself. The system masks file names, user permissions and access patterns while providing auditing capabilities with provable data updates.

  15. A discourse activist approach to studying IT-security practices in Danish public organizations

    DEFF Research Database (Denmark)

    Bager, Ann Starbæk; Holmgreen, Lise-Lotte

    plurivocality and dialogue in organizational and leadership development practices: Discussion and close up discourse analysis of dialogic practices in a leadership development forum. PhD thesis. University of Aalborg, Denmark. Deetz, S (2001): Conceptual Foundations. In: New Handbook of Organizational......With the threat of personal and organizational details being compromised through e.g. hacking, IT security is fast becoming a major concern in many organizations. In the presentation, the authors explore the potential of applying a discourse based methodological approach to the study and change...... of IT-security practices in Danish public organizations. The approach contributes to the field of Organizational Discourse Studies (ODS), in which discourse scholars are actively involved in dealing with local organizational challenges and fostering organizational change (cf. Grant & Iedema, 2005...

  16. Value Relevance vis-à-vis Disclosure on Business Combinations and Goodwill Recognized by Publicly Traded Brazilian Companies

    Directory of Open Access Journals (Sweden)

    Maíra Melo de Souza

    Full Text Available Abstract The objective of this study is to examine the value relevance of the level of disclosure on business combinations and goodwill recognized by publicly traded Brazilian companies. The research sample is composed of publicly traded Brazilian companies that carried out any type of business combination, as the acquiring entity, between 2010 and 2013, yielding a total sample of 202 observations. To measure the disclosure level of each, a metric was created based on CPC-15 R1 (2011 to examine certain disclosure items in order to render a greater level of detail. Data collection was carried out using the footnotes to the annual consolidated standardized financial statements (DFPs available from the São Paulo Stock Exchange (BM&FBOVESPA website. The results revealed that disclosure levels for business combinations are positively and significantly associated with the stock price of the companies analyzed. As to the recognition of goodwill during business combinations, despite the fact that it represents a significant share of the value of the transactions, no statistical significance explaining stock price behavior was found. It also bears mentioning that the average level of disclosure identified in the explanatory notes in the sample was very low, indicating that companies need to improve when it comes to transparency of information.

  17. Public summaries of feasibility studies conducted for the trinidad LNG project. Export trade information

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-04-01

    The study, conducted by The M. W. Kellog Company, was funded by the U.S. Trade and Development Agency on behalf of the National Gas Company of Trinidad and Tobago. It shows the results of Project Definition Phase which was implemented as a follow-up to two previous feasibility studies which were conducted for a LNG plant in Trinidad. The objective of this report is to develop a project design basis and implementation plan plus a cost estimate. The study is divided into the following sections: (1) Introduction; (2) Project Design Basis; (3) Seismic Hazard Assessment; (4) Geotechnical; and (5) Environmental Assessment.

  18. On the security of SSL/TLS-enabled applications

    OpenAIRE

    Das, Manik Lal; Samdaria, Navkar

    2014-01-01

    SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality. A large number of electronic commerce applications, such as stock trading, banking, shopping, and gaming rely on the security strength of the SSL/TLS protocol. In recent times, a potential threat, known as main-in-the-middle (MITM) attack, has been exploited by attackers of...

  19. Pushing the boundaries of the social: private agri-food standards and the governance of Fair Trade in European public procurement

    OpenAIRE

    Fisher, Eleanor; Sheppard, Hannah

    2013-01-01

    The article explores how fair trade and associated private agri-food standards are incorporated into public procurement in Europe. Procurement law is underpinned by principles of equity, non-discrimination and transparency; one consequence is that legal obstacles exist to fair trade being privileged within procurement practice. These obstacles have pragmatic dimensions, concerning whether and how procurement can be used to fulfil wider social policy objectives or to incorporate private standa...

  20. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 2; referees: 2 approved

    OpenAIRE

    Maria Neufeld; Dirk W. Lachenmeier; Stephan G. Walch; Jürgen Rehm

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm t...

  1. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 1; referees: 2 approved

    OpenAIRE

    Maria Neufeld; Dirk W. Lachenmeier; Stephan G. Walch; Jürgen Rehm

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm t...

  2. Commentary: Moving towards policy coherence in trade and health.

    Science.gov (United States)

    Walls, Helen; Baker, Phillip; Smith, Richard

    2015-11-01

    International trade has brought economic benefits to many countries, but the association of trade and investment liberalisation with poor health outcomes concerns the public health community. The need to secure more 'healthy' trade is a recognised priority, especially as countries move from global to regional/bilateral trade agreements - with greater public health risks. However, a transition towards 'healthier trade' may be hindered by worldview differences between the trade and health communities. There is a tendency for health actors to perceive trade as a threat to population health, and for trade actors to view health as a constraint to trade objectives of reducing barriers to cross-border commercial flows and economic growth. Unless such differing worldviews can be aligned, finding ways forward for addressing public health in trade policy is likely to be difficult. Moving forward will involve understanding the values and drivers of the respective groups, and developing solutions palatable to their various interests. Given the power imbalances between the two areas, it is likely that the health community will have to make the first moves in this respect. This article outlines the key issues involved and suggests areas where such moves have been, and may be made.

  3. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved. PMID:24078906

  4. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Weizhe Zhang

    2013-01-01

    Full Text Available Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  5. Shor-Preskill-type security proof for quantum key distribution without public announcement of bases

    International Nuclear Information System (INIS)

    Hwang, Won-Young; Wang Xiangbin; Matsumoto, Keiji; Kim, Jaewan; Lee, Hai-Woong

    2003-01-01

    We give a Shor-Preskill-type security proof to quantum key distribution without public announcement of bases [W.Y. Hwang et al., Phys. Lett. A 244, 489 (1998)]. First, we modify the Lo-Chau protocol once more so that it finally reduces to the quantum key distribution without public announcement of bases. Then we show how we can estimate the error rate in the code bits based on that in the checked bits in the proposed protocol, which is the central point of the proof. We discuss the problem of imperfect sources and that of large deviation in the error rate distributions. We discuss when the bases sequence must be discarded

  6. Development of nuclear power and impacts on public safety and security

    International Nuclear Information System (INIS)

    Bochmann, H.P.

    1985-01-01

    The author summarizes the contribution of nuclear power to the overall power supply in the FRG, impacts of the nuclear power industry on public safety and security, and the legal instruments available to protect the public. He concludes his discussion of facts and arguments with the following statements: protection against interference or any other harmful actions of third parties aimed against nuclear installations must be devised so as to practically guarantee prevention of sabotage or any acts of terrorism. Preventive measures have to be made with an eye to what is sensible in practice, as perfectionism might have the adverse effect. The available concept of integrated protection and engineered safety, which has been set up in 1977, will be a sufficient means of reacting to near developments and information in a flexible and effective manner. (orig./HSCH) [de

  7. The analysis of the public support, results, and the research field structure of the Czech security R

    Directory of Open Access Journals (Sweden)

    Faťun Martin

    2017-07-01

    Full Text Available The article is devoted to an analysis of the public support and results of the security oriented R&D in Czechia in the years 2011–2015. The aim is to provide a knowledge base for active participation of users of results and existing and potential beneficiaries of public support in the development of the system and programs of the security research after 2017. The introductory part of the text describes the national environment of the security R&D, and the methodology of the data analysis of projects and programs and the bibliometric analyses of results of the security research. The analysis is focused in particular upon the distribution of the public funding, and the results obtained in R&D programs financed by the Ministry of the interior (MoI. The existing overlaps between R&D activities sponsored by MoI and by other governmental bodies are also examined.

  8. Interactions: trade policy and healthcare reform after Chaoulli v. Quebec: is it time for Canada to acknowledge the fragile boundary between health and trade policies and strengthen the separation between private and public health insurance?

    Science.gov (United States)

    Crawford, Mark

    2006-01-01

    The insulation of Canada's healthcare system from trade treaty obligations is crucial to the legitimacy of Canada's trade policy. Legal analysis has suggested, however, that competitive and for-profit delivery of the kind contemplated by the Kirby Report and some provinces may make healthcare more vulnerable to challenges under NAFTA and GATS. The Government of Canada has tried to counter this interpretation by stressing the importance of public financing as the principal criterion for exemption of healthcare from trade treaties, but now the potential for private financing of essential medical services indicated by the Supreme Court's decision in Chaoulli v. Quebec has made that line of argument look risky as well. It is apparent that Canada failed to anticipate the possible interactions of domestic, international and constitutional law when it made commitments in the area of private health insurance at the WTO in 1997. Accordingly, the time has come to acknowledge the fragility of the boundary between health and trade policies, to take the risks and costs associated with trade treaty obligations fully into account when undertaking healthcare reform and to strengthen the separation between private and public health insurance.

  9. Epidemiologic Methods Lessons Learned from Environmental Public Health Disasters: Chernobyl, the World Trade Center, Bhopal, and Graniteville, South Carolina

    Directory of Open Access Journals (Sweden)

    Timothy A. Mousseau

    2012-08-01

    Full Text Available Background: Environmental public health disasters involving hazardous contaminants may have devastating effects. While much is known about their immediate devastation, far less is known about long-term impacts of these disasters. Extensive latent and chronic long-term public health effects may occur. Careful evaluation of contaminant exposures and long-term health outcomes within the constraints imposed by limited financial resources is essential. Methods: Here, we review epidemiologic methods lessons learned from conducting long-term evaluations of four environmental public health disasters involving hazardous contaminants at Chernobyl, the World Trade Center, Bhopal, and Graniteville (South Carolina, USA. Findings: We found several lessons learned which have direct implications for the on-going disaster recovery work following the Fukushima radiation disaster or for future disasters. Interpretation: These lessons should prove useful in understanding and mitigating latent health effects that may result from the nuclear reactor accident in Japan or future environmental public health disasters.

  10. Nuclear power, climate change and energy security: Exploring British public attitudes

    International Nuclear Information System (INIS)

    Corner, Adam; Venables, Dan; Spence, Alexa; Poortinga, Wouter; Demski, Christina; Pidgeon, Nick

    2011-01-01

    Public attitudes towards nuclear power in the UK have historically been deeply divided, but as concern about climate change and energy security has exerted an increasing influence on British energy policy, nuclear power has been reframed as a low-carbon technology. Previous research has suggested that a significant proportion of people may 'reluctantly accept' nuclear power as a means of addressing the greater threat of climate change. Drawing on the results of a national British survey (n=1822), the current study found that attitudes towards nuclear remain divided, with only a minority expressing unconditional acceptance. In general, people who expressed greater concern about climate change and energy security and possessed higher environmental values were less likely to favour nuclear power. However, when nuclear power was given an explicit 'reluctant acceptance' framing - allowing people to express their dislike for nuclear power alongside their conditional support - concerns about climate change and energy security became positive predictors of support for nuclear power. These findings suggest that concern about climate change and energy security will only increase acceptance of nuclear power under limited circumstances-specifically once other (preferred) options have been exhausted. - Highlights: → We report data from 2005 to 2010 of British attitudes towards nuclear power and climate change. → Changes in attitudes over the time period were relatively modest. → British population remained relatively divided on nuclear power in 2010. → Concern about climate change was negatively related to evaluations of nuclear power. → Different framings of the issue alter the balance of support for nuclear power.

  11. Nuclear power, climate change and energy security: Exploring British public attitudes

    Energy Technology Data Exchange (ETDEWEB)

    Corner, Adam; Venables, Dan [School of Psychology, Cardiff University, Tower Building, Park Place, Cardiff CF10 3AT (United Kingdom); Spence, Alexa [School of Psychology/Horizon Digital Economy Research, University of Nottingham (United Kingdom); Poortinga, Wouter [Welsh School of Architecture, Cardiff University (United Kingdom); School of Psychology, Cardiff University, Tower Building, Park Place, Cardiff CF10 3AT (United Kingdom); Demski, Christina [School of Psychology, Cardiff University, Tower Building, Park Place, Cardiff CF10 3AT (United Kingdom); Pidgeon, Nick, E-mail: pidgeonn@cardiff.ac.uk [School of Psychology, Cardiff University, Tower Building, Park Place, Cardiff CF10 3AT (United Kingdom)

    2011-09-15

    Public attitudes towards nuclear power in the UK have historically been deeply divided, but as concern about climate change and energy security has exerted an increasing influence on British energy policy, nuclear power has been reframed as a low-carbon technology. Previous research has suggested that a significant proportion of people may 'reluctantly accept' nuclear power as a means of addressing the greater threat of climate change. Drawing on the results of a national British survey (n=1822), the current study found that attitudes towards nuclear remain divided, with only a minority expressing unconditional acceptance. In general, people who expressed greater concern about climate change and energy security and possessed higher environmental values were less likely to favour nuclear power. However, when nuclear power was given an explicit 'reluctant acceptance' framing - allowing people to express their dislike for nuclear power alongside their conditional support - concerns about climate change and energy security became positive predictors of support for nuclear power. These findings suggest that concern about climate change and energy security will only increase acceptance of nuclear power under limited circumstances-specifically once other (preferred) options have been exhausted. - Highlights: > We report data from 2005 to 2010 of British attitudes towards nuclear power and climate change. > Changes in attitudes over the time period were relatively modest. > British population remained relatively divided on nuclear power in 2010. > Concern about climate change was negatively related to evaluations of nuclear power. > Different framings of the issue alter the balance of support for nuclear power.

  12. TOURISM, TRADE, EXTERNALITIES, AND PUBLIC GOODS IN A THREE-SECTOR GROWTH MODEL

    Directory of Open Access Journals (Sweden)

    Wei-Bin Zhang

    2015-06-01

    Full Text Available The purpose of this study is to introduce tourism, externalities, and public goods to a small-open growth with endogenous wealth and public goods supply. We develop the model on the basis of the Solow-Uzawa growth model, the neoclassical neoclassical growth theory with externalities, and ideas from tourism economics. The economy consists of three – service, industrial, and public - sectors. The production side is based on the traditional growth theories, while the household behavior is described by an alternative utility function proposed by Zhang. We introduce endogenous land distribution between housing and supply of services. The industrial and service sectors are perfectly competitive subject to the government’s taxation. The public sector is financially supported by the government. We introduce taxes not only on producers, but also on consumers’ incomes from wage, land, and interest of wealth, consumption of goods and services, and housing. We simulate the motion of the national economy and show the existence of a unique stable equilibrium. We carry out comparative dynamic analysis with regard to the rate of interest in the global market, the total productivity of the service sector, tax rate on the service sector, tax rate on consumption of services, human capital, the propensity to consume services, and the impact of public services on the productivity of the industrial sector. The comparative dynamic analysis provides some important insights into the complexity of open economies with endogenous wealth, public goods, and externalities.

  13. Trade-Off or Convergence? The Role of Food Security in the Evolution of Food Discourse in Italy

    Science.gov (United States)

    Brunori, Gianluca; Malandrin, Vanessa; Rossi, Adanella

    2013-01-01

    In this paper we analyse the role that "food security" has played in the evolution of the food discourse in Italy, a country with a strong and internationally recognized food culture. We identify three phases of this evolution: in the first phase, from the end of the Second World War to the end of the 1980s, the "modernization"…

  14. The Free Trade Area of the Americas: Can Regional Economic Integration Lead to Greater Cooperation on Security?

    National Research Council Canada - National Science Library

    Sandoval, Thomas

    2002-01-01

    ...) and its impact on cooperative security in the Western Hemisphere. Similar to the l990s, when the U.S. government debated the pros and cons of the NAFTA, the United States now faces a debate over passage and implementation of the FTAA...

  15. The trend toward free trade areas: economic consequences and policy implications for the United States

    OpenAIRE

    All, William H., IV

    1992-01-01

    Approved for public release; distribution is unlimited Because America's economy relies to a significant degree on export markets and external sources of raw materials, the health of the international trading system is critical to the national security of the United States. This thesis demonstrates that the organization on which America has relied for the management of the international trading system since the 1950s, the General Agreement on Tariffs and Trade (GATT), is failing to effect...

  16. The role of Securities and Exchange Commission (S.E.C.) in public ...

    African Journals Online (AJOL)

    ... to invest in any security, the Securities and Exchange Commission requires ... may easily take advantage of investors, where correct and timely information ... Investment and securities business in Nigeria is carried out in the capital market.

  17. Restrictions on European Union Citizens’ Freedom of Movement and Residence in the Country on Grounds of Public Policy, Public Security and Public Health

    Directory of Open Access Journals (Sweden)

    Junevičius Algis

    2016-02-01

    Full Text Available The free movement of persons is one of the most successful European Union projects, serving as a majorly important factor promoting the European integration processes. The adoption of the Treaty on the European Union and the creation of EU citizenship implemented significant changes: the status of EU citizens and their right to move and reside freely within the territory of the Member States can no longer be interpreted in the way it was before the adoption of the Treaty on the European Union. There are no requirements for EU citizens within the Treaty to pursue professional or independent activities or to work under an employment contract in order to access provided rights. However, the right of free movement is not unlimited. The administrations of the Member State governments are authorized to impose restictions on the free movement of citizens. In the light of these facts, this article examines exceptions in the field of free movement of persons and indentifies concepts of public policy, public security and public health. Special attention is given to so-called rule limitation of restrictions and to the mechanism of protection against expulsion from the country. The article concludes by saying that the institutions of Member State governments have the right to evaluate threats within the territory of the country and to decide on the content of public security by themselves. However, their discretion can not be used as an instrument to treat the conduct of other Member State citizens in a worse way than that of their own local citizens.

  18. TTI Phase 2 Institutional Support: Kenya Institute for Public Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... public expenditure management, food security, tourism, regional integration and trade, private-sector development, education, poverty, infrastructure, service ... internal goals and targets are met and to assess the impact of KIPPRA's work

  19. 78 FR 47813 - In the Matter of Bergamo Acquisition Corp.; Order of Suspension of Trading

    Science.gov (United States)

    2013-08-06

    ... there is a lack of current and accurate information concerning the securities of Bergamo Acquisition... Bergamo's business operations and financial condition. The Commission is of the opinion that the public interest and the protection of investors require a suspension of trading in the securities of Bergamo...

  20. 77 FR 59690 - Titan Resources International, Corp.; Order of Suspension of Trading

    Science.gov (United States)

    2012-09-28

    ... a lack of current and accurate information concerning the securities of Titan Resources... concerning Titan's business operations and financial condition. The Commission is of the opinion that the public interest and the protection of investors require a suspension of trading in the securities of...

  1. Recrafting in/formality, leveraging public market trade in Baguio, Philippines

    Directory of Open Access Journals (Sweden)

    B. Lynne Milgram

    2017-12-01

    Full Text Available With growing urbanization, Southern governments often privilege large-scale developments that frustrate urbanites’ livelihood needs. In Baguio, Philippines public marketers counter such top-down disenfranchisement by operationalizing formal “advocacy” and informal “everyday” politics. That authorities negotiate agreements to accept payments for marketers’ infractions, I argue, materializes complex and complicit intersections of formal/informal and legal/illegal practices.

  2. Work ability and health of security guards at a public University: a cross-sectional study.

    Science.gov (United States)

    Godinho, Marluce Rodrigues; Ferreira, Aldo Pacheco; Greco, Rosangela Maria; Teixeira, Liliane Reis; Teixeira, Maria Teresa Bustamante

    2016-01-01

    to evaluate the work ability and health status of security guards at a public University. a cross-sectional, descriptive, and analytical study was carried with 119 security guards. The following instruments were used: Work Ability Index (WAI), Patient Health Questionnaire (PHQ-9), International Physical Activity Questionnaire (IPAQ, short), Alcohol Use Disorders Identification Test (AUDIT), Medical Outcomes Study (MOS), and Demand-Control-Support (DCS). Descriptive statistics were used to describe the study samples and the Spearman's coefficient correlation was performed to assess the WAI. Significance level was set at 5%. samples were composed by men; the mean age was 54.9 years (SD=5.7); 80% had partners, and 75% had basic education. The majority (95%) had only one job, the average length of service was 24.8 years (SD=11), ranging from 3 to 43 years. 88.9% worked ≤40 hours and 75% did not work at night shift or rotating shifts. The average score given to work ability was good (40.7 points), with significant correlation to social support at work (p-value=0.002), health conditions (p-value=0.094), and depression symptoms (p-value=0.054). this study showed that many characteristics might affect the work ability scores. Considering the results, we note that healthy life habits and a reorganization of work environments should be encouraged.

  3. Infrastructure to support trading strategies against the occurrence of extraordinary events: Secure area of the equipment storage

    International Nuclear Information System (INIS)

    Blas Gordo, A. de; Asensio Vega, J.; Fernandez Morales, E. J.; Font Hadinger, I.

    2013-01-01

    Compliance with the requirements specified in the Technical Instructions ITC and ITC-1-2, issued by the Nuclear Safety Council (CSN), is conducting exhaustive analyzes on coping in Nuclear Power Plants emergencies due to the occurrence extraordinary events. As part of the necessary infrastructure, a secure area for parking and storage of projects teams involved in the development of various operational strategies. The design of it ensures compliance with all regulatory and practical requirements, ensuring minimization strategies and time functionality in the application of the same.

  4. Trading Justice for Security? UN Anti-Terrorism, Due Process Rights, and the Role of the Judiciary: Lessons for policymakers

    OpenAIRE

    Draghici, Carmen

    2009-01-01

    The purpose of this policy paper is to highlight the role\\ud of the judiciary in reconciling counter-terrorism strategies\\ud with human rights standards. Indeed, judicial assent\\ud to the excesses of policy-makers risks deepening the\\ud human rights crisis caused by the fight against apocalyptic\\ud terrorism. In the aftermath of the September 11, 2001\\ud terrorist attacks against the United States, the political\\ud climate has been dominated by security concerns. The\\ud United States has invo...

  5. Implications of the World Trade Center Health Program (WTCHP) for the public health response to the Great East Japan Earthquake

    International Nuclear Information System (INIS)

    Crane, Michael A.; Cho, Hyunje G.; Landrigan, Phillip J.

    2014-01-01

    The attacks on the World Trade Center (WTC) on September 11, 2001 resulted in a serious burden of physical and mental illness for the 50,000 rescue workers that responded to 9/11 as well as the 400,000 residents and workers in the surrounding areas of New York City. The Zadroga Act of 2010 established the WTC Health Program (WTCHP) to provide monitoring and treatment of WTC exposure-related conditions and health surveillance for the responder and survivor populations. Several reports have highlighted the applicability of insights gained from the WTCHP to the public health response to the Great East Japan Earthquake. Optimal exposure monitoring processes and attention to the welfare of vulnerable exposed sub-groups are critical aspects of the response to both incidents. The ongoing mental health care concerns of 9/11 patients accentuate the need for accessible and appropriately skilled mental health care in Fukushima. Active efforts to demonstrate transparency and to promote community involvement in the public health response will be highly important in establishing successful long-term monitoring and treatment programs for the exposed populations in Fukushima. (author)

  6. The “geotoxicology” of airborne particulate matter: implications for public health, public policy, and environmental security (Invited)

    Science.gov (United States)

    Plumlee, G. S.; Morman, S. A.

    2009-12-01

    substantial public health risk. PM is at the core of diverse policy issues related to air quality, public health, and environmental security, at scales from local to global. Interdisciplinary earth and health science investigations are crucial to the development of effective policy. For example, earth science input will be key for understanding and managing potential risks associated with living on or near asbestos-containing rocks. Particularly in dry climates, a better understanding of the roles of geogenic PM versus anthropogenic PM as triggers of disease is needed in the development of appropriate air quality regulations at local to regional scales; this issue will only increase in importance in the future as human inhabitation increases in some arid regions, and as arid regions expand or shift due to climate change or human-induced stresses. Over the last decade, it has been recognized that dusts can transport contaminants and pathogens between continents. Hence, human practices and policies that influence dust generation in one continent or country may ultimately have an impact on public health, policy, and environmental security in distant downwind countries.

  7. 17 CFR 270.32a-2 - Exemption for initial period from vote of security holders on independent public accountant for...

    Science.gov (United States)

    2010-04-01

    ... from vote of security holders on independent public accountant for certain registered separate accounts... from vote of security holders on independent public accountant for certain registered separate accounts... 32(a) of the Act that selection of an independent public accountant shall have been submitted for...

  8. Measuring the Information Content of Stock Trades.

    OpenAIRE

    Hasbrouck, Joel

    1991-01-01

    This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE issues suggest a trade's full price impact arrives only with a protracted lag; the impact is a positive and concave function of the trade size; large trades cause the spread to widen; trades occurring in ...

  9. Trade-offs between worker risk and public risk during remediation at DOE sites

    International Nuclear Information System (INIS)

    Beam, B.N.; Morris, J.; Blaylock, B.; Travis, C.

    1995-01-01

    Within the next 30 years, the US Department of Energy (DOE) Environmental Restoration Program will be responsible for remediating thousands of waste sites across the DOE complex. A major concern during remediation will be the protection of thousands of workers engaged in the remediation. In addition to well know safety hazards associated with conventional construction operations, remedial workers at DOE will encounter radiation and chemical exposures from radioactive, hazardous, and mixed waste. Although historically represented as minimal due to a paucity of data related to worker exposures during remediation, potential worker health risk is an important factor that must be taken into account in the selection of remedial strategies, and the potential risk reduction offered by a remedial strategy must be weighed against the potential worker risk incurred during its implementation. Analysis has shown a trend that the worker risk incurred outweighs,the benefits of risk reduction to the public

  10. 77 FR 34127 - Notice of Open Public Hearing

    Science.gov (United States)

    2012-06-08

    ... trade and economic relationship with China. The June 14 hearing is aimed at sharpening our understanding... U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION Notice of Open Public Hearing AGENCY: U.S.-China Economic and Security Review Commission. ACTION: Notice of open public hearing--June 14, 2012...

  11. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    Science.gov (United States)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  12. New government to make social security cutbacks

    NARCIS (Netherlands)

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  13. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  14. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data.

    Science.gov (United States)

    Becker, Cinda

    2006-02-20

    Consumers who claimed in recent surveys that they were "more afraid of cyber crimes than physical crimes" may have had reason for caution. A spate of well-publicized information thefts and security breaches at healthcare organizations have eroded trust in technology, says Carol Diamond, left, of the Markle Foundation, and that could have an adverse effect on acceptance of electronic medical records.

  15. 17 CFR 13.6 - Promulgation of rules; publication.

    Science.gov (United States)

    2010-04-01

    ...; publication. 13.6 Section 13.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PUBLIC RULEMAKING PROCEDURES § 13.6 Promulgation of rules; publication. After consideration of all relevant matters... also be made in the Federal Register if a proposal is subsequently withdrawn. The required publication...

  16. A U.S. Perspective on Nuclear Liability: A Continuing Impediment to International Trade and Public Protection

    International Nuclear Information System (INIS)

    Brown, O. F.

    2008-01-01

    More than two decades after the 1986 events at Chernobyl demonstrated nuclear power plant accidents can have cross-border consequences, there still is not a unified international legal regime for liability associated with nuclear accidents. This continues to present an impediment to international nuclear trade and protection of the public. Liability potentially associated with international nuclear commerce remains a labyrinth of statutes and treaties not yet interpreted by the courts. Countries with a majority of the world's 439 operating nuclear power plants are not yet parties to any nuclear liability convention in force. The global Vienna Convention on Civil Liability for Nuclear Damage now covers only about 73 operating nuclear power plants; the regional Paris Convention on Third Party Liability in the Field of Nuclear Energy now covers about 126; and, the Joint Protocol that links those two Conventions covers only about 68. The best solution would be for more countries to join the United States (with 104 operating nuclear power plants) in ratifying the Convention on Supplementary Compensation for Nuclear Damage (CSC) adopted by the International Atomic Energy Agency (IAEA) in 1997. As soon as the CSC enters into force, it will cover more nuclear power plants than either the Vienna or Paris Convention. This presentation also provides an update on insurance coverage in the United States for acts of terrorism.(author)

  17. Excess control rights: a study about its reflex on the cost of debt of publicly traded Brazilian companies

    Directory of Open Access Journals (Sweden)

    Jonatan Marlon Konraht

    2016-08-01

    Full Text Available This study analyzes the effect of excess control on the cost of debt in publicly traded Brazilian companies. Its objective is to determine whether a higher misalignment between voting rights and cash flow rights held by controlling shareholder causes an increase in agency cost of debt. For the analysis of the research problem, it was used panel data regression with random effects, in which was compared the level of excess control and the firms cost of debt. The results indicate that there is a positive and statistically significant association between excess control and the cost of debt. This suggests that creditors interpret this misalignment as a control entrenchment, which increases the credit risk, and thereby, increases the cost of debt. From the scientific point of view, the contribution to the literature provided by this study is the finding that ownership structure bears an impact in the creditor perceptions of risk, and thus, the cost of debt. These results can assist in developing actions to reduce the cost of debt, which implies the maximization of the economic performance of firms that have third-party capital in its capital structure. Its social contribution is the distinction of the firms exposed to a higher level of cost of debt, identifying ways to maximize resources, that is a relevant aspect especially in times of crisis whose effects can be very varied, such as bankruptcies, massive layoffs and default.

  18. Public Enterprises in Estonia as Instruments of Foreign Trade. Estnische öffentliche Unternehmen als Instrumente der Außenwirtschaftspolitik

    Directory of Open Access Journals (Sweden)

    Peter Friedrich

    2016-10-01

    Full Text Available The authors discuss whether a small country with shrinking population should apply public enterprises to improve its economic situation for purposes of external economic relations policy. The study refers to Estonia as an example. Estonia has developed public enterprises of the central state and of the municipalities since the reestablishment of the Estonian Republic. As public enterprise use private forms of law, some management problems occur because public firms are legally obliged to practice the management by objectives. The operationalization of welfare maximisation or achievement of sustainability of society to formulate goals for public enterprises was yet not successful. However, public firms should increase income, avoid monopoly positions of private firms, provide special public services, and should realize public goals. The activities of Estonian public enterprises and their goals show that Estonian enterprises can be used as instruments for foreign trade. The authors formulate a simple two-country model comprising a small and a big country. They introduce a public interest function referring to production, demand and employment, which allows the authors to argue that under conditions of shrinking population, the small country’s public interests, becomes reduced. They show that employing public enterprises diminishes negative effects on public interests. Even some types of inefficient public firms may lead to improvements.

  19. 75 FR 11986 - Public Comments for Multilateral Negotiations in the World Trade Organization on Expansion of the...

    Science.gov (United States)

    2010-03-12

    ... the World Trade Organization on Expansion of the Lists of Pharmaceutical Products Receiving Zero... members of the World Trade Organization (WTO). The specific information being sought is described in the... World Health Organization (WHO). (Table 1 currently includes INNs from WHO lists 1-93.) Prefixes and...

  20. Managing the Trade-Public Health Linkage in Defence of Trade Liberalisation and National Sovereignty: An Appraisal of United States-Measures Affecting the Production and Sale of Clove Cigarettes

    Directory of Open Access Journals (Sweden)

    Tapiwa Victor Warikandwa

    2014-11-01

    Full Text Available Under the legal framework of the World Trade Organisation (WTO, countries have great flexibility to unilaterally adopt environmental regulations that have effect within their territories only. However, the same discretion does not apply to measures that adversely affect imports or exports. An absence of clear guidelines on how to address some of the attendant issues poses challenges to the effectiveness of a trade-environment linkage. Not surprisingly, attempts to link the environment and trade have resulted in a number of jurisprudentially significant cases in which the WTO's Panel and Appellate Body have tried to address critical questions about the Organisation's capacity to address or manage legal or quasi-legal subjects falling outside the scope of its legal framework. In this regard the Panel and Appellate Body reports in the case of United States - Measures Affecting the Production and Sale of Clove Cigarettes (US-Clove Cigarettes have re-ignited the debate on the Organisation's existential challenge of balancing the rights of the sovereign to freely regulate matters pertaining to health or the environment within its domestic domain with the need to maintain the sanctity of the multilateral trade order. This article demonstrates that in the US-Clove Cigarettes case the WTO Panel and Appellate Body, whilst managing to successfully defend the integrity of WTO Member States' treaty commitments and the overarching importance of trade liberalisation within the organisation's policy foundations even in the context of public health-related regulations, failed to provide any substantive affirmation of the development-related challenges facing developing countries that are part of the WTO family.

  1. 76 FR 33803 - Order of Suspension of Trading

    Science.gov (United States)

    2011-06-09

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading June 7, 2011... trading in the securities of the above-listed companies. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...

  2. Resilient patriarchy: public authority and women's (in)security in Karamoja, Uganda.

    Science.gov (United States)

    Hopwood, Julian; Porter, Holly; Saum, Nangiro

    2018-01-01

    This paper draws on fieldwork conducted in 2011 and 2016 to explore the differing experiences of Karamojong women following the Government of Uganda's most recent disarmament programme. Besides being deprived of their guns, Karamojong communities have lost most of the cattle on which their livelihoods and way of life were centred. The study assesses whether or not women's experience of patriarchy has changed in these new circumstances, and, if so, how this impacts on their security and control of resources, or the absence of them. It maps, using information primarily supplied by women, public authorities from below, and evaluates if and how they respond to women's protection and survival needs, as well as if current development/humanitarian interventions are of sustainable benefit to Karamojong women. The paper concludes that apparent shifts in gender relations are probably superficial, contingent on continuing food aid, and that economic development and positive social change for women remain elusive. © 2018 The Author(s). Disasters © Overseas Development Institute, 2018.

  3. Opening of energy markets: consequences on the missions of public utility and of security of supplies in the domain of electric power and gas

    International Nuclear Information System (INIS)

    2001-01-01

    This conference was jointly organized by the International Energy Agency (IEA) and the French ministry of economy, finances, and industry (general direction of energy and raw materials, DGEMP). It was organized in 6 sessions dealing with: 1 - the public utility in the domain of energy: definition of the public utility missions, experience feedback about liberalized markets, public utility obligation and pricing regulation; 2 - the new US energy policy and the lessons learnt from the California crisis; 3 - the security of electric power supplies: concepts of security of supplies, opinion of operators, security of power supplies versus liberalization and investments; 4 - security of gas supplies: markets liberalization and investments, long-term contracts and security of supplies; 5 - debate: how to integrate the objectives of public utility and of security of supplies in a competing market; 6 - conclusions. This document brings together the available talks and transparencies presented at the conference. (J.S.)

  4. 77 FR 20445 - eMax Worldwide, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-04-04

    ... Trading April 2, 2012. It appears to the Securities and Exchange Commission that the public interest and... shareholders of record. eMax Worldwide, Inc. is quoted on OTC Markets Group Inc. under the ticker EMXC. The Commission is of the opinion that the public interest and the protection of investors require a suspension of...

  5. DOE contractor trade network: a decade of experience in training resource exchange

    International Nuclear Information System (INIS)

    Croll, P.; Weseman, M.

    1989-01-01

    Training Resources and Data Exchange (TRADE) refers to a series of activities designed to increase communication and exchanges of ideas, information, and resources among US Department of Energy contractor operated facilities in the field of training and human resource development. TRADE activities are planned and implemented by the DOE Contractor TRADE Executive Committee. TRADE objectives are accomplished through conference workshops, publications, and special interest groups. TRADE special interest groups include the following: computer-based training, emergency preparedness, industrial hygiene training, human resource issues, radiation protection training, safeguards and security training. The authors discuss how TRADE has evolved to meet changing contractor needs to improve human performance over the last 10 years. TRADE currently has working agreements to share training information with INPO, the Federal Laboratories Consortium, and the National Registry of Radiation Protection Technologists

  6. 77 FR 56697 - Technology and Trading Roundtable

    Science.gov (United States)

    2012-09-13

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67802; File No. 4-652] Technology and Trading... Trading: Promoting Stability in Today's Markets'' to discuss ways to promote stability in markets that... Trading and Markets, Securities and Exchange Commission, 100 F Street NE., Washington, DC 20549-7010. By...

  7. Being in Community: A Food Security Themed Approach to Public Scholarship

    Science.gov (United States)

    Harrison, Barbara; Nelson, Connie; Stroink, Mirella

    2013-01-01

    For six years the Food Security Research Network at Lakehead University, Canada, has been engaged in an interdisciplinary theme-based service-learning initiative focusing on food security. Informed by complexity theory, the contextual fluidity partnership model brings community partners, students, and faculty into a nexus through which new…

  8. Security audits of multi-tier virtual infrastructures in public infrastructure clouds

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Schunter, Matthias; Probst, Christian W.

    2010-01-01

    Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low upfront investments, are shadowed by security challenges which inhibit its adoption....... Managed through a web-services interface, users can configure highly flexible but complex cloud computing environments. Furthermore, users misconfiguring such cloud services poses a severe security risk that can lead to security incidents, e.g., erroneous exposure of services due to faulty network...... security configurations. In this article we present a novel approach in the security assessment of the end-user configuration of multi-tier architectures deployed on infrastructure clouds such as Amazon EC2. In order to perform this assessment for the currently deployed configuration, we automated...

  9. Trade Policy

    OpenAIRE

    Murray Gibbs

    2007-01-01

    In an otherwise insightful and thoughtful article, Sebastian Pfotenhauer (Trade Policy Is Science Policy,” Issues, Fall 2013) might better have entitled his contribution “Trade Policy Needs to Be Reconciled with Science Policy.” The North American Free Trade Agreement (NAFTA) and the agreements administered by the World Trade Organization, particularly the General Agreement on Tariffs and Trade (GATT) and the Technical Barriers to Trade (TBT), were adopted to promote international trade and i...

  10. Track 7: policy and public interest U.S.-Russian nuclear security cooperation: navigating the present realities. Panel Discussion

    International Nuclear Information System (INIS)

    Hayden, N.K.; Hayden-Prindle, Nancy; McCarthy, Maureen; Rich, John; Graham, Thomas Jr.; Mizin, Victor; Cagan, Debra; Alessi, Vic

    2001-01-01

    Full text of publication follows: In the 10 yr since the beginning of cooperation between the United States and the Russian Federation on nuclear security and nonproliferation issues, the political, economic, and security environment governing the nuclear security cooperation has evolved and, in some cases, undergone dramatic changes. On one hand, the protection of nuclear weapons and materials continues as an urgent national security concern for both the United States and Russia. At the same time, defense infrastructures have been closed or converted to civilian purposes, and there has been increased activity in international cooperation for civilian nuclear technology. This special panel will explore the future of the U.S.-Russia nuclear cooperation with particular attention to the following three themes. Theme 1: Managing the Risks: U.S.-Russian Federation Cooperative Programs for Nuclear Weapons and Materials Security; Theme 2: Creating the Benefits: The Changing Nature of Russia's Domestic Nuclear Industry; Theme 3: Addressing the Impediments: United States and Russia as Nuclear Exporters: Reconciling Nonproliferation Goals, Technology Advancements, and Economic Incentives

  11. The Risks of Strategic Decisions in the Sphere of Financial and Economic Security of Public-Private Partnership

    Directory of Open Access Journals (Sweden)

    Solodovnik Olesia O.

    2017-06-01

    Full Text Available The article is aimed at studying and substantiating the theoretical and methodological aspects of development, analysis and assessment of strategic decisions in the sphere of financial and economic security of public-private partnership (PPP in the context of the risks of their implementation. A study on the essence and characteristics of strategic decisions in the sphere of financial and economic security of PPP has led to the conclusion that each such decision should be considered and assessed in the context of the risks of its implementation, and the risk theory could be seen as the scientific basis for defining strategic alternatives and developing a criteria base for assessing them. The article proposes a list and systematization of the PPP risks that allow to: itemize the risks to the external and internal environment of PPP and to identify the prerequisites and sources of threats to the financial and economic interests of parties to the partnership; analyze and evaluate the strategic alternatives for risk distribution among partners in the context of implications for financial and economic security of PPP; determine the risks of achieving the objectives of the strategy for financial and economic security of PPP and to evaluate alternative strategies in terms of partners; account the potential occurrence and development of systemic risks and threats to the financial and economic security of PPP, as well as the use of complementary protective mechanisms; evaluate the results of a strategy to protect the financial and economic interests of parties to the PPP.

  12. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  13. Are more restrictive food cadmium standards justifiable health safety measures or opportunistic barriers to trade? An answer from economics and public health

    International Nuclear Information System (INIS)

    Figueroa B, Eugenio

    2008-01-01

    In the past, Cd regulations have imposed trade restrictions on foodstuffs from some developing countries seeking to access markets in the developed world and in recent years, there has been a trend towards imposing more rigorous standards. This trend seems to respond more to public and private sectors strategies in some developed countries to create disguised barriers to trade and to improve market competitiveness for their industries, than to scientifically justified health precautions (sanitary and phytosanitary measures) and/or technical barriers to trade acceptable under the Uruguay Round Agreement of the WTO. Applying more rigorous Cd standards in some developed countries will not only increase production costs in developing countries but it will also have a large impact on their economies highly dependent on international agricultural markets. In the current literature there are large uncertainties in the cause-effect relationship between current levels of Cd intakes and eventual health effects in human beings; even the risk of Cd to kidney function is under considerable debate. Recent works on the importance of zinc:Cd ratio rather than Cd levels alone to determine Cd risk factors, on the one hand, and on the declining trends of Cd level in foods and soils, on the other, also indicate a lack of scientific evidence justifying more restrictive cadmium standards. This shows that developing countries should fight for changing and making more transparent the current international structures and procedures for setting sanitary and phytosanitary measures and technical barriers to trade

  14. Are more restrictive food cadmium standards justifiable health safety measures or opportunistic barriers to trade? An answer from economics and public health.

    Science.gov (United States)

    Figueroa B, Eugenio

    2008-01-15

    In the past, Cd regulations have imposed trade restrictions on foodstuffs from some developing countries seeking to access markets in the developed world and in recent years, there has been a trend towards imposing more rigorous standards. This trend seems to respond more to public and private sectors strategies in some developed countries to create disguised barriers to trade and to improve market competitiveness for their industries, than to scientifically justified health precautions (sanitary and phytosanitary measures) and/or technical barriers to trade acceptable under the Uruguay Round Agreement of the WTO. Applying more rigorous Cd standards in some developed countries will not only increase production costs in developing countries but it will also have a large impact on their economies highly dependent on international agricultural markets. In the current literature there are large uncertainties in the cause-effect relationship between current levels of Cd intakes and eventual health effects in human beings; even the risk of Cd to kidney function is under considerable debate. Recent works on the importance of zinc:Cd ratio rather than Cd levels alone to determine Cd risk factors, on the one hand, and on the declining trends of Cd level in foods and soils, on the other, also indicate a lack of scientific evidence justifying more restrictive cadmium standards. This shows that developing countries should fight for changing and making more transparent the current international structures and procedures for setting sanitary and phytosanitary measures and technical barriers to trade.

  15. 17 CFR 240.12f-3 - Termination or suspension of unlisted trading privileges.

    Science.gov (United States)

    2010-04-01

    ... unlisted trading privileges. 240.12f-3 Section 240.12f-3 Commodity and Securities Exchanges SECURITIES AND... Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-3 Termination or suspension of unlisted trading privileges. (a) The issuer of any security for which unlisted trading privileges...

  16. Cybersecurity via Intermediaries : Analyzing Security Measurements to Understand Intermediary Incentives and Inform Public Policy

    NARCIS (Netherlands)

    Asghari, H.

    2016-01-01

    Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure

  17. Safeguarding National Security Through Public Release of Environmental Information: Moving the Debate to the Next Level

    National Research Council Canada - National Science Library

    Jacobson, Joseph

    2002-01-01

    ..., and the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act The article then focuses on the current state of the law regarding release or withholding of chemical-hazard information...

  18. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    .... This thesis defines interoperability as the capacity to support trust through retention of security services across PKI domains at a defined level of assurance and examines the elements of PKI...

  19. A Public Choice Approach to the Unequal Treatment of Securities Market Participants and Home Borrowers

    Directory of Open Access Journals (Sweden)

    Jonathan Macey

    2017-01-01

    Full Text Available This article contrasts the protections provided to participants in U.S. securities markets with the protections provided to participants in the U.S. mortgage markets. Participants in securities markets purchase and sell equity and debt securities. Participants in the mortgage markets borrow money to buy homes, using those homes as collateral for the mortgage loans they receive. Even after Dodd-Frank, participants in securities markets are afforded significantly higher levels of protection than participants in mortgage markets. The doctrine of suitability is a prime example of this inequity. Exploring possible explanations for this odd asymmetry of treatment, I conclude that interest group politics is to blame for the anomaly.

  20. BEHAVIORAL BIASES IN TRADING SECURITIES

    Directory of Open Access Journals (Sweden)

    Turcan Ciprian Sebastian

    2010-12-01

    Full Text Available The main thesis of this paper represents the importance and the effects that human behavior has over capital markets. It is important to see the link between the asset valuation and investor sentiment that motivate to pay for an asset a certain prices over/below the intrinsic value. The main behavioral aspects discussed are emotional factors such as: fear of regret, overconfidence, perseverance, loss aversion ,heuristic biases, misinformation and thinking errors, herding and their consequences.

  1. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    Nuclear power infrastructures could be the target of terrorist acts of theft, sabotage, unauthorized access or other malicious acts given their radiological and chemical content and potential for building weapons. Attacks on its major components, including fuel production, reactors, waste handling, and reprocessing facilities, would lead to serious consequences-even if there is little or no damage to a nuclear power plant itself and other related structures. Public fear of nuclear radiation, in combination with a possibly massive resultant blackout and other aggravating factors, could create significant distress and panic. In other words, successful terrorist attempts to attack nuclear power infrastructure can easily bring about systemic disaster. Systemic risks impact society on a large scale and their effects may spread much further from the original hazardous source. Those risks widely affect systems that society depends on, such as health, transport, environment, telecommunications. Their consequences may be technical, social, environmental, psychological and economic and involve different stakeholders. In this context, however, one important stakeholder has been under-appreciated, under-utilized and somewhat misunderstood: the general public. The nuclear power infrastructure must learn how to efficiently communicate to the public and develop better options for public risk communication that relate to deliberate attacks or accidents. The public is also a challenging stockholder because citizens are deeply split regarding the acceptability and value of nuclear power generation and tend to express their feelings emotionally. However, there is growing recognition that because of skyrocketing oil prices and evidence of the greenhouse effect, nuclear power may be approaching renaissance. Hence, the public must no longer be looked upon only as potential victims or panicked masses but rather as an important contributing factor for better nuclear security throughout

  2. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    Science.gov (United States)

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  3. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system [research brief].

    Science.gov (United States)

    2012-03-01

    Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....

  4. 17 CFR 242.301 - Requirements for alternative trading systems.

    Science.gov (United States)

    2010-04-01

    ... trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... FUTURES Regulation Ats-Alternative Trading Systems § 242.301 Requirements for alternative trading systems. (a) Scope of section. An alternative trading system shall comply with the requirements in paragraph...

  5. 17 CFR 155.4 - Trading standards for introducing brokers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for introducing brokers. 155.4 Section 155.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.4 Trading standards for introducing brokers. (a) Each introducing broker...

  6. 17 CFR 155.2 - Trading standards for floor brokers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for floor brokers. 155.2 Section 155.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.2 Trading standards for floor brokers. Each contract market shall adopt and submit...

  7. Non-state security governances and the implications for local-level citizenship in Danish semi-public city spaces

    DEFF Research Database (Denmark)

    Jensen, Thomas Søgaard

    directed at promoting peace and restoring the feel good factor - in public city space in Denmark. What precisely "security" is, what it should mean, and what should be done to guarantee it, has always been contested on an empirically level. The reason for this is that security often deals with social order......, being both the ontological condition of order, in the sense of absence of "real" and culturally constructed dangers, risks, and anxieties, and the political means to ensure this order. Based on a 5 month ethnographic field work among private security guards policing new kinds of public city spaces...... the globalisation and privatisation/commercialisation of security provision and how this development can be explained. Drawing on my own empirical data I hereafter argue that commercial security governance and local understandings of threats to (feelings of) security are not so much shaped by imaginaries...

  8. Do Managers Face a Performance Trade-off?

    DEFF Research Database (Denmark)

    Mikkelsen, Maria Falk

    2017-01-01

    equity, accountability, and procedural justice. However, our knowledge of whether such trade-offs exist is scarce. Using an administrative 10-year panel data set of Danish public schools and principals, this paper analyzes trade-offs between production performance (measured by student performance...... and student pass rate) and process performance (measured by equity, accountability, and procedural justice). Results show no evidence of trade-offs. In contrast, principals who succeed in raising student performance generally also succeed in securing high pass rates, high equity, high accountability, and high...... procedural justice. These results suggest that managers who are able to secure high performance on one dimension of performance will likely also be high performing on other performance dimensions....

  9. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    Science.gov (United States)

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV.

  10. 75 FR 17089 - Request for Public Comment on the Federal Trade Commission’s Implementation of the Children’s...

    Science.gov (United States)

    2010-04-05

    ..., mobile geolocation information, or information collected in connection with online behavioral advertising... Advertising Practices, Federal Trade Commission, Washington, D.C. 20580. SUPPLEMENTARY INFORMATION: Section I... environment over the past five years, including but not limited to children's increasing use of mobile...

  11. Economic estimation of the external effect on the security of energy and public acceptance for nuclear power plants in Japan

    International Nuclear Information System (INIS)

    Fujimoto, Noboru; Morita, Koji; Fukuda, Kenji

    2000-01-01

    Energy taxes in Japan, i. e., three laws of electric power source, crude oil customs duties and oil taxes, as well as the fuel stock of the power plants have been investigated, and the economical estimation for the nuclear power generation has been carried out from standpoints of the security of energy and public acceptance. For the security, it has been clear that the nuclear power is advanced in internalization of fuel stock by external economy and diversification of electric power source by external diseconomy, but oil and LNG thermal power generation is not sufficiently internalized. None of the power source has paid for the compensation for the risk in public acceptance. The fuel stock for the thermal power is estimated to be for about one week to a month, whereas nuclear power plants have a potential stock that lasts for 3 years. The external effect could go up to 35 billion yen if it is converted to fuel. The predominance, therefore, of the nuclear power for the security of energy is confirmed. Also, it is presumable that the external cost for the fuel stock, so called, is larger than the one for risk and CO 2 reduction. (author)

  12. 75 FR 68636 - 8000, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2010-11-08

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] 8000, Inc.; Order of Suspension of Trading... and the protection of investors require a suspension of trading in the securities of 8000, Inc. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  13. 77 FR 16113 - Asiamart, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-03-19

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Asiamart, Inc., Order of Suspension of Trading... and the protection of investors require a suspension of trading in the securities of the above-listed... trading in the securities of the above-listed company is suspended for the period from 9:30 a.m. EDT on...

  14. 78 FR 44185 - RVPlus, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-07-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] RVPlus, Inc.; Order of Suspension of Trading... and the protection of investors require a suspension of trading in the securities of the above-listed... trading in the securities of the above-listed company is suspended for the period from 9:30 a.m. EDT, on...

  15. 32 CFR 700.1121 - Disclosure, publication and security of official information.

    Science.gov (United States)

    2010-07-01

    ... communications, publication, graphic (including photographic) or other means, any classified information except... shall convey or disclose by oral or written communication, publication or other means except as may be...

  16. 77 FR 26056 - LocatePlus Holdings Corporation; Order of Suspension of Trading

    Science.gov (United States)

    2012-05-02

    ... Suspension of Trading April 30, 2012. It appears to the Securities and Exchange Commission that there is a... trading in the securities of the above-listed company, and any equity securities of any entity purporting..., that trading in the securities of the above-listed company, and any equity securities of any entity...

  17. Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools

    Science.gov (United States)

    Fleming, Antoine

    2017-01-01

    Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…

  18. Permit trading and credit trading

    DEFF Research Database (Denmark)

    Boom, Jan-Tjeerd; R. Dijstra, Bouwe

    This paper compares emissions trading based on a cap on total emissions (permit trading) and on relative standards per unit of output (credit trading). Two types of market structure are considered: perfect competition and Cournot oligopoly. We find that output, abatement costs and the number...... of firms are higher under credit trading. Allowing trade between permit-trading and credit-trading sectors may increase in welfare. With perfect competition, permit trading always leads to higher welfare than credit trading. With imperfect competition, credit trading may outperform permit trading....... Environmental policy can lead to exit, but also to entry of firms. Entry and exit have a profound impact on the performance of the schemes, especially under imperfect competition. We find that it may be impossible to implement certain levels of total industry emissions. Under credit trading several levels...

  19. Securities and Exchange Commission Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-12-20

    ... Flexibility Analysis Required: Yes Agency Contact: Alicia Goldin, Division of Trading and Markets, Securities...: Alicia Goldin, Division of Trading and Markets, Securities and Exchange Commission, 100 F Street NE... Flexibility Analysis Required: Yes Agency Contact: Alicia Goldin, Division of Trading and Markets, Securities...

  20. A public choice view on the climate and energy policy mix in the EU — How do the emissions trading scheme and support for renewable energies interact?

    International Nuclear Information System (INIS)

    Gawel, Erik; Strunz, Sebastian; Lehmann, Paul

    2014-01-01

    In this paper, we analyze the rationale for an energy policy mix when the European Emissions Trading Scheme (ETS) is considered from a public choice perspective. That is, we argue that the economic textbook model of the ETS implausibly assumes (1) efficient policy design and (2) climate protection as the single objective of policy intervention. Contrary to these assumptions, we propose that the ETS originates from a political bargaining game within a context of multiple policy objectives. In particular, the emissions cap is negotiated between regulators and emitters with the emitters' abatement costs as crucial bargaining variable. This public choice view yields striking implications for an optimal policy mix comprising RES supporting policies. Whereas the textbook model implies that the ETS alone provides sufficient climate protection, our analysis suggests that support for renewable energies (1) contributes to a more effective ETS-design and (2) may even increase the overall efficiency of climate and energy policy if other externalities and policy objectives besides climate protection are considered. Thus, our analysis also shows that a public choice view not necessarily entails negative evaluations concerning efficiency and effectiveness of a policy mix. - Highlights: • We analyze the interaction of the EU Emissions Trading Scheme and support policies for RES. • Stylized framework with emission cap as variable to be negotiated between regulators and emitters. • RES-support contributes to a more stringent emission cap and may even increase overall efficiency

  1. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Maria Neufeld

    2017-06-01

    Full Text Available Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia.

  2. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Maria Neufeld

    2017-04-01

    Full Text Available Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia.

  3. Risk Prioritization Tool to Identify the Public Health Risks of Wildlife Trade: The Case of Rodents from Latin America.

    Science.gov (United States)

    Bueno, I; Smith, K M; Sampedro, F; Machalaba, C C; Karesh, W B; Travis, D A

    2016-06-01

    Wildlife trade (both formal and informal) is a potential driver of disease introduction and emergence. Legislative proposals aim to prevent these risks by banning wildlife imports, and creating 'white lists' of species that are cleared for importation. These approaches pose economic harm to the pet industry, and place substantial burden on importers and/or federal agencies to provide proof of low risk for importation of individual species. As a feasibility study, a risk prioritization tool was developed to rank the pathogens found in rodent species imported from Latin America into the United States with the highest risk of zoonotic consequence in the United States. Four formally traded species and 16 zoonotic pathogens were identified. Risk scores were based on the likelihood of pathogen release and human exposure, and the severity of the disease (consequences). Based on the methodology applied, three pathogens (Mycobacterium microti, Giardia spp. and Francisella tularensis) in one species (Cavia porcellus) were ranked as highest concern. The goal of this study was to present a methodological approach by which preliminary management resources can be allocated to the identified high-concern pathogen-species combinations when warranted. This tool can be expanded to other taxa and geographic locations to inform policy surrounding the wildlife trade. © 2015 Blackwell Verlag GmbH.

  4. New Trend of Insider Trading in Chinese Securities Market and Its Legal Countermeasures%我国证券市场内幕交易的新趋势及其对策

    Institute of Scientific and Technical Information of China (English)

    张韩

    2013-01-01

    近年来,我国证券市场内幕交易案件频发,呈现出内幕交易地域场所扩大化、内幕信息窃取手段科技化、内幕交易行为方式复杂化等新趋势。究其原因,实为证券法条文过于笼统,期货内幕交易规定尚属立法空白所致。对此,应建立证券法上的惩罚性赔偿制度,构建多主体间的连带法律责任制度,尽快出台具体可行的内幕交易司法解释,由内幕交易行为人设置专项赔偿基金。%Recently there are frequent cases of insider trading in Chinese securities market , with the new trend of expansion of places for insider trading , of high-tech methods of stealing of inside information and of complexity of forms of insider trading .The key reason is the unspecific articles of Securities Law and the lack of regulations on futures'insider trading.In view of this, we should introduce punitive damages system , multi-party's joint liability system and class action system .Meanwhile , we need to put forward specific and practical judicial interpretation as soon as possible and insider trader should set up special compensation fund .

  5. Homeland Security -- Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2002-01-01

    This report assesses the impact of the September 11, 2001 attacks on public and private information infrastructures in the context of critical infrastructure protection, continuity of operations (COOP...

  6. Derivatives Trading and Negative Voting

    OpenAIRE

    Spamann, Holger

    2012-01-01

    This paper exposits a model of parallel trading of corporate securities (shares, bonds) and derivatives in which a large trader can sometimes profitably acquire securities with their corporate control rights for the sole purpose of reducing the corporations value and gaining on a net short position created through off-setting derivatives. At other times, the large trader profitably takes a net long position. The large trader requires no private information beyond its own trades. The problem i...

  7. The relevance of security analyst opinions for investment decisions

    NARCIS (Netherlands)

    Gerritsen, D.F.

    2014-01-01

    Security analysts analyze information regarding publicly traded companies after which they publish their opinion regarding these companies’ stocks. In this dissertation the published opinions of two different types of analysts are analyzed. Technical analysts derive a recommendation to buy, hold, or

  8. Multi-Organizational Collaborative Public Safety and Security Planning for the 2010 Vancouver Winter Games

    Science.gov (United States)

    2012-10-01

    intermediaries bridging the gap between safety and security officials. The OCS also had the closest relationship to the three main organizations in the...a clearly shared mission and boundary-spanning personnel that are able to bridge organizational cultures and adapt to the complex challenges...commandement et contrôle) et le transfert des connaissances à partir d’événements semblables passés ou en fonction d’événements futurs. Pendant

  9. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  10. Dividend Policy: A Survey of Malaysian Public Listed Companies and Security Analysts

    OpenAIRE

    Chong, David Voon Chee

    2003-01-01

    This dissertation revisits the dividend puzzle and attempts to answer the fundamental question of “why do companies pay dividends?” by using a simple regression model incorporating the major theories on dividend relevance. In addition, this research investigates if the opinions of companies (both dividend and non-dividend paying) and security analysts differ with respect to the various explanations for paying dividends. Finally, this research also explores the views and opinions of corporate ...

  11. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  12. Enabling private and public sector organizations as agents of homeland security

    Science.gov (United States)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  13. [Food and nutritional security: situation analysis of decentralization in the national public policy].

    Science.gov (United States)

    Vasconcellos, Ana Beatriz Pinto de Almeida; Moura, Leides Barroso Azevedo de

    2018-03-01

    The aim of this study was to analyze the situation with the decentralization of the Brazilian National System of Food and Nutritional Security (SISAN), created in 2006 under the Brazilian National Food and Nutritional Security Act (LOSAN). Based on the criteria for joining SISAN, as set out in Decree 7,272 of August 25, 2010, the authors analyzed data from the basic information surveys of the Brazilian Institute of Geography and Statistics, 2014 (Estadic e Munic/2014). The results show that decentralization of SISAN is still incipient at the municipal level, although all the states of Brazil have already joined the system. The social assistance sector has played an outstanding role in coordinating SISAN at the state and municipal levels, while in the latter the health sector has also played a relevant role. The analysis of food and nutritional security activities conducted to date, based on the sources of federal, state, and municipal funds, further shows that the federal sphere has still not played a strong inductive role capable of leading the expansion of SISAN. More effective funding mechanisms and the assignment of responsibilities to the states and municipalities are relevant factors for consolidating the system's state-level base and expanding the municipal base in the search for an identity and capillarity for SISAN.

  14. Development of Competitive Gas Trading in Continental Europe

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-07-01

    In this publication the IEA examines the history of major gas markets' development in OECD Europe, and explores the possible expansion of trading through the mechanism of different hubs across the region. Lessons learned from North American markets on the benefits of regulatory convergence and investor-friendly legal framework are an important part of the analysis. Competitive trading based on transparent, non-discriminatory rules in a flexible and integrated European gas market will lead to more efficiency, timely investment, and greater market resilience, therefore ensuring more security for both customers and suppliers in the long term.

  15. 75 FR 76465 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-12-08

    ... significant number of Council members have made business and travel plans in accordance with this schedule... implementation of solutions and best practices for public safety communications and cybersecurity. Recognizing... Public Notice announcing the meeting is available at http://www.fcc.gov/Daily_Releases/Daily_Business...

  16. Physicians and Insider Trading.

    Science.gov (United States)

    Kesselheim, Aaron S; Sinha, Michael S; Joffe, Steven

    2015-12-01

    Although insider trading is illegal, recent high-profile cases have involved physicians and scientists who are part of corporate governance or who have access to information about clinical trials of investigational products. Insider trading occurs when a person in possession of information that might affect the share price of a company's stock uses that information to buy or sell securities--or supplies that information to others who buy or sell--when the person is expected to keep such information confidential. The input that physicians and scientists provide to business leaders can serve legitimate social functions, but insider trading threatens to undermine any positive outcomes of these relationships. We review insider-trading rules and consider approaches to securities fraud in the health care field. Given the magnitude of the potential financial rewards, the ease of concealing illegal conduct, and the absence of identifiable victims, the temptation for physicians and scientists to engage in insider trading will always be present. Minimizing the occurrence of insider trading will require robust education, strictly enforced contractual provisions, and selective prohibitions against high-risk conduct, such as participation in expert consulting networks and online physician forums, by those individuals with access to valuable inside information.

  17. Official report to the government 2000:13. Electronic trading and business management in the oil- and gas industry. Consequences and possibilities for the Norwegian oil- and gas industry

    International Nuclear Information System (INIS)

    2001-01-01

    This report includes (1) a discussion of the development of electronic trading in general, (2) the development of electronic trading in the oil- and gas industry and (3) the role of the authorities in electronic trading and business management. It is realized that electronic trading and business management will quickly and profoundly change the trading among companies. The petroleum industry is expected to be among the leading industries in using electronic trading and many of the work processes that now characterize this sector will soon change. A number of public measures are already in effect to facilitate the use of electronic trading and the use of the Internet. Special attention has been given to legal issues and security aspects in trading over the Internet. No special need is seen for public measures with regard to standardization

  18. Public health: champion of food and nutritional security in an insecure world.

    Science.gov (United States)

    2009-10-01

    When it comes to nutrition, like most middle-income countries, Cuba is equally haunted by shadows of an undernourished past and forebodings of an overweight future. This dilemma is the country-level expression of a tough global reality: the world's empty stomachs and empty calories result from the same skewed constellation of international economic and trade policies. Speaking of the current and unprecedented food, fuel, climate and financial crises, World Health Organization (WHO) Director-General Margaret Chan comments: "…they are the result of massive failures in the international systems that govern the way nations and their populations interact. In short: they are the result of bad policies…(in which) economic interests trump health concerns time and time again."[1].

  19. Nuclear security and radiological preparedness for the olympic games, athens 2004: lessons learned for organizing major public events.

    Science.gov (United States)

    Kamenopoulou, Vassiliki; Dimitriou, Panayiotis; Hourdakis, Constantine J; Maltezos, Antonios; Matikas, Theodore; Potiriadis, Constantinos; Camarinopoulos, Leonidas

    2006-10-01

    In light of the exceptional circumstances that arose from hosting the Olympic Games in Athens in 2004 and from recent terrorist events internationally, Greece attributes the highest priority to security issues. According to its statutory role, the Greek Atomic Energy Commission is responsible for emergency preparedness and response in case of nuclear and radiological events, and advises the Government on the measures and interventions necessary to protect the public. In this context, the Commission participated in the Nuclear, Radiological, Biological, and Chemical Threat National Emergency Plan, specially developed for the Olympic Games, and coordinated by the Olympic Games Security Division. The objective of this paper is to share the experience gained during the organization of the Olympic Games and to present the nuclear security program implemented prior to, during, and beyond the Games, in order to prevent, detect, assess, and respond to the threat of nuclear terrorism. This program adopted a multi-area coverage of nuclear security, including physical protection of nuclear and radiological facilities, prevention of smuggling of radioactive materials through borders, prevention of dispersion of these materials into the Olympic venues, enhancement of emergency preparedness and response to radiological events, upgrading of the technical infrastructure, establishment of new procedures for assessing the threat and responding to radiological incidents, and training personnel belonging to several organizations involved in the National Emergency Response Plan. Finally, the close cooperation of Greek Authorities with the International Atomic Energy Agency and the U.S. Department of Energy, under the coordination of the Greek Atomic Energy Commission, is also discussed.

  20. Public Health Security in Crisis Situations. Basic Premises and Strategic Objectives

    OpenAIRE

    Konieczny, Jerzy

    2012-01-01

    In recent years the approach to public health has changed, making the adoption of a uniform definition difficult. This is forced by the growing number of extraordinary dangers: terrorist attacks, natural disasters, dangerous invading microbial and virus diseases, bioterrorist, chemical and radiation threats, transport accidents and disasters. These threats create crisis situations which are very complicated and define new challenges for the authorities and public health leaders as well as fo...

  1. Trade in health services.

    Science.gov (United States)

    Chanda, Rupa

    2002-01-01

    In light of the increasing globalization of the health sector, this article examines ways in which health services can be traded, using the mode-wise characterization of trade defined in the General Agreement on Trade in Services. The trade modes include cross- border delivery of health services via physical and electronic means, and cross-border movement of consumers, professionals, and capital. An examination of the positive and negative implications of trade in health services for equity, efficiency, quality, and access to health care indicates that health services trade has brought mixed benefits and that there is a clear role for policy measures to mitigate the adverse consequences and facilitate the gains. Some policy measures and priority areas for action are outlined, including steps to address the "brain drain"; increasing investment in the health sector and prioritizing this investment better; and promoting linkages between private and public health care services to ensure equity. Data collection, measures, and studies on health services trade all need to be improved, to assess better the magnitude and potential implications of this trade. In this context, the potential costs and benefits of trade in health services are shaped by the underlying structural conditions and existing regulatory, policy, and infrastructure in the health sector. Thus, appropriate policies and safeguard measures are required to take advantage of globalization in health services. PMID:11953795

  2. The use of communication tools in securing public trust in nuclear energy

    International Nuclear Information System (INIS)

    Chirica, Theodor; Andrei, Veronica; Stiopol, Mihaela; Glodeanu, Florin

    2004-01-01

    The nuclear power proved its potential to contribute substantially to electricity supply and to compete with the alternatives sources. Nevertheless the implementation of nuclear power projects raises social concerns. The social acceptance of nuclear energy can be approached by two ways, one based on increasing the public trust and the other is based on the technology development. The trust based approach has in view that the public be able to decide which group of peoples to trust concerning any issue of nuclear power. The approach based on technology explanation has in view to make the public to decide alone if the technology is acceptable, based on the understanding of arguments and evidences provided by the experts. The international experience proves that all efforts to improve acceptability of nuclear power based on the technology arguments have failed and that only the approach based on public trust was successful. The communication strategies suitable for nuclear power are those considering the public as an equal partner for dialogue. The Aarhus Convention, now in force in Romania, provides an adequate framework for development of public trust, based on the dialogue and partnership. (authors)

  3. 17 CFR 240.12d2-1 - Suspension of trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Suspension of trading. 240... Securities Exchange Act of 1934 Suspension of Trading, Withdrawal, and Striking from Listing and Registration § 240.12d2-1 Suspension of trading. (a) A national securities exchange may suspend from trading a...

  4. The impact of later trading hours for hotels (public houses) on breath alcohol levels of apprehended impaired drivers.

    Science.gov (United States)

    Chikritzhs, Tanya; Stockwell, Tim

    2007-10-01

    To examine the impact of extended trading permits (ETPs) for licensed hotels in Perth, Western Australia on impaired driver breath alcohol levels (BALs) between July 1993 and June 1997. Forty-three hotels obtained ETPs allowing later closing hours and 130 maintained standard closing time (controls). Impaired driver BALs were linked to 'last place of drinking' hotels. Before and after period BALs of drivers who last drank at ETP or non-ETP hotels were compared by time of day of apprehension and sex, controlling for age. Impaired female drivers apprehended between 10.01 p.m. and 12 midnight (before closing time) had significantly lower BALs after drinking at ETP hotels. Male drivers aged 18-25 years and apprehended between 12.01 and 2.00 a.m. after drinking at ETP hotels had significantly higher BALs than drivers who drank at non-ETP hotels. At peak times for alcohol-related offences, late trading is associated with higher BALs among those drinkers most at risk of alcohol-related harm.

  5. Contractual stability and its relationship with the political process of law-making: An analysis of Peru’s public procurement and the principles of the Agreement on Government Procurement with the World Trade Organization

    OpenAIRE

    Zegarra Pinto, José; Peche Loayza, Luwing

    2017-01-01

    This paper develops an analysis of the impacts of the Agreement on Government Procurement (GPA) Principles and Rules on the Peruvian Public Procurement regulation, and Peruvian participation in the process of international standardisation of public procurement through signing different kinds of free trade agreements (FTAs).

  6. Public and physician's expectations and ethical concerns about electronic health record: Benefits outweigh risks except for information security.

    Science.gov (United States)

    Entzeridou, Eleni; Markopoulou, Evgenia; Mollaki, Vasiliki

    2018-02-01

    physicians should have full access to an EHR (90.9%), whereas nursing staff, pharmacists, laboratory staff, and other healthcare professional should have partial access. The factors identified in the present study present actionable insights that may increase awareness about EHRs. The survey illustrates that both the public and physicians acknowledge the benefits and support EHRs on the condition that sufficient guarantees are provided about privacy and security. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Current and future trends in public sector reform: The views of trade unions and consultants in ten European countries.

    NARCIS (Netherlands)

    D.S.D. Curry; W. Blijleven (Wieke); S.G.J. Van de Walle (Steven)

    2014-01-01

    markdownabstract__Abstract__ While public sector reform has been a constant process, sometimes evolutionary and sometimes revolutionary, the financial crisis that started in 2008, along with the streamlining and efficiency aims of New Public Management paradigms that began to emerge in the 1980s,

  8. Smart trade logistics - Compliance as an opportunity

    NARCIS (Netherlands)

    Zomer, G.R.

    2011-01-01

    Facilitation of trade logistics aims at simplification and harmonization of border procedures and related documentation. This is an accelerator for global trade and economic growth and therefore a priority in global trade policy. Trends in logistics and supply chain security and innovations in

  9. 77 FR 52766 - Technology and Trading Roundtable

    Science.gov (United States)

    2012-08-30

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67725; File No. 4-652] Technology and Trading... ``Technology and Trading: Promoting Stability in Today's Markets'' to discuss ways to promote stability in..., implement, and manage complex and inter-connected trading technologies. The roundtable discussion will be...

  10. Communication with the public in radiation protection or nuclear safety and security

    International Nuclear Information System (INIS)

    Sabol, J.; Sestak, B.

    2014-01-01

    Traditionally, the public perceives any peaceful application of atomic and nuclear physics as something very dangerous. It is not easy to eliminate the public's memories of nuclear bombings in Japan towards the end of World War II and subsequent nuclear weapons tests which resulted in spreading radioactive fallout across the globe. The current use of radiation and nuclear technologies in industry, medicine, science and other fields is known to meet very strict international safety standards ensuring the adequate protection of people's health and the minimization of threat to the environment. The paper summarizes the current problems in communicating radiation and nuclear safety to members of the public and focuses on the importance of using appropriate approaches as well as relevant terminology, including quantities and units for the realistic assessment of radiological exposure. (authors)

  11. Insider trading

    International Nuclear Information System (INIS)

    Maslechko, W.S.

    1998-01-01

    The policy arguments for and against prohibiting insider trading within the petroleum industry are discussed. Legal definitions of all relevant terms (e.g. 'special relationship' 'tippees', 'material facts', material changes' 'generally disclosed' information', 'necessary course of business') are provided. Enforcement of insider trading/tipping prohibitions are also defined. The recommended practice is: do not trade; do not tell or advise; encourage timely disclosure; do not speculate; implement a corporate disclosure and trading policy

  12. Freedom and Information. Assessing Publicly Available Data Regarding U.S. Transportation Infrastructure Security

    Science.gov (United States)

    2007-01-01

    know or can learn may be advantageous to defenders. If defend- ers are unaware that a terrorist group knows about a particular vulnerability, that...cases, this information is necessarily in the public domain because it provides an important service. For instance, as noted above, ecommerce sites for

  13. Consumer Food Security and Labeling Intervention on Food Products through Public Policies in Romania

    Directory of Open Access Journals (Sweden)

    Dacinia Crina Petrescu

    2018-02-01

    Full Text Available The correct understanding of consumers’ food labeling knowledge and perceptions is a prerequisite to develop and implement coherent and appropriate food safety policies. One objective of the paper was to discover how often consumers access and use specific food label information. Another objective was to explore stakeholders’ preferences for several public policy options relevant for food safety. In this respect, a survey on a sample of 312 Romanian consumers and the evaluation of several public policy options by four stakeholder groups (food producers and sellers, doctors, fitness trainers, and consumers were carried out. The results revealed that the most frequently read types of information on the label were “expiration date” and “price”, closely followed by “quantity” and “brand”. Among tested public policies, those related to the traffic light labels and to the social interest messages with health claims were rewarded with high scores by investigated stakeholders. Although nutrition has a decisive impact on health state, nutrition information was not frequently read by people, thus justifying the implementation of a public policy meant to enhance consumers’ interest in and reading frequency of nutrition information on food label.

  14. Energy trading

    International Nuclear Information System (INIS)

    Glachant, J.M.; Kimman, R.; Schweickardt, H.E.

    2001-05-01

    This document brings together 18 testimonies of experts about energy trading: 1 - the energy trading experience on European deregulated markets: structure of deregulated energy markets in Europe, case study: a two years experience of a power exchange in western Europe, case study: European energy exchanges (experience of spot and future trading), case study: risk management on energy deregulated markets; 2 - the trading activity environment and realities in France: the French electrical law and the purchase for resale, experience feedback: status after 3 months of trading in France (the first experience of a French producer), the access to the power transportation network, which legal constraints for trading in France, the access of eligible clients to the French power market, conditions of implementation of a power exchange market in France, which real trading possibilities in France for producers and self-producers in the legal frame, case study: the role of trading in the company (main part or link to process), convergence of gas and electricity markets, gas-electricity trading: which pricing models; 3 - risk management and use of new technologies potentiality, the results outside the French borders: case study: what differences between the European and US markets, prices volatility and commodity risk management: towards the on-line trading, role and developments of E-business in energy trading, how to simplify trade in a liberalized market. (J.S.)

  15. 77 FR 5865 - China Agro-Technology Holdings Ltd.; Order of Suspension of Trading

    Science.gov (United States)

    2012-02-06

    ... Suspension of Trading February 2, 2012. It appears to the Securities and Exchange Commission that there is a... trading in the securities of China Agro-Technology Holdings Ltd. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of China Agro...

  16. 77 FR 36305 - Stream Communications Network & Media, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-06-18

    ....; Order of Suspension of Trading June 14, 2012. It appears to the Securities and Exchange Commission that... a suspension of trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the security of the above...

  17. 77 FR 26796 - HydroGenetics, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-05-07

    ... Trading May 2, 2012. It appears to the Securities and Exchange Commission that there is a lack of current... require a suspension of trading in the securities of HydroGenetics. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of HydroGenetics is...

  18. 77 FR 58203 - Freedom Environmental Services, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-09-19

    ... Suspension of Trading September 17, 2012. It appears to the Securities and Exchange Commission that there is... require a suspension of trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the...

  19. 77 FR 10004 - Nikron Technologies, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-02-21

    ... of Trading February 16, 2012. It appears to the Securities and Exchange Commission that there is a... trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed company is...

  20. 77 FR 58424 - China Mobile Media Technology, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-09-20

    ... Suspension of Trading September 18, 2012. It appears to the Securities and Exchange Commission that there is... trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed company is...

  1. 75 FR 36128 - Green Energy Resources, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2010-06-24

    ... Suspension of Trading June 22, 2010. It appears to the Securities and Exchange Commission that there is a... a suspension of trading in the securities of Green Energy. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...

  2. Polling and public opinion: a Canadian perspective

    National Research Council Canada - National Science Library

    Butler, Peter Marshall

    2007-01-01

    ..., advertising, and government policy. Using such controversial issues such as free trade, health care, same-sex marriage, and national security, Butler argues that popular opinion on such hot-button topics as these can be guided and changed according to how polls are interpreted for and presented to the public. As well as analysing the impact of po...

  3. Smart and secure charging of electric vehicles in public parking spaces

    OpenAIRE

    Strobbe, Matthias; Mets, Kevin; Tahon, Mathieu; Tilman, M; Spiessens, F; Gheerardyn, J; De Craemer, K; Vandael, S; Geebelen, K; Lagaisse, B; Claessens, B; Develder, Chris

    2012-01-01

    Governments worldwide are starting to give incentives to promote the use of (hybrid) electrical vehicles to achieve cleaner and more energy-efficient road transport with a low carbon footprint. Through tax/VAT reductions and free additional services — such as free parking, and/or battery charging or lower traffic congestion taxes — private users, public organizations and car fleet operators are stimulated to adopt the plug-in (hybrid) electrical vehicle (PHEV). This upcoming breakthrough of P...

  4. The Registration of Special Notarial Bonds under the Security by Means of Movable Property Act and the Publicity Principle: Lessons from Developments in Belgium

    Directory of Open Access Journals (Sweden)

    Lefa

    2018-01-01

    Full Text Available Many people do not own immovable property to offer as security but do have movable property which can be offered as security for the repayment of a debt. In today's world, where the costs of a motor car can exceed that of a house, the increasing value of movable things makes them popular and appropriate security objects. Under the common law pledge, delivery of the movable property from the pledgor (the debtor to the pledgee (the creditor has to take place in order for the pledgee to acquire a real security right in the property. Delivery of the property is aimed at ensuring compliance with the publicity principle. The principle of publicity entails that the existence of a real security must be known to the public. With the aim of promoting commerce, certain countries have taken the initiative in reforming their laws on pledge to allow the debtor to retain possession of the movable property that serves as security. Furthermore, technology has advanced to a level where national registration systems which can be accessed easily and at minimal cost can be established. The South African legislature enacted the Security by Means of Movable Property Act 57 of 1993 which makes provision for a pledge without possession. This Act deemed a duly registered notarial bond over specified movable property to have been delivered as if delivery had in fact taken place, thereby substituting the common law delivery requirement with registration in the Deeds Office. On 30 May 2013 the Belgian House of Representatives adopted a Belgian Pledge Act which allows for a non-possessory pledge on movable property subject to registration in a newly created public register called the Electronic Pledge Register. This article therefore examines the efficacy of the registration system of special notarial bonds in South African law and whether this form of registration complies with the publicity principle looking at the developments of a computerised registration system taking

  5. Public acceptance and trade development of irradiated food in Sri Lanka with special reference to spices and onions

    International Nuclear Information System (INIS)

    Wilson Wijeratnam, R.S.; Sivakumar, D.

    2001-01-01

    Sri Lankan spices, onion, shallots and dried chillies suffer considerable storage losses due to inadequate preservation method. Irradiation to a dose 7 kGy was found to be effective technique to reduce storage losses and improve quality of different spices. Preliminary results showed prospect of using irradiation for large scale preservation of dried chillis. But due to lack of irradiation, facility scaled- up irradiation and storage trials could not be undertaken. Based on study conducted by the Ceylon Institute of Scientific and Industrial Research, a report was submitted to the Atomic Energy Authority of Sri Lanka on the current demand for a multi-purpose irradiation facility. The food items identified for irradiation processing include spices, desiccated coconut, shrimps for export; and onions, chillies and dried fish products, foliage plants and medical products for local trade. The volume of products for commercial processing has also been indicated in the survey report. Steps for approval of the Harmonised Regulations on Food Irradiation as adopted in the RCA Workshop in Seoul, 1998 are at the processing level for submission as a parliamentary bill. A consumer acceptance survey was carried out in 1997; the outcome showed a low acceptance for irradiated spices. About 200 participants comprising private exporters, govt. officials and students were made aware of the irradiation process and benefits of irradiation treatment through the training programmes on post-harvest management at the CISIR. (author)

  6. The Anatomy of Digital Trade Infrastructures

    DEFF Research Database (Denmark)

    Rukanova, Boriana; Zinner Henriksen, Helle; Henningsson, Stefan

    2017-01-01

    In global supply chains information about transactions resides in fragmented pockets within business and government systems. The introduction of digital trade infrastructures (DTI) that transcend organizational and systems domains is driven by the prospect of reducing this information fragmentation......, thereby enabling improved security and efficiency in trade process. To understand the problem at hand and build cumulative knowledge about its resolution a way to conceptualize the different digital trade infrastructure initiatives is needed. This paper develops the Digital Trade Infrastructure Framework...

  7. Essays on investor behavior and trading activity

    OpenAIRE

    Kyröläinen, P. (Petri)

    2007-01-01

    Abstract This thesis investigates a set of equity market phenomena associated with investors' trading activity, using a comprehensive Finnish Central Securities Depository (FCSD) database that records practically all trades by Finnish investors. This database enables us to classify a large number of heterogeneous investors using both economic and institutional characteristics. The first essay classifies investors by trading activity. It analyzes trading styles of active and passive inv...

  8. Balancing ecosystem services with energy and food security - assessing trade-offs for reservoir operation and irrigation investment in Kenya's Tana basin

    Science.gov (United States)

    Hurford, A. P.; Harou, J. J.

    2014-01-01

    Competition for water between key economic sectors and the environment means agreeing on allocation is challenging. Managing releases from the three major dams in Kenya's Tana River basin with its 4.4 million inhabitants, 567 MW of installed hydropower capacity, 33 000 ha of irrigation and ecologically important wetlands and forests is a pertinent example. This research seeks to identify and help decision-makers visualise reservoir management strategies which result in the best possible (Pareto-optimal) allocation of benefits between sectors. Secondly we seek to show how trade-offs between achievable benefits shift with the implementation of new proposed rice, cotton and biofuel irrigation projects. To identify the Pareto-optimal trade-offs we link a water resources management model to a multi-criteria search algorithm. The decisions or "levers" of the management problem are volume dependent release rules for the three major dams and extent of investment in new irrigation schemes. These decisions are optimised for objectives covering provision of water supply and irrigation, energy generation and maintenance of ecosystem services which underpin tourism and local livelihoods. Visual analytic plots allow decision makers to assess multi-reservoir rule-sets by understanding their impacts on different beneficiaries. Results quantify how economic gains from proposed irrigation schemes trade-off against disturbance of the flow regime which supports ecosystem services. Full implementation of the proposed schemes is shown to be Pareto-optimal, but at high environmental and social cost. The clarity and comprehensiveness of "best-case" trade-off analysis is a useful vantage point from which to tackle the interdependence and complexity of water-energy-food "nexus" challenges.

  9. 17 CFR 166.2 - Authorization to trade.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Authorization to trade. 166.2 Section 166.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION CUSTOMER PROTECTION RULES § 166.2 Authorization to trade. No futures commission merchant, introducing broker or any of their...

  10. 78 FR 15402 - Xytos, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-03-11

    ... SECURITIES AND EXCHANGE COMMISSION [ File No. 500-1] Xytos, Inc.; Order of Suspension of Trading... financial conditions and business operations, and because of potentially manipulative conduct in the trading... investors require a suspension of trading in the securities of the above-listed company. Therefore, it is...

  11. Public and Private Institutions: Educating Civil Society about European Security Concerns

    Directory of Open Access Journals (Sweden)

    Rafael Bardají

    1997-12-01

    Full Text Available As an specialist in strategic studies and political adviser, the author developes three basic ideas in his speech: 1 the objective necessity of strategic thinking to increase defense awareness, with the goal of ameliorating the relations between civil society and the Armed Forces, and to create a strategic culture to help to make more permeable the Administration decision-making process; 2 public and private institutions have to understand each other, despite the fact that tradition and time pressures do negatively weigh on Administration decision-making; 3 both parts –Administration and specialists in security– have to make the effort of becoming more flexible, on the one hand, and more capable of producing relevant studies in political terms, on the other.

  12. Rapid immune colloidal gold strip for cetacean meat restraining illegal trade and consumption: implications for conservation and public health.

    Science.gov (United States)

    Lo, Chieh; Chin, Li-Te; Chu, Chi-Shih; Wang, Yu-Ting; Chan, Kun-Wei; Yang, Wei-Cheng

    2013-01-01

    The consumption of cetacean meat is geographically common and often of undetermined sustainability. Besides, it can expose humans to contaminants and zoonotic pathogens. The illegality of possessing cetacean meat was likely under-reported in some countries due to lack of attention paid by the officials although DNA analysis of market products helped to show such practices. We developed two monoclonal antibodies against synthetic peptides of myoglobin (Mb) for constructing a rapid immune colloidal gold strip. Only cetacean Mb is capable of binding to both antibodies and presents positive signal while the Mb from other animals can bind only 1 of the antibodies and presents negative result. The strip for cetacean meat would be an applicable and cost-effective test for field inspectors and even the general public. It contributes to increase the reporting capacity and coverage of illegal cetacean meat possession, which has implications for global cetacean conservation and public health.

  13. Energy trading

    International Nuclear Information System (INIS)

    Beckmann, K.; Schroeter, S.

    2009-01-01

    Two brief articles and two interviews deal with the subject of energy trading. Power and gas exchanges in Europe multiply, but, experts say, we are nowhere near a mature, integrated European energy market as yet. Trading regulations need to be improved and harmonised and interconnections expanded. European Energy Review assesses the state of energy trading in Europe and interviews the ceo's of NordPool (the Nordic power exchange) and APX (Amsterdam Power Exchange)

  14. Fewer can be More: Nuclear Safety and Security Culture Self-Assessment in the Hungarian Public Ltd. for Radioactive Waste Management

    International Nuclear Information System (INIS)

    Horváth, K.; Solymosi, M.; Vass, G.

    2016-01-01

    The Hungarian regulator and operators show strong commitment towards robust nuclear safety and security culture. The paper discusses the evolution and the basis of the regulation of Hungarian safety and security culture. Because of security considerations nuclear safety incidents have always received and for sure will receive more publicity than malicious acts. That is probably the main reason behind that mostly nuclear safety incidents influence the common beliefs. This kind of primacy is noticeable as well in regulations and also in practice. Although there is a strong connection nuclear safety and security culture, their relationship has not been researched for a long time. The paper also presents an already achieved, combined nuclear safety and security culture survey type assessment. Survey is a well known type of organizational culture self assessment. The applied methods, relationship between these two cultures and of course some difficulties of the process are summarized. The presented method is appropriate to combine different guidance and characteristics to measure different attitude in a single survey. The method in practice is shown through the nuclear safety and security culture assessment conducted at Hungarian Public Ltd. Of Radioactive Waste Management. (author)

  15. Trading Agents

    CERN Document Server

    Wellman, Michael

    2011-01-01

    Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abst

  16. Greenhouse gas credits trade versus biomass trade – weighing (Workshop Summary)

    NARCIS (Netherlands)

    Junginger, H.M.; Faaij, A.P.C.; Robertson, K.; Woes-Gallasch, S.; Schlamadinger, B.

    2006-01-01

    A workshop entitled ‘Greenhouse gas credits trade versus biomass trade – weighing the benefits’, jointly organised by IEA Bioenergy Tasks 38 (GHG Balances of Biomass and Bioenergy Systems) and 40 (Sustainable International Bioenergy Trade: Securing Supply and Demand), and ENOVA, took place in

  17. Reserves and Trade Jointly Determine Exposure to Food Supply Shocks

    Science.gov (United States)

    Marchand, Philippe; Carr, Joel A.; Dell'Angelo, Jampel; Fader, Marianela; Gephart, Jessica A.; Kummu, Matti; Magliocca, Nicholas; Porkka, Miina; Puma, Michael J.; Zak, Ratajczak

    2016-01-01

    While a growing proportion of global food consumption is obtained through international trade, there is an ongoing debate on whether this increased reliance on trade benefits or hinders food security, and specifically, the ability of global food systems to absorb shocks due to local or regional losses of production. This paper introduces a model that simulates the short-term response to a food supply shock originating in a single country, which is partly absorbed through decreases in domestic reserves and consumption, and partly transmitted through the adjustment of trade flows. By applying the model to publicly-available data for the cereals commodity group over a 17 year period, we find that differential outcomes of supply shocks simulated through this time period are driven not only by the intensification of trade, but as importantly by changes in the distribution of reserves. Our analysis also identifies countries where trade dependency may accentuate the risk of food shortages from foreign production shocks; such risk could be reduced by increasing domestic reserves or importing food from a diversity of suppliers that possess their own reserves. This simulation-based model provides a framework to study the short-term, nonlinear and out-of-equilibrium response of trade networks to supply shocks, and could be applied to specific scenarios of environmental or economic perturbations.

  18. 6. Analisis Implementasi Cyber Security Di Uni Eropa: Studi Kasus Carbon Credits Hacking Dalam European Union Emission Trading Scheme (EU ETS) Tahun 2010-2013

    OpenAIRE

    Aisya, Naila Sukma; Putranti, Ika Riswanti; Wahyudi, Fendy Eko

    2017-01-01

    Since the last two decades in the 20th century, the European Union (EU) has presented itself as a leader in climate change issues. The leadership manifested in the formation of the European Union Emission Trading Scheme (EU ETS) as an effort to fulfill the commitments of the Kyoto Protocol to reduce emissions in the region. But the existence of the EU ETS has been challenged by the emergence of carbon credits hacking case in some national registration systems in the EU ETS. This study discuss...

  19. Promoting Organ Donor Registries Through Public Education: What Is the Cost of Securing Organ Donors?

    Science.gov (United States)

    Razdan, Manik; Smith, Kenneth J; Bryce, Cindy L; Degenholtz, Howard B

    2016-06-01

    Transplant medicine's impact on America's public health is seriously limited by acute shortage of transplantable organs. Consequently, the United Sates has witnessed considerable investment in the promotion of organ donor registries. Although there is no evidence to support that donor registry promotion alleviates organ shortage, this belief continues to drive investments into registry promotion. In this study, return on investment in donor registry promotion was examined using cost-outcomes analysis. Cost of promoting the donor registry was estimated in US dollars whereas the outcome was measured as the number of individuals who join the registry (registrants) and their value in terms of organ donors. The study was conducted from the perspective of a regional Organ Procurement Organization (OPO). Costs were directly obtained from the OPO. The number of new registrants was obtained from the OPO and the departments of motor vehicles that maintain the donor registry. The value of registrants in terms of organ donors was computed based on a registrant's age-dependent risk of dying and age-dependent probability of becoming an organ donor. Six thousand seven hundred eight individuals joined the organ donor registry (95% confidence interval [95% CI], 5429-7956) at a cost of $455 per registrant (95% CI, US $383-US $562). These individuals result in 4.2 present-day donors (95% CI, 2.5-6.6) at a cost of US $726 000 (95% CI, US $462000-US $1.2 million). Because the cost per registrant and cost per donor is less than society's willingness to pay, donor registry promotion offers positive return on investment. Investment in registry promotion should at the minimum be maintained at current levels.

  20. Acceptance, control of and trade in irradiated food

    International Nuclear Information System (INIS)

    1989-01-01

    Proceedings of an International Conference on the Acceptance, Control of and Trade in Irradiated Food jointly organized by the Food and Agriculture Organization of the United Nations, the World Health Organization, the International Atomic Energy Agency and the International Trade Centre-UNCTAD/GATT and held in Geneva, 12-16 December 1988. The Conference was prompted by the lack of acceptance by some governments, which do not see a need for the application of food irradiation technology in their own countries, and as a consequence may hamper its use in other countries where its application could significantly improve consumer health and nutrition, as well as national economic and trading potential. This publication contains discussions on the key issues of the wholesomeness of irradiated food, the contribution of this technology to public health, food security and international trade, the control of the process to ensure its correct application for consumer protection, and the acceptance of irradiated food by industry and consumers. The proceedings include the International Document on Food Irradiation, highlighting the major issues related to the acceptance of irradiated food by consumers, governmental and intergovernmental activities, the control of the process, and trade. A number of Member States formally expressed their views on this International Document, expressing either endorsement or reservation, and their statements are included in these proceedings. Refs, fig and tabs

  1. 78 FR 3044 - Exchange Traded Spreads Trust, et al.; Notice of Application

    Science.gov (United States)

    2013-01-15

    ... the series to deposit securities into, and receive securities from, the series in connection with the... securities (``Equity Funds'') or fixed income securities (``Fixed Income Funds'') traded in the U.S. or non-U... Equity Funds''), Fixed Income Funds that invest in fixed income securities traded in the U.S. market...

  2. Nuclear security in major public events: the XV Pan American Games and the III Para-Pan American Games in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The organization of a major public event involving large numbers of spectators and participants, presents important security challenges. Taking this into consideration, the Brazilian Nuclear Energy Commission (CNEN) has been requested, by the National Secretary of Public Security/ Ministry of Justice (SENASP/MJ), by the end of 2006, to participate on the security actions to be implemented in both the XV Pan American Games and III Para Pan American Games. The XV Pan American Games 2007 and the III Para Pan American Games were held in Rio de Janeiro, Brazil from 13 to 29 July 2007 and from 12 to 19 August 2007, respectively. Those events had 8700 participants between athletes, coaches and referees from 42 countries. More than 300 competition events were held at 17 different venues and were covered by 4910 professionals from TV, radio and written press. Around 2 million tickets have been sold or distributed and 18,000 volunteers participated on the organization. The participation of CNEN was concentrated on the implementation of specific nuclear and radiological security measures to be applied at those events. This was part of a multi-institutional plan for the security of the Games, coordinated by the National Secretary of Public Security of the Ministry of Justice (SENASP/MJ). The support provided by IAEA under a Cooperation Arrangement with the Brazilian authorities was a key factor for the success of the whole operation. The actions taken and the lessons identified by the Brazilian Nuclear Energy Commission related to nuclear and radiological security for the Pan American Games and for the Para Pan American Games are presented. (author)

  3. Public Policy Issues in Transport. Taxes and standards for energy security and greenhouse gas objectives

    Energy Technology Data Exchange (ETDEWEB)

    Eskeland, Gunnar (Cicero, Oslo (Norway))

    2008-07-01

    The direct case for fuel economy standards on a stand alone basis dies in the textbook on the basis of first principles: the fuel tax is a better targeted instrument. In practice, the fuel economy standard, is killed by the 'rebound effect'. Vehicle users will, once they have more fuel efficient vehicles, respond to lower marginal costs by increased vehicle use. If an important part of negative externalities from transport are associated with vehicle kilometres (accidents, congestion, road wear) rather than fuel consumption, the rebound effect increases negative externalities from transport. The more direct way of addressing negative externalities from transport is to increase fuel taxes, and depending on their prior level, this is our first recommendation. But higher fuel taxes often raise political resistance. The fuel efficiency of existing cars is an important way by which people have adapted to present fuel taxes, determining their resistance to increases. A higher fuel efficiency standard is an instrument that faces little political resistance and which - over time - reduces the political resistance to increased fuel taxes. In efforts to reduce the fuel intensity of an economy, this interplay between an activity's fuel intensity, like gallons per vehicle mile, and the activity level, vehicle miles travelled or transported, nicely illustrates some important empirical questions and public policy issues: i) the first best policy proposition to reduce fuel related externalities is fuel taxes. Indeed, at the right level of fuel taxes, the externalities are zero: they are internalized. ii) the part of an economy's ability to shed fuel consumption lies in increased fuel efficiency in the individual activities, and this part can be stimulated with fuel efficiency standards. The other part, the activity level, should then be addressed with fuel tax increases. iv) We speculate that it may be difficult credibly to raise expected fuel taxes more than

  4. Enabling a Secure Environment for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Transactions : April 2012 Public Workshop Proceedings

    Science.gov (United States)

    2012-06-08

    This report provides a summary and overview of the Public Workshop entitled, Enabling a Secure Environment for Vehicle-to-Vehicle and Vehicle-to-Infrastructure Transactions, presented by USDOT. The workshop took place on April 19-20, 2012 at th...

  5. Emissions Trading

    NARCIS (Netherlands)

    Woerdman, Edwin; Backhaus, Juergen

    2014-01-01

    Emissions trading is a market-based instrument to achieve environmental targets in a cost-effective way by allowing legal entities to buy and sell emission rights. The current international dissemination and intended linking of emissions trading schemes underlines the growing relevance of this

  6. Organ Trade

    NARCIS (Netherlands)

    J.A.E. Ambagtsheer (Frederike)

    2017-01-01

    markdownabstractOrgan trade constitutes the sale and purchase of organs for financial or material gain. Although prohibited since the 1980s, an increasing number of reports indicate its proliferation across the globe. Yet, many knowledge gaps exist on organ trade, in particular on the demand -and

  7. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  8. Digital Trade Infrastructures: A Framework for Analysis

    Directory of Open Access Journals (Sweden)

    Boriana Boriana

    2018-04-01

    Full Text Available In global supply chains, information about transactions resides in fragmented pockets within business and government systems. The lack of reliable, accurate and complete information makes it hard to detect risks (such as safety, security, compliance and commercial risks and at the same time makes international trade inefficient. The introduction of digital infrastructures that transcend organizational and system domains is driven by the prospect of reducing the fragmentation of information, thereby enabling improved security and efficiency in the trading process. This article develops a digital trade infrastructure framework through an empirically grounded analysis of four digital infrastructures in the trade domain, using the conceptual lens of digital infrastructure.

  9. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  10. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  11. The Political Economy of International Emissions Trading Scheme Choice

    DEFF Research Database (Denmark)

    Boom, Jan-Tjeerd; Svendsen, Jan Tinggard

    2000-01-01

    The Kyoto Protocol allows emission trade between the Annex B countries. We consider three schemes of emissions trading: government trading, permit trading and credit trading. The schemes are compared in a public choice setting focusing on group size and rent-seeking from interest groups. We find ...

  12. TRANSFORMATION OF PUBLIC ORGANIZATIONS IN WESTERN SIBERIA WITHIN THE CONTEXT OF THE “THAW” DURING LATE 1950s-EARLY 1960s BASED ON MATERIALS OF REGIONAL TRADE UNIONS, PUBLIC ENGINEERING ORGANIZATIONS, AND TECHNICAL AND SCIENTIFIC SOCIETIES

    Directory of Open Access Journals (Sweden)

    Анатолий Николаевич Першиков

    2014-01-01

    Full Text Available The paper studies the changes in the structure, personnel, and areas of practical activity of the trade unions, public engineering organizations and technical and scientific societies in the West Siberian region during late 1950s – early 1960s. The impact of national and regional factors on the transformation content, character, and results is investigated.Objective Analyze the transformation process of public organizations in Western Siberia during late 1950s-early 1960s, revel the characteristic trends and regional specific features.Method or methodology of the study: problem and chronological method, historical-and-systematic method, statistical method.Results: it was established that public organizations experienced certain changes, lost the dependence on government  institutions,  enlarged the area of  activity, but they complementely remained in the field of the party control and operations, did not aquire the proper self-reliance and independence of practical actions.Results application scope: scientific research and preparation of training in the field of historical knowledge.DOI: http://dx.doi.org/10.12731/2218-7405-2013-10-29

  13. 17 CFR 155.3 - Trading standards for futures commission merchants.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for futures commission merchants. 155.3 Section 155.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.3 Trading standards for futures commission merchants. (a) Each futures...

  14. Scoin Trading (Pty)

    African Journals Online (AJOL)

    User

    2 Scoin Trading (Pty) Ltd v Bernstein 2011 2 SA 118 (SCA). ... Literature on the law of contract in South Africa have over the years tended to hold that fault ..... who was suddenly compelled to be absent on public business was not held to be in.

  15. 75 FR 56506 - Beauty and Cosmetics Trade Mission to India; Application Deadline Extended and Acceptance To...

    Science.gov (United States)

    2010-09-16

    ... DEPARTMENT OF COMMERCE International Trade Administration Beauty and Cosmetics Trade Mission to..., direct mail, notices by industry trade associations and other multiplier groups, and publicity at industry meetings, symposia, conferences, and trade shows. The application deadline has been extended to...

  16. 17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.

    Science.gov (United States)

    2010-04-01

    ... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...

  17. 78 FR 20960 - Face Up Entertainment Group, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2013-04-08

    ... Suspension of Trading April 4, 2013. It appears to the Securities and Exchange Commission that there is a... business operations, and trading in its securities. Face Up is a Florida corporation based in Valley Stream... interest and the protection of investors require a suspension of trading in the securities of the above...

  18. 17 CFR 240.11a-1 - Regulation of floor trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Regulation of floor trading... Securities Exchange Act of 1934 Adoption of Floor Trading Regulation (rule 11a-1) § 240.11a-1 Regulation of floor trading. (a) No member of a national securities exchange, while on the floor of such exchange...

  19. 78 FR 45996 - Duoyuan Printing, Inc.; Order of Suspension: of Trading

    Science.gov (United States)

    2013-07-30

    ...: of Trading July 26, 2013. It appears to the Securities and Exchange Commission that there is a lack... require a suspension of trading in securities of Duoyuan Printing, Inc. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in Duoyuan Printing, Inc. is...

  20. 77 FR 10004 - C$ cMoney, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-02-21

    ... Trading February 16, 2012. It appears to the Securities and Exchange Commission that there is a lack of... protection of investors require a suspension of trading in the securities of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  1. 76 FR 67528 - Curatech Industries, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2011-11-01

    ... of Trading October 28, 2011. It appears to the Securities and Exchange Commission that there is a... protection of investors require a suspension of trading in the securities of the company listed above. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  2. 78 FR 35351 - Polar Petroleum Corp.; Order of Suspension of Trading

    Science.gov (United States)

    2013-06-12

    ... Trading June 10, 2013. It appears to the Securities and Exchange Commission that there is a lack of... the protection of investors require a suspension of trading in the securities of the above-listed... trading in the securities of the above-listed company is suspended for the period from 9:30 a.m. EDT on...

  3. Wealth of the world's richest publicly traded companies per industry and per employee: Gamma, Log-normal and Pareto power-law as universal distributions?

    Science.gov (United States)

    Soriano-Hernández, P.; del Castillo-Mussot, M.; Campirán-Chávez, I.; Montemayor-Aldrete, J. A.

    2017-04-01

    Forbes Magazine published its list of leading or strongest publicly-traded two thousand companies in the world (G-2000) based on four independent metrics: sales or revenues, profits, assets and market value. Every one of these wealth metrics yields particular information on the corporate size or wealth size of each firm. The G-2000 cumulative probability wealth distribution per employee (per capita) for all four metrics exhibits a two-class structure: quasi-exponential in the lower part, and a Pareto power-law in the higher part. These two-class structure per capita distributions are qualitatively similar to income and wealth distributions in many countries of the world, but the fraction of firms per employee within the high-class Pareto is about 49% in sales per employee, and 33% after averaging on the four metrics, whereas in countries the fraction of rich agents in the Pareto zone is less than 10%. The quasi-exponential zone can be adjusted by Gamma or Log-normal distributions. On the other hand, Forbes classifies the G-2000 firms in 82 different industries or economic activities. Within each industry, the wealth distribution per employee also follows a two-class structure, but when the aggregate wealth of firms in each industry for the four metrics is divided by the total number of employees in that industry, then the 82 points of the aggregate wealth distribution by industry per employee can be well adjusted by quasi-exponential curves for the four metrics.

  4. Trade Policy Preferences and the Factor Content of Trade

    DEFF Research Database (Denmark)

    Jäkel, Ina Charlotte; Smolka, Marcel

    demonstrate that the factor price changes induced by trade policy are negatively correlated with the factor content of free trade (and therefore factor abundance). Using large-scale international survey data, we test whether these predicted distributional effects are reflected in the trade policy preferences...... of workers with different labor market skills. In order to isolate the effects of factor abundance from other skill-related confounding factors, we employ a within-skill-group estimator that exploits the cross-country variation in the factor content of free trade. In line with theory, the data show......This paper provides a theoretical and empirical analysis of public opinion towards free trade, investigating cleavages both between and within countries. We study the distributional effects of trade policy in a neoclassical economy with not just two, but many input factors in production. We...

  5. Security Price Informativeness with Delegated Traders

    OpenAIRE

    Gary Gorton; Ping He; Lixin Huang

    2010-01-01

    Trade in securities markets is conducted by agents acting for principals, using "mark-to-market" contracts whereby performance is assessed using security market prices. We endogenize contract choices, information production, informed trading, and security price informativeness. But there is a contract externality. Prices are informative only because other principals induce their agents to trade based on privately produced information. The agent-traders then have an incentive to coordinate and...

  6. Prevalence and compensation of academic leaders, professors, and trustees on publicly traded US healthcare company boards of directors: cross sectional study.

    Science.gov (United States)

    Anderson, Timothy S; Good, Chester B; Gellad, Walid F

    2015-09-29

    To identify the prevalence, characteristics, and compensation of members of the boards of directors of healthcare industry companies who hold academic appointments as leaders, professors, or trustees. Cross sectional study. US healthcare companies publicly traded on the NASDAQ or New York Stock Exchange in 2013. 3434 directors of pharmaceutical, biotechnology, medical equipment and supply, and healthcare provider companies. Prevalence, annual compensation, and beneficial stock ownership of directors with affiliations as leaders, professors, or trustees of academic medical and research institutions. 446 healthcare companies met the study search criteria, of which 442 (99%) had publicly accessible disclosures on boards of directors. 180 companies (41%) had one or more academically affiliated directors. Directors were affiliated with 85 geographically diverse non-profit academic institutions, including 19 of the top 20 National Institute of Health funded medical schools and all of the 17 US News honor roll hospitals. Overall, these 279 academically affiliated directors included 73 leaders, 121 professors, and 85 trustees. Leaders included 17 chief executive officers and 11 vice presidents or executive officers of health systems and hospitals; 15 university presidents, provosts, and chancellors; and eight medical school deans or presidents. The total annual compensation to academically affiliated directors for their services to companies was $54,995,786 (£35,836,000; €49,185,900) (median individual compensation $193,000) and directors beneficially owned 59,831,477 shares of company stock (median 50,699 shares). A substantial number and diversity of academic leaders, professors, and trustees hold directorships at US healthcare companies, with compensation often approaching or surpassing common academic clinical salaries. Dual obligations to for profit company shareholders and non-profit clinical and educational institutions pose considerable personal, financial, and

  7. Foreign Trade

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Foreign Trade database has monthly volume and value information for US imports, exports, and re-exports of fishery or fishery derived products. Data is...

  8. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  9. Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study.

    Science.gov (United States)

    Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek

    2015-10-14

    Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated

  10. 12 CFR 335.241 - Unlisted trading.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Unlisted trading. 335.241 Section 335.241 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY SECURITIES OF NONMEMBER INSURED BANKS § 335.241 Unlisted trading. The provisions of the applicable and...

  11. Effect of RF Interference on the Security-Reliability Trade-off Analysis of Multiuser Mixed RF/FSO Relay Networks with Power Allocation

    KAUST Repository

    Abd El-Malek, Ahmed

    2017-03-27

    In this paper, the impact of radio frequency (RF) cochannel interference (CCI) on the performance of multiuser mixed RF/free-space optical (FSO) relay network with opportunistic user scheduling under eavesdropping attack is studied. The considered system includes multiple users, one decode-and-forward relay, one destination, and an eavesdropper. In the analysis, the RF/FSO channels follow Nakagami-m/Gamma-Gamma fading models, respectively, with pointing errors on the FSO link. Exact closed-form expression for the system outage probability is derived. Then, an asymptotic expression for the outage probability is obtained at the high signal-to-interference-plus-noise ratio regime to get more insights on the system performance. Moreover, the obtained results are used to find the optimal transmission power in different turbulence conditions. The secrecy performance is studied in the presence of CCI at both the authorized relay and eavesdropper, where closed-form expressions are derived for the intercept probability. The physical layer security performance is enhanced using cooperative jamming models, where new closed-form expressions are derived for the intercept probability. Another power allocation optimization problem is formulated to find the optimal transmission and jamming powers. The derived analytical formulas are supported by numerical results to clarify the main contributions of this paper.

  12. How Should Public Administration Education Curriculum Within Indiana Higher Education Institutions Evolve to Reflect the Complex Homeland Security Issues Faced by Future Public Sector Employees?

    Science.gov (United States)

    2012-03-01

    Administration Research and Theory, 25–57. O’Leary, R. (2010). Traditions, ideas, spirits, event, challenge. Journal of Public Adminstration , 1–36. Purdue...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited HOW SHOULD PUBLIC ... PUBLIC SECTOR EMPLOYEES? by Bryant S. Lucas March 2012 Thesis Advisor: Christopher Bellavita Second Reader: Lauren Wollman THIS PAGE

  13. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    Science.gov (United States)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  14. Public security female workers at the coast of Paraná, Brazil: intersections of gender, work, violence(s), and health.

    Science.gov (United States)

    Schneider, Daniele; Signorelli, Marcos Claudio; Pereira, Pedro Paulo Gomes

    2017-09-01

    This study aimed to promote visibility of women working in public security along the Parana coast, articulating issues of gender, violence(s), and the health-disease process. The methodology was qualitative, through an ethnographic research which included 50 women (civilians, military policewomen, and prison officers) from municipalities along the Parana coast, between March 2014 and March 2015. Results revealed: 1) the dilemmas that these women are subjected to, facing the seasonal dynamics in the field of public security in the region; 2) exposure to violence (mainly institutional and gender-based) and its impact on these women's health; 3) power relations, marked by corporations' hierarchies and gender asymmetries between men and women in professional settings. In summary, this research highlighted the need to promote visibility of women working in public security institutions, considering the impact of violence and gender inequalities in their personal and professional lives, including the resistance and rearrangements promoted by these women in the institutions in response to their presence in a hegemonic and traditionally male environment.

  15. Barriers and Potential Improvements for Needle and Syringe Exchange Programs (NSPs in China: A Qualitative Study from Perspectives of Both Health and Public Security Sectors.

    Directory of Open Access Journals (Sweden)

    Fung Kuen Koo

    Full Text Available This study explores the acceptability, the barriers to the implementation of needle and syringe exchange programs (NSPs and the potential improvement strategies in China from the perspectives of governmental health and public security officials. Purposive sampling was used for recruitment of participants who had been involved in NSPs implementation. Semi-Structured individual interviews were conducted in Mandarin to address three aspects of NSPs: (1 participants' attitudes towards NSPs, (2 participants' opinions on the effectiveness and barriers of NSPs, and (3 suggestions for improving the program. Content analysis was used to analyse the translated interview data. A total of 68 participants from 12 Hunan counties were interviewed (34 from each of the Bureau of Health and the Narcotic Division. Both groups recognised the importance and effectiveness of NSPs in HIV prevention, but public security officials regarded NSPs as a temporary intervention in place of punitive measures. Most health officials (32/34 regarded the main barriers to its implementation as administrative and structural, whereas participants from Narcotics Division (n=24 questioned the legitimacy of NSPs and concerned about the poor management of drug users' risk behaviours. Close cooperation between the health and public security sectors, engagement of the drug user community and an enabling policy environment were reportedly to be critical for potential improvements of NSPs in China. Misconceptions about NSPs encourage drug users' addictive behaviour, and an unclear leadership and insufficient support de-motivate the participants from the Bureau of Health and the Narcotics Division to actively support the program implementation.

  16. Interim report of the interagency coal export task force: draft for public comment. [Trade by country 1960-1979; general forecasting to 1985, 1990 and 2000

    Energy Technology Data Exchange (ETDEWEB)

    None

    1981-01-01

    The Interagency Coal Export Task Force was formed in the Spring of 1980 at the direction of the President, in support of the international efforts of the United States, encouraging the use of coal. Its purpose was to report on possible courses of action to increase United States steam coal exports in a manner consistent with other national policies, including our commitment to environmental protection. The Task Force assembled existing data, developed significant new information regarding the international coal market and undertook analyses of apparent problems underlying coal exports. The Task Force contributed to a public awareness of the fact that increased coal exports will serve both the domestic and international interests of the United States. Based upon extensive, independent field studies in Europe and the Far East, the Task Force concludes that there will be significant growth in world demand for steam coal. Such growth has already begun, has contributed to the almost seven-fold increase in United States overseas steam coal exports for 1990 over 1979, and is expected to continue beyond the end of this century. The growth in world steam coal trade projected in the report does not guarantee United States coal exporters a large or expanding share of the market. The United States' role depends on the buying strategies of the consuming countries, the policies and prices of competing exporters, and the actions taken by the United States to maintain reasonable prices, prompt delivery and dependable quality. Projections of United States steam coal exports, therefore, rest upon a number of highly uncertain factors which are discussed in some detail.

  17. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  18. 17 CFR 230.138 - Publications or distributions of research reports by brokers or dealers about securities other...

    Science.gov (United States)

    2010-04-01

    ... Section 15(d) of the Securities Exchange Act of 1934 (15 U.S.C. 78m or 78o(d)); or (ii) Is a foreign... history provisions of General Instructions I.A.1. and I.A.2(a) of Form F-3; (B) Either: (1) Satisfies the... Securities Exchange Act of 1934 (§ 240.3a51-1 of this chapter). (b) Rule 144A offerings. If the conditions in...

  19. 27 CFR 19.966 - Security.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.966 Section 19.966 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF... and Security § 19.966 Security. Proprietors shall provide security adequate to deter the unauthorized...

  20. Opening of energy markets: consequences on the missions of public utility and of security of supplies in the domain of electric power and gas; Ouverture des marches energetiques: consequences sur les missions de service public et de securite d'approvisionnement pour l'electricite et le gaz

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This conference was jointly organized by the International Energy Agency (IEA) and the French ministry of economy, finances, and industry (general direction of energy and raw materials, DGEMP). It was organized in 6 sessions dealing with: 1 - the public utility in the domain of energy: definition of the public utility missions, experience feedback about liberalized markets, public utility obligation and pricing regulation; 2 - the new US energy policy and the lessons learnt from the California crisis; 3 - the security of electric power supplies: concepts of security of supplies, opinion of operators, security of power supplies versus liberalization and investments; 4 - security of gas supplies: markets liberalization and investments, long-term contracts and security of supplies; 5 - debate: how to integrate the objectives of public utility and of security of supplies in a competing market; 6 - conclusions. This document brings together the available talks and transparencies presented at the conference. (J.S.)

  1. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  2. Food and nutrition security public initiatives from a human and socioeconomic development perspective: mapping experiences within the 1996 World Food Summit signatories.

    Science.gov (United States)

    Aliaga, Marie Agnès; Chaves-Dos-Santos, Sandra Maria

    2014-03-01

    Food security exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. In a global scenario where hunger and obesity affect millions of people, public actions have been developed towards Food and Nutrition Security (FNS). In 1996 during the World Food Summit, 186 countries signed the Rome Declaration, committing themselves to assess and address Food and Nutrition Insecurity. In this exploratory study, we compile secondary internet data using keywords in four languages to map the global distribution, among signatories, of FNS public initiatives and assess their association with key national-level socioeconomic indicators. As a result, we found FNS public policies in 123 countries, reports on the state of FNS in 139 countries, and the presence of both in 114 countries (61%). The proportion of countries with any type of, as well as with specific, FNS policy or diagnostic was higher in least developed countries. There was a statistically significant association between these proportions and selected national-level socioeconomic variables. The results are discussed along with population vulnerability, international cooperation mechanisms and political discourse and how these factors impact the existence of FNS public actions. Copyright © 2013 Elsevier Ltd. All rights reserved.

  3. 19 CFR 148.53 - Exemption for tools of trade.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Exemption for tools of trade. 148.53 Section 148.53 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... tools of trade. (a) Exemption. Professional books, implements, instruments, or tools of trade...

  4. 78 FR 60191 - United States-Colombia Trade Promotion Agreement

    Science.gov (United States)

    2013-10-01

    ... Trade Promotion Agreement AGENCY: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States- Colombia Trade Promotion... States-Colombia Trade Promotion Agreement (``CTPA'' or ``Agreement''), and on June 28, 2007, the Parties...

  5. 77 FR 64031 - United States-Peru Trade Promotion Agreement

    Science.gov (United States)

    2012-10-18

    ... Trade Promotion Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States-Peru Trade Promotion Agreement... other customs-related provisions of the United States-Peru Trade Promotion Agreement (PTPA). Please...

  6. 76 FR 65365 - United States-OMAN Free Trade Agreement

    Science.gov (United States)

    2011-10-21

    ... Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... other customs-related provisions of the United States--Oman Free Trade Agreement entered into by the... the U.S.-Oman Free Trade Agreement (``OFTA'' or ``Agreement''). The provisions of the OFTA were...

  7. 78 FR 32356 - United States-Korea Free Trade Agreement

    Science.gov (United States)

    2013-05-30

    ...-Korea Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... treatment and other customs-related provisions of the United States-Korea Free Trade Agreement entered into...-Korea Free Trade Agreement (hereinafter ``UKFTA'' or the ``Agreement''). On December 3, 2010, the United...

  8. Integrative taxonomy of the ornamental 'peppermint' shrimp public market and population genetics of Lysmata boggessi, the most heavily traded species worldwide.

    Science.gov (United States)

    Baeza, J Antonio; Behringer, Donald C

    2017-01-01

    The ornamental trade is a worldwide industry worth >15 billion USD with a problem of rampant product misidentification. Minimizing misidentification is critical in the face of overexploitation of species in the trade. We surveyed the peppermint shrimp ornamental marketplace in the southeastern USA, the most intense market for peppermint shrimps worldwide, to characterize the composition of species in the trade, reveal the extent of misidentification, and describe the population genetics of the true target species. Shrimps were bought from aquarium shops in FL, GA, SC, and NC. We demonstrated, contrary to popular belief (information from dealers), that the most heavily traded species in the market was Lysmata boggessi , an endemic species to the eastern Gulf of Mexico, and not Lysmata wurdemanni . Importantly, only when color pattern or genetic markers in conjunction with morphological traits were employed, was it was possible to unequivocally identify L. boggessi as the only species in the trade. The intensity of the market for peppermint shrimps in the USA has led to L. boggessi being the most traded species worldwide. Misidentification in the shrimp aquarium trade is accidental and involuntary, and is explained by remarkable similarity among congeneric species. Using sequences of the 16S-mt-DNA marker, we found no indication of population genetic structure in the endemic L. boggessi across  550 km of linear coast. Therefore, this species can be considered genetically homogeneous and a single fished stock. Still, we argue in favor of additional studies using more powerful markers (e.g., SNPs) capable of revealing genetic structure at a finer spatial-scale. Our results will help advance management and conservation policies in this lucrative yet understudied fishery. Future studies of other ornamental fisheries will benefit from using an integrative taxonomic approach, as we demonstrate here.

  9. 'Lowering the threshold of effective deterrence'-Testing the effect of private security agents in public spaces on crime: A randomized controlled trial in a mass transit system.

    Science.gov (United States)

    Ariel, Barak; Bland, Matthew; Sutherland, Alex

    2017-01-01

    Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations' complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory.

  10. 17 CFR 155.6 - Trading standards for the transaction of business on registered derivatives transaction execution...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for the transaction of business on registered derivatives transaction execution facilities. 155.6 Section 155.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.6 Trading...

  11. A security model for saas in cloud computing

    International Nuclear Information System (INIS)

    Abbas, R.; Farooq, A.

    2016-01-01

    Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. It has many service modes like Software as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS). In SaaS model, service providers install and activate the applications in cloud and cloud customers access the software from cloud. So, the user does not have the need to purchase and install a particular software on his/her machine. While using SaaS model, there are multiple security issues and problems like Data security, Data breaches, Network security, Authentication and authorization, Data integrity, Availability, Web application security and Backup which are faced by users. Many researchers minimize these security problems by putting in hard work. A large work has been done to resolve these problems but there are a lot of issues that persist and need to overcome. In this research work, we have developed a security model that improves the security of data according to the desire of the End-user. The proposed model for different data security options can be helpful to increase the data security through which trade-off between functionalities can be optimized for private and public data. (author)

  12. Detailed Information Security in Cloud Computing

    OpenAIRE

    Pavel Valerievich Ivonin

    2013-01-01

    The object of research in this article is technology of public clouds, structure and security system of clouds. Problems of information security in clouds are considered, elements of security system in public clouds are described.

  13. 36 CFR 13.1504 - Customary trade.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Customary trade. 13.1504 Section 13.1504 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR... trade. In addition to the exchange of furs for cash, “customary trade” in Kobuk Valley National Park...

  14. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  15. 75 FR 11842 - Export Trade Certificate of Review

    Science.gov (United States)

    2010-03-12

    ..., licensing of Technology Rights and provision of Export Trade Facilitation Services, EFS International... already generally available to the trade or public. 2. EFS International will comply with requests made by... DEPARTMENT OF COMMERCE International Trade Administration [Application No. 10-00002] Export Trade...

  16. Greasing the Wheels of Trade

    OpenAIRE

    Hendrik P. van Dalen; Aico P. van Vuuren

    2003-01-01

    This discussion paper resulted in a publication in 'De Economist' , 2005, 153(2), 139-165. How much does a nation spend on resources to 'grease the wheels of trade'? To examine this question the Dutch economy is used as an exemplary case as the Netherlands are known as a nation of traders. This image was derived in the seventeenth century from successes in long distance trade, shipping and financial innovations. Despite its historical background in trading the potential to 'truck and barter' ...

  17. 76 FR 58774 - Trade Mission to Southeast Asia in Conjunction With Trade Winds-Asia

    Science.gov (United States)

    2011-09-22

    ... trade mission stop in either: Malaysia (Kuala Lumpur) or Indonesia (Jakarta). Each trade mission stop... cross section of industries with growth potential in Singapore, Vietnam, Thailand, Malaysia and... equipment, safety and security equipment, automotive parts and service equipment, and logistics and...

  18. The joint European TEMPUS project 'Human Security (environment, quality of food, public health, and society) on territories contaminated by radioactive agents'

    International Nuclear Information System (INIS)

    Goncharova, N.; Butchenkow, I.; Maestri, E.

    2016-01-01

    Full text: The Joint European TEMPUS Project 'Human Security (environment, quality of food, public health, and society) on Territories Contaminated by Radioactive Agents', started in 2012. The EU project participants are the following: University of Cordoba (Spain) - Project Coordinator, University of Parma (Italy), University of Florence (Italy), Swedish University of Agricultural Sciences (Sweden) and Riga Technical University (Latvia). The project involves three partner countries - Belarus, Russia, Ukraine, represented by the following institutions: Belarusian State University, International Sakharov Environmental University, Grodno State Medical University, Grodno State Agrarian University, Voronezh State University, Tyumen State Medical Academy, Ural Federal University (Yekaterinburg), Chelyabinsk State University, Nuclear Cities Information-Education Centre, Vinnitsa National Medical University, Zhytomyr State Technological University, Kyiv International University, Sevastopol National University of Nuclear Energy and Industry, Polissya branch of G.M. Vysotsky Ukrainian Research Institute of Forestry and Forest Melioration. The main objectives of the project are: to develop interdisciplinary Master and Doctoral (PhD) programs in the field of Human Security of people living in areas affected by accidents at nuclear power plants / plant for processing nuclear fuel within the following specialties: Ecology and Environment Sciences - 'Human Security and Environment'; Food quality control - 'Human Security and Quality of Food'; Medicine - 'Human Security and Public Health'; Political and Social Sciences - 'Human Security and Society'. These programs will be implemented at 12 universities, 4 from each partner country. During the project implementation it is expected to achieve the following main results: modified interdisciplinary Master and Doctoral (PhD) programs taking into account the studied European experience and practice; joint system of upgrade of

  19. Feeding humanity through global food trade

    Science.gov (United States)

    D'Odorico, Paolo; Carr, Joel A.; Laio, Francesco; Ridolfi, Luca; Vandoni, Stefano

    2014-09-01

    The recent intensification of international trade has led to a globalization of food commodities and to an increased disconnection between human populations and the land and water resources that support them through crop and livestock production. Several countries are not self-sufficient and depend on imports from other regions. Despite the recognized importance of the role of trade in global and regional food security, the societal reliance on domestic production and international trade remains poorly quantified. Here we investigate the global patterns of food trade and evaluate the dependency of food security on imports. We investigate the relationship existing between the trade of food calories and the virtual transfer of water used for their production. We show how the amount of food calories traded in the international market has more than doubled between 1986 and 2009, while the number of links in the trade network has increased by more than 50%. Likewise, global food production has increased by more than 50% in the same period, providing an amount of food that is overall sufficient to support the global population at a rate of 2700-3000 kcal per person per day. About 23% of the food produced for human consumption is traded internationally. The water use efficiency of food trade (i.e., food calories produced per unit volume of water used) has declined in the last few decades. The water use efficiency of food production overall increases with the countries' affluence; this trend is likely due to the use of more advanced technology.

  20. Multilateral, regional and bilateral energy trade governance

    Energy Technology Data Exchange (ETDEWEB)

    Leal-Arcas, Rafael; Grasso, Costantino; Rios, Juan Alemany (Queen Mary Univ. of London (United Kingdom))

    2014-12-01

    The current international energy trade governance system is fragmented and multi-layered. Streamlining it for greater legal cohesiveness and international political and economic cooperation would promote global energy security. The current article explores three levels of energy trade governance: multilateral, regional and bilateral. Most energy-rich countries are part of the multilateral trading system, which is institutionalized by the World Trade Organization (WTO). The article analyzes the multilateral energy trade governance system by focusing on the WTO and energy transportation issues. Regionally, the article focuses on five major regional agreements and their energy-related aspects and examines the various causes that explain the proliferation of regional trade agreements, their compatibility with WTO law, and then provides several examples of regional energy trade governance throughout the world. When it comes to bilateral energy trade governance, this article only addresses the European Union’s (EU) bilateral energy trade relations. The article explores ways in which gaps could be filled and overlaps eliminated whilst remaining true to the high-level normative framework, concentrating on those measures that would enhance EU energy security.

  1. The problem of using trade secrets in economic relations

    Directory of Open Access Journals (Sweden)

    А. О. Олефір

    2015-05-01

    Full Text Available Problem setting. In a market economy and increased competition between enterprises become increasingly important concepts such as business information, trade secrets, know-how, confidential information, the information with restricted access. Given the fact that only one patent protection is unable to meet the needs of researchers, in addition to formal public protection and secured legal means we would like to pay attention at private legal measures, particular, the mode of trade secrets. Recent research and publications analysis. Different aspects of the protection of trade secrets were investigated by specialists such as G. Androschuk, J. Berzhye, I. Davydov, O. Davydyuk, D. Zadyhaylo, P. Kraynov, G. Nikiforov, S. Nikiforov, V. Rubanov, E. Solovyov, L. Hoffman, V. Chaplygin, A. Cherniavsky and others. However, at present there is a lack of comprehensive research of this legal phenomenon, equally useful for innovators and businesses that actively protect corporate security. Paper objective. This article is planned to determine the legal characteristics, structural elements and mechanisms by which the use of trade secrets in business have a positive impact on innovation development and corporate security entities. Paper main body. On the basis of requirements of Art. 505 Civil Code of Ukraine and art. 39 of the TRIPS Agreement we formulated commercial information signs under which it receives legal protection as an object of intellectual property: (1 privacy (real or potential in the sense that it is as a whole or in a precise combination of aggregate and its components are not generally known or available to persons in the circles that normally deal with such information; (2 commercial value (not purely industrial or industrial, due to its secrecy; this information is unknown to others, which is a commercial interest; (3 the lawful holder of the information provides active special measures (technical, organizational, legal to preserve secrecy

  2. Publicity.

    Science.gov (United States)

    Chisholm, Joan

    Publicity for preschool cooperatives is described. Publicity helps produce financial support for preschool cooperatives. It may take the form of posters, brochures, newsletters, open house, newspaper coverage, and radio and television. Word of mouth and general good will in the community are the best avenues of publicity that a cooperative nursery…

  3. Energy and the NAFTA [North American Free Trade Agreement

    International Nuclear Information System (INIS)

    Plourde, A.

    1993-01-01

    A review is presented of the implications of the North American Free Trade Agreement (NAFTA) for the energy industry. This agreement expands the coverage accorded to energy in the Canada-US Free Trade Agreement (FTA), and is of limited significance with respect to Canada-US relations, but is quite important to these two countries' energy trade with Mexico. With respect to Canada-US trade, the most important departure from the FTA is that NAFTA tends to ensure a greater degree of respect for the terms of negotiated contracts, in particular by requiring the parties to make efforts to secure compliance with the national treatment provisions of the NAFTA by subfederal regulatory entities. Mexico's constitution severely restricts foreign participation in the activities of its energy industries, including basic petrochemicals. While NAFTA accomodates these restrictions, Canadian and US companies will have opportunities to bid on contracts for goods and services and construction in the Mexican energy sector on an equal footing with their Mexican counterparts. NAFTA also provides expanded opportunities for foreign investment and control in electricity generation for own-use, cogeneration and public service purposes. The parties are explicitly allowed to extend activity incentives to their respective oil and gas industries. 9 refs

  4. BASIC CONCEPTS OF TAX SECURITY AS PART OF THE FINANCIAL SECURITY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Sergiy Golikov

    2016-11-01

    Full Text Available The purpose of the paper is to examine the essence of the term «tax security», its fundamental characteristics, such as threats, risks, interests and protection, defined how the state could provide them. The paper analyses economic, social and legal nature of the term. Key indicators of tax security of Ukraine identified and analyzed. In addition, the paper studies an integrated approach of tax security threats. In case of a big amount of threats, they divided to four main sources of threats: the state of the national economy, the state of the public finances, social features of the society and institutional environment. For each source, there have been identified and analyzed the most important factors of threats of tax security of Ukraine. Methodology. The survey based on an analysis of existing studies of Ukrainian and foreign scientists about the essence and nature of "tax security" for the last 10 years. In addition, to determine the essence and the concept, goals and objectives, methods and principles of the economic nature of the tax security, main risks, threats, expectations and results of efficient tax security identified. To build an integrated approach it is necessary to analyse all existing and potential factors of threats. There data used from reports of the State Statistics Service of Ukraine, Ministry of Economic Development and Trade of Ukraine, PWC and World Bank. Results of the survey showed that tax security is such a condition of tax security, when the process of harmonization of taxation provided under effective management of risks and threats that arise in tax area, by taking the necessary measures by the executive bodies to meet the interests of the state, society and taxpayers (business entities, organizations, people. Integrated approach of threats analysis of tax security shows that the most dangerous threats are those that are associated with poor economic development, considerable socio-economic stratification of

  5. To Explore Managerial Issues and Their Implications on e-Government Deployment in the Public Sector: Lessons from Taiwan's Bureau of Foreign Trade

    Science.gov (United States)

    Tseng, Paul T. Y.; Yen, David C.; Hung, Yu-Chung; Wang, Nana C. F.

    2008-01-01

    The objective of this article is to explore the experience of reconciling the strategic information system (IS) management with the radical transition of the Information Technology (IT) infrastructure in Taiwan's Bureau of Foreign Trade (BOFT) between 1998 and 2003. This investigation will be beneficial for the implementation of IT projects, as…

  6. 17 CFR 37.4 - Election to trade excluded and exempt commodities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Election to trade excluded and exempt commodities. 37.4 Section 37.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION EXECUTION FACILITIES § 37.4 Election to trade excluded and exempt...

  7. 17 CFR 240.12f-1 - Applications for permission to reinstate unlisted trading privileges.

    Science.gov (United States)

    2010-04-01

    ... reinstate unlisted trading privileges. 240.12f-1 Section 240.12f-1 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-1 Applications for permission to reinstate unlisted trading privileges. (a) An application to reinstate unlisted...

  8. 17 CFR 242.303 - Record preservation requirements for alternative trading systems.

    Science.gov (United States)

    2010-04-01

    ... requirements for alternative trading systems. 242.303 Section 242.303 Commodity and Securities Exchanges... REQUIREMENTS FOR SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.303 Record preservation requirements for alternative trading systems. (a) To comply with the condition set forth in paragraph (b)(9) of...

  9. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  10. Public Perspectives of Mobile Phones' Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey.

    Science.gov (United States)

    Richardson, Joshua E; Ancker, Jessica S

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.

  11. 17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.

    Science.gov (United States)

    2010-04-01

    ... Exchange Act of 1934 (15 U.S.C. 78m or 78o(d)); or (B) Is a foreign private issuer that as of the date of... history provisions of General Instructions I.A.1. and I.A.2(a) of Form F-3; (2) Either: (i) Satisfies the... an offering of penny stock as defined in Rule 3a51-1 of the Securities Exchange Act of 1934 (§ 240...

  12. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  13. 15 CFR 2008.18 - Information Security Oversight Committee.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  14. Trading stages

    DEFF Research Database (Denmark)

    Steiner, Uli; Tuljapurkar, Shripad; Coulson, Tim

    2012-01-01

    Interest in stage-and age structured models has recently increased because they can describe quantitative traits such as size that are left out of age-only demography. Available methods for the analysis of effects of vital rates on lifespan in stage-structured models have not been widely applied ...... examples. Much of our approach relies on trading of time and mortality risk in one stage for time and risk in others. Our approach contributes to the new framework of the study of age- and stage-structured biodemography....

  15. Food Acquisition through Private and Public Social Networks and Its Relationship with Household Food Security among Various Socioeconomic Statuses in South Korea.

    Science.gov (United States)

    Park, Sohyun; Kim, Kirang

    2018-01-25

    This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants' mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses.

  16. Food Acquisition through Private and Public Social Networks and Its Relationship with Household Food Security among Various Socioeconomic Statuses in South Korea

    Science.gov (United States)

    Park, Sohyun; Kim, Kirang

    2018-01-01

    This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants’ mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses. PMID:29370127

  17. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  18. 77 FR 16048 - U.S. Customs and Border Protection 2012 West Coast Trade Symposium: “Harmonizing Trade for a...

    Science.gov (United States)

    2012-03-19

    ... Advisor for Trade and Public Relations, Office of Trade Relations. [FR Doc. 2012-6589 Filed 3-16-12; 8:45... relating to the agency's role in international trade initiatives and programs. This year marks our twelfth year hosting trade symposia. Members of the international trade and transportation communities and...

  19. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  20. Trading volume and the number of trades

    OpenAIRE

    Marwan Izzeldin

    2007-01-01

    Trading volume and the number of trades are both used as proxies for market activity, with disagreement as to which is the better proxy for market activity. This paper investigates this issue using high frequency data for Cisco and Intel in 1997. A number of econometric methods are used, including GARCH augmented with lagged trading volume and number of trades, tests based on moment restrictions, regression analysis of volatility on volume and trades, normality of returns when standardized by...